Introduction to Security / Edition 6

Introduction to Security / Edition 6

by Robert J. Fischer
     
 

ISBN-10: 0750698608

ISBN-13: 9780750698603

Pub. Date: 02/01/1998

Publisher: Elsevier Science & Technology Books

Introduction to Security, Seventh Edition is a complete revision of the classic text. This edition addresses the latest trends, concerns, and issues in the security industry today. From equipment and new technologies to security design theories and security management practices, all the key fundamentals are covered. This comprehensive text begins with a new chapter on

Overview

Introduction to Security, Seventh Edition is a complete revision of the classic text. This edition addresses the latest trends, concerns, and issues in the security industry today. From equipment and new technologies to security design theories and security management practices, all the key fundamentals are covered. This comprehensive text begins with a new chapter on the chief issue of interest to security professionals today, the establishment and development of Homeland Security in the United States. Terrorism, now an area of principal concern for the security industry, is addressed in its own chapter that outlines the history and changes in global terrorism. Terrorism is also addressed throughout the book relative to its impact on cargo and travel security, potential areas of attack and target hardening techniques, and the use of current technologies to combat new threats. Traditional physical and guard security is covered in addition to new advances in the electronic and computer security areas including biometric security, access control, CCTV surveillance as well as growing computer security threats of identity theft and computer-facilitated fraud. With new and expanded chapters, Introduction to Security continues to provide the most comprehensive coverage of security issues for the student, while providing current information and detail for the experienced security professional.

Product Details

ISBN-13:
9780750698603
Publisher:
Elsevier Science & Technology Books
Publication date:
02/01/1998
Edition description:
Older Edition
Pages:
537
Product dimensions:
6.40(w) x 9.44(h) x 1.42(d)

Table of Contents

Prefacexiii
Acknowledgmentsxv
Part IIntroduction and Security's Function1
1Homeland Security--Changing the Emphasis on Security in the United States3
Introduction3
Private Enterprise Response4
Federal Response in the United States11
State/Local Response15
Public/Private Joint Initiatives17
Concerns17
2Origins and Development of Security21
Introduction21
Security in England21
Security in the United States25
3Defining Security's Role37
Introduction37
What Is Private Security?37
Security Services39
Contract versus Proprietary Services40
Hybrid Systems45
Private Security and Public Law Enforcement48
Relationships after September 11, 200151
4The Proprietary Security Organization55
Introduction55
Determining the Need55
Security's Place in the Organization56
Organizing the Security Function63
5Career Opportunities in Loss Prevention75
Introduction75
Factors Increasing Security Opportunities75
The Security/Loss-Prevention Occupation76
6Security Education, Training, Certification, and Regulation89
Introduction89
Adequacy of Private Security Training90
Proposed Federal Regulation90
The Role of Higher Education91
Training93
Certification and Regulation94
Magazines and Periodicals97
Part IIBasics of Defense101
7Security and the Law103
Introduction103
Security, Public Police, and the U.S. Constitution104
Sources of Law104
Classes of Crimes106
Private Security Powers108
Civil Law: The Controller for Private Security114
Security and Liability118
Duty to Protect from Third-Party Crime119
Recent Trends in Liability123
Recent Trends in Privacy124
New Laws124
The Courts124
Development of Case Law125
8Risk Analysis and the Security Survey129
Introduction129
Risk Management130
The Security Survey131
Alternatives for Optimizing Risk Management141
9The Outer Defenses: Building and Perimeter Protection147
Introduction147
Barriers, Fences, and Walls148
Gates and Other Barrier Breaches152
Barrier Protection153
Inside the Perimeter156
Lighting157
Planning Security164
10Interior and Exterior Security Concerns167
Introduction167
Buildings on or as the Perimeter167
Windows and Doors167
Locks and Keys170
Roofs and Common Walls184
Surveillance Devices184
Old Construction188
New Construction189
Security at the Building Design Stage189
Security Principles in Design190
11The Inner Defenses: Intrusion and Access Control193
Introduction193
Doors to Sensitive Areas194
Office Area Doors194
Traffic Patterns194
Traffic Control195
Employee Identification196
Package Control198
Files, Safes, and Vaults198
Inspections203
Alarms203
12Fire Protection, Safety, and Emergency Planning215
Introduction215
Fire Prevention and Protection216
Safety and Loss Control228
Emergency Planning236
13Insurance241
Introduction241
The Value of Insurance in a Total Loss-Prevention Program241
Types of Insurance242
Insuring against Crime247
Insuring Property248
14Internal Theft Controls253
Introduction253
What Is Honesty?253
The Dishonest Employee254
Management Responsibility in Loss Prevention257
Program for Internal Security259
Procedural Controls261
When Controls Fail269
15Personnel Policies for Internal Security273
Introduction273
Human Resources Screening273
Employment History and Reference Checking274
Backgrounding281
Integrity and Lie Detection Tests282
Americans with Disabilities Act285
Drug Screening288
Other Screening Options288
Hiring Ex-convicts and Parolees289
Morale289
Part IIISpecific Threats and Solutions295
16Transportation/Cargo Security297
Introduction297
The Role of Private Security298
Accountability Procedures298
Theft and Pilferage300
Planning for Security304
Cargo in Transit307
Suggested Sealing Systems and Procedures309
Special Issues in Airline Security314
Other Transportation Industry Responses to Terrorism316
17Workplace Violence: Prevention and Intervention319
Introduction319
Threat320
Harassment320
Attack320
Sabotage320
The Phenomenon of Workplace Violence320
The Work Environment and Violence322
Profiling Violent Behavior323
Basic Levels of Violence325
Preventing Workplace Violence326
The Violence Intervention and Contingency Team327
Perpetrators' Rights328
Intervention Strategy329
18Drugs in the Workplace333
Introduction333
Impact of Drug Use334
Drug Testing336
Spotting Drug Use338
The Components of a Comprehensive Substance Abuse Program339
19Retail Security345
Introduction345
Shoplifting346
Checks and Credit/Debit Cards356
Internal Theft362
20Terrorism and Other Tools of Destruction369
Introduction369
Current Issues371
Historical Background372
Implications of a Changing World375
In Search of a Definition for International Terrorism376
Terrorism as a Tactic, Instrument, or Method378
Characterizing Modern Terrorism380
Specific Threats and Responses389
Other Specific Response Issues in the United States392
The Future/Summary395
21Computer and Information Security399
Introduction399
Types of Computer Systems402
Networks404
The Database Problems406
The Need for Computer Security406
Computer Systems Protection411
Content Monitoring and Filtering418
Dealing with Identity Theft420
Other Data Resources Vulnerabilities422
22Specific Security Threats427
Introduction427
Economic/White-Collar Crime427
Burglary and Robbery429
Labor Disputes436
Espionage438
Piracy439
23Security: Its Problems, Its Future443
Introduction443
The Aftermath of September 11, 2001443
Private Security Resources444
Interaction and Cooperation444
Limitations of Security445
Trends446
The Future447
Appendix ASecurity Journals, Magazines, and Newsletters453
Appendix BWorld Wide Web Sites455
Appendix CSecurity Surveys457
Index465

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >