Asset Protection and Security Management Handbook / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $64.97
Usually ships in 1-2 business days
(Save 50%)
Other sellers (Hardcover)
  • All (6) from $64.97   
  • Used (6) from $64.97   

Overview

The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.

Based on the ASIS asset protection course, the text provides information vital to security planning and operational requirements. It addresses the most comonly recognized issues in the field and explores the future of asset protection management. The authors examine the latest in crime detection, prevention, and interrogation techniques. The Asset Protection and Security Management Handbook will not only help you to explore effective security training and educational programs for your organization, but will also help you discover proven methods of selling your security program to top management.

The most comprehensive handbook on the subject, this handbook is a must for all professionals involved in security and security management. For people new to the security profession, it gives a firm foundation for advanced development. For experienced security practitioners, the handbook offers an invaluable reference. Not only does it cover the fundamental aspects of security and security management, the Asset Protection and Security Management Handbook also provides non-security information, from basic investigations work, legal issues, and ethics to workplace violence and risk analysis.

Read More Show Less

Product Details

  • ISBN-13: 9780849316036
  • Publisher: Taylor & Francis
  • Publication date: 12/1/2002
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 584
  • Product dimensions: 6.40 (w) x 9.50 (h) x 1.39 (d)

Table of Contents

INTRODUCTION TO ASSETS PROTECTION
The Management Function
Definition of Assets Protection
Basic Considerations
The Systems Approach
Countermeasures
The System Test
Appendix A: Self-Inspection and Protection of Assets Check Sheet

SECURITY VULNERABILITY
Introduction
Defining the Problem
Loss Event Profile
Loss Event Probability or Frequency
Loss Event Criticality
Alternative Approaches to Criticality
Preparing A Solution
Network Design
Solving the Problem
Economic Justification of Security
Appendix A: Basic Security Survey
Appendix B: Basic Matrix

STRUCTURAL BARRIERS
Introduction
Barrier Categories
Building Surfaces
Evaluation of Building Surfaces
Building Openings
Bomb Protection
Vehicle Barriers

GENERAL LOCKING CONCEPTS
Introduction
Basic Lock Grouping
Master Keying Mechanical Locks
Security Vulnerabilities of Mechanical Locks
Electrified Locking Mechanisms

ALARM SENSORS
Sensor Applications
Security Applications
Categories of Sensors
Sensors for Fire Detection
Appendix A: Federal Specification
Components for Interior Alarm Systems

SYSTEMS CONSIDERATIONS
Introduction
Alarm Termination
Systems Design
Cost Reduction and Protection Improvement
The Automated Security System
Emergency Power
Appendix A: Glossary of Frequently Used Security Terms
Appendix B: Glossary of Frequently Used Fire Terms

ACCESS CONTROL
Basic Access Control Objectives
Granting/Denying Entry
Authorized Access Control
Coded Card Technology
Distributed Intelligence Systems
Special Access Features and Applications
Weapons and Contraband Screening

EMERGENCY PLANNING
The First Step
Advance Planning
Planning Issues and Considerations
After the Plan Is Written
Appendix A: Company Disaster Control Program
Appendix B: Resources and Logistics Equipment and Services

INFORMATION SYSTEMS SECURITY: AN OVERVIEW
Introduction
Encoding Digital Data
Processing Digital Data
A Typical Central Processing Unit
The Impact of Large-Scale Integration
A Typical Information System
Classes of Computers
The Evolution of Information Systems
What is Information Systems Security?
Is Information Systems Security Important?
The Evolution of Information System Risks
Management of Information Systems Security
Functional Definition of Information Systems Security

INFORMATION SYSTEMS SECURITY
Introduction
Roles and Responsibilities
Information Systems Security Policies, Procedures and
Information Systems Security Program Management
Information Systems Security and Planning
Operating and User Controls
Audit Trails and Transaction Logs
The Internet

INVESTIGATIONS: GENERAL COMMENTS
Public- and Private-Sector Investigations
Investigations - In General
Qualities of an Effective Investigation
Legal Guidelines
Investigative Reports
Appendix A: Selected Internet Investigative Resources

SECURITY AND PROTECTIVE LIGHTING
Introduction
Lighting and Lighting Definitions
Lighting Systems
Lighting Economics
Starting and Re-Strike
Security Lighting Applications
Security Lighting and Closed Circuit Video Systems
Standards for Security Lighting Levels

CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
Introduction
Understanding CPTED: Theory, History, and Practice
Basic Crime Prevention Assumptions
Contemporary Thinking on Crime and Criminals

CONCEPTS OF RISK MANAGEMENT
Reducing Crime through Physical Design
Site Development and Security Zoning
Security Design Criteria for Parking Facilities
Design Considerations for Industrial Buildings
Design Considerations for Office Buildings
Special Considerations Regarding U.S. Federal Buildings
Graphics and Signage for Crime Prevention and Environmental Security
Summary

UNITED STATES CRIMINAL LAW
Introduction
Federal and State Constitutions
Statutory Law
Definition and Classification of Crimes
Case or Decisional Law
Relevance to Asset Protection
Important Procedural Considerations
Deception Detection Instruments
Conclusion

THE CIVIL LAW
Definition
Major Branches
Statutory Law
Civil Common Law
Torts In General
The Area of Civil Rights

SECURITY AS A MANAGEMENT FUNCTION
Introduction
Developing the Organization
Program Implementation
Communications
Staffing the Protection Organization
Program Management

ETHICS IN THE SECURITY PROFESSION
Introduction
What Are Professional Ethics?
The Security Profession
The Professional Society
The Code of Ethics of the American Society for Industrial
Security
The Practical Application of Professional Ethics
Selected Bibliography

DETECTING DECEPTION IN INTERVIEWS AND INTERROGATIONS
Introduction
Different Types of Responses
Some Preliminary Cautions
Verbal Responses
Nonverbal Responses
The Behavior Analysis Interview
The Reid Nine Steps of Interrogation

A PLAN FOR THREAT MANAGEMENT
Overview
The Concept of Threat Management
Liability and Legal Considerations
The Psychological Dynamic of Workplace Violence
Pre-Employment Screening
Physical Security
Policy Statement and Reporting Procedure
The Incident Management Team (IMT) and Supporting
Resources
The Incident Management Process
Assessment Phase
Appendix A: Model Policy for Workplace Threats and Violence
Appendix B: Minimum Qualifications for Outside Consulting Team Members
Appendix C: Normal Incident Assessment/Resolution Process

INDEX

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)