دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 10 نویسندگان: Robert J. Fischer, Edward P. Halibozek and David C. Walters سری: ISBN (شابک) : 9780128053102 ناشر: Butterworth-Heinemann سال نشر: 2019 تعداد صفحات: 560 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 14 مگابایت
در صورت تبدیل فایل کتاب Introduction to Security به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مقدمه ای بر امنیت نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
مقدمه ای بر امنیت، ویرایش دهم، مروری بر صنعت امنیت با تاکید بر تئوری های امنیت و پیشگیری از ضرر که این حرفه را شکل داده اند، ارائه می دهد. امنیت به طور کلی پوشش داده شده است، و به خوانندگان نگاهی اجمالی از اجزای مختلف و متنوعی که عملکرد امنیتی را تشکیل می دهند، ارائه می دهد. این کتاب به روز شده آخرین نسخه از کتابی است که در طول تاریخ بیش از 30 سال است که در این موضوع مورد استفاده قرار گرفته است. در حالی که این نسخه کاملاً به روز شده همچنان از مفاهیم اساسی استفاده می کند که این متن را به عنوان آغازگر برتر در زمینه امنیتی تبدیل کرده است، همچنین به شدت بر مسائل امنیتی فعلی و آینده تمرکز دارد.
Introduction to Security, Tenth Edition, provides an overview of the security industry with an emphasis on the theories of security and loss prevention that have shaped the profession. Security is covered in totality, providing readers with a glimpse of the various and diverse components that make up the security function. This updated book is the latest edition in what has historically been the go-to textbook on the subject for more than 30 years. While this fully updated edition continues to utilize the basic concepts that have made this text the premier primer in the security field, it also focuses heavily on current and future security issues.
Front-matter_2019_Introduction-to-Security Introduction to Security Copyright_2019_Introduction-to-Security Copyright About-the-Authors_2019_Introduction-to-Security About the Authors Preface_2019_Introduction-to-Security Preface Acknowledgments_2019_Introduction-to-Security Acknowledgments Part-I--Introduction_2019_Introduction-to-Security Introduction 1---Origins-and-Development-of-21st-Century-Secu_2019_Introduction-to-Securi 1 Origins and Development of 21st Century Security Introduction Security in England The 18th Century The Impact of Industrial Expansion Security in the United States Development of Private Security The Beginning of Modern Security Early Security Information Sharing The Costs Crime Trends and Security Crime Against Business – Only an Estimate? White Collar and Economic Crimes Society and Crime Growth of Private Security Growing Pains and Government Involvement Professionalism Professional Organizations The Problem With Training New Thinking Summary Review Questions References 2---Defining-Security-s-Role_2019_Introduction-to-Security 2 Defining Security’s Role Introduction What is Private Security? Protection of Life and Property Security Functions Security Services Contract Versus Proprietary Services Advantages of Contract Services Cost Administration Staffing Unions Impartiality Expertise Advantages of Proprietary Officers Quality of Personnel Control Loyalty Prestige Deciding on a Contract Security Firm Hybrid Systems Engaged Liaison Support Reviews Measurement Private Security and Public Law Enforcement Complementary Roles Relationships After September 11, 2001 Summary Review Questions References 3---Career-Opportunities-in-Loss-Prevention_2019_Introduction-to-Security 3 Career Opportunities in Loss Prevention Introduction Key Factors Increasing Security Opportunities The Security/Loss-Prevention Occupation Security Executives and Management Personal Security (Protection of High Profile Individuals) Brand Protection Private Investigators Consultants Opportunities in Sales Opportunities in Industry Opportunities in Retail Opportunities in Health Care Airport and Airline Security/Sky Marshals Hotel Security Campus Security Banking Security Security Services Security Officer (aka Guards) Services Patrol Services Armored Delivery Services Locksmithing Alarm Response Services/Technology Experts Computer/Intellectual Property Security Government Service Other Services Summary Review Questions References 4---Security-Education--Training--Certification--an_2019_Introduction-to-Sec 4 Security Education, Training, Certification, and Regulation Introduction Adequacy of Private Security Training Proposed Federal Regulation—A Brief History The Role of Higher Education Training Certification and Regulation Regulation Certification The ASIS International Initiative for Managers Certification for Line Officers Other Certification Efforts Magazines and Periodicals Summary Review Questions References 5---Terrorism-as-a-Threat-to-Business_2019_Introduction-to-Security 5 Terrorism as a Threat to Business Introduction Global Security Private Enterprise Response Transit Security Electrical Grid Issues Nuclear Facilities Oil and Gas Facilities Water Utilities Retail City Centers Public Events and Cultural Centers Sports Arenas Conference Sites and Hotels Museums Construction Industry Agriculture Hospitals Federal Response in the United States Department of Homeland Security Cyber Security and Computer Protection Comprehensive National Cyber Security Initiative The United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Program The Student and Exchange Visitor Information System Federal Identification Cards Homeland Security Presidential Directive 12 (HSPD-12) Federal Building Security Initiatives Protection of Chemical Manufacturing Sites Antibioterrorism State/Local Response The Costs School Safety Emergency Response Plans Examples of Specific State Responses Private/Public Joint Initiatives Concerns Review Questions References Part-II--Basics-of-Defense_2019_Introduction-to-Security Basics of Defense 6---Security-and-the-Law_2019_Introduction-to-Security 6 Security and the Law Introduction Security, Public Police, and the US Constitution Sources of Law Common Law Case Law Statutory Law The Power of Security Personnel Classes of Crimes Felonies and Misdemeanors Private Security Powers Arrest Detention Interrogation Search and Seizure Exclusionary Rule Use of Force Self-Defense Defense of Others Defense of Property Force Used During Arrest or Detention Prevention of Crimes Use of Firearms Civil Law: The Controller for Private Security Tort Law: Source of Power and Limits Negligence Intentional Torts Assault Battery False Imprisonment or False Arrest Defamation Malicious Prosecution Invasion of Privacy Trespass and Conversion Intentional Infliction of Mental Distress Security and Liability Duty to Protect From Third-Party Crime Nondelegable Duty Imputed Negligence Vicarious Liability Criminal Liability Recent Trends in Liability Recent Trends in Privacy New Laws Background Investigations Social Security Numbers Privacy of Medical Information Privacy of Financial Information The Courts The Procedure Development of Case Law Legal Research Reporters Case Reports Digests and Summaries Computer-Based Legal Sources Summary Review Questions References 7---Risk-Analysis--Security-Surveys-and-Insuran_2019_Introduction-to-Securit 7 Risk Analysis, Security Surveys and Insurance Introduction Risk Management Asset Assessment Threat Assessment The Security Survey The Facility General Departmental Evaluations Human Resources Organization Accounting and Treasury Information Systems Purchasing and Procurement Shipping and Receiving The Survey Report Operational Audits and Programed Supervision Probability Criticality The Probability/Criticality/Vulnerability Matrix Alternatives for Optimizing Risk Management The Cost-Effectiveness of Security Periodic Review Security File Insurance The Value of Insurance as Part of a Total Loss-Prevention Program Types of Insurance Fidelity Coverage Surety Coverage Federal Crime Insurance 3-D Coverage Insurance Against Loss of Use, Business Interruption, and Extra Expense Coverage Kidnap and Ransom Insurance Fire Insurance Business Property Insurance Liability Insurance Workers’ Compensation Insurance Portfolio Commercial Crime Coverage Cyber Insurance Coverage Terrorism Risk Insurance Act of 2002 How Much Insurance? Summary Review Questions References 8---Interior-and-Exterior-Security-Concerns_2019_Introduction-to-Security 8 Interior and Exterior Security Concerns Introduction Buildings on or as the Perimeter Windows and Doors Windows Burglary-Resistant Glass “Smash and Grab” Attacks Screening Doors Door Construction and Hardware Locks and Keys Attacks Against Locks Locks as Delaying Devices Latches and Bolts Keying Devices and Systems Removable Cores Keying Systems Rekeying Key Management Locking Schedules A Managed Key Program Other Operating Mechanisms for Access Control Locking Devices Roofs and Common Walls Surveillance Devices Old Construction New Construction Security at the Building Design Stage Security Principles in Design Summary Review Questions Further Reading 9---The-Outer-Defenses--Building-and-Perimeter-Pro_2019_Introduction-to-Secu 9 The Outer Defenses Introduction Barriers, Fences, and Walls Barriers Fences Chain Link Barbed Wire Concertina Wire Walls Gates and Other Barrier Breaches Padlocking Personnel and Vehicle Gates Miscellaneous Openings Barrier Protection Clear Zone Inspection Hydraulic Defense Fence Protection Devices Fluid Pressure Electromagnetic Cable Buried Cable Detection Fiber-optic Cable Capacitive Field Effect Active Infrared System (AIRS) External Microwave Taut Wire Vibration Sensors Inside the Perimeter Parking Surveillance Lighting Types of Lighting Incandescent Fluorescent Mercury Vapor Lamps Metal Halide Sodium Vapor Lights Quartz Lamps Light-Emitting Diodes (LEDs) Electroluminescent Types of Equipment Streetlights Floodlights Fresnel Lenses Searchlights Maintenance Perimeter Lighting Gates and Thoroughfares Other Areas General Planning Security Summary Review Questions References 10---The-Inner-Defenses--Intrusion-and-Access-Con_2019_Introduction-to-Secur 10 The Inner Defenses Introduction Doors to Sensitive Areas Office Area Doors Traffic Patterns Traffic Control Visitors Employee Identification Pass (Badge) Systems Package Control Files, Safes, and Vaults Files Safes Record Safes Money Safes Securing the Safe Vaults Container Protection Continuing Evaluation Inspections Security Officer Patrols Alarms Kinds of Alarm Protection Alarm Sensors Electromechanical Devices Pressure Devices Photoelectric Devices Motion Detection Alarms Capacitance Alarm Systems Sonic Alarm Systems Vibration Detectors Alarm Monitoring Systems Cost Considerations Summary Review Questions References 11---Contingency-Planning-Emergency-Response-and-_2019_Introduction-to-Secur 11 Contingency Planning Emergency Response and Safety Introduction Contingency Planning Security and the Contingency Planning Process Contingency Planning Program Contingency Plans Emergency Response Crisis or Incident Management Business Continuity Business Recovery Business Resumption Pandemics Summary Review Questions References 12---Fire-Prevention-and-Protection--and-Occupatio_2019_Introduction-to-Secu 12 Fire Prevention and Protection, and Occupational Safety Introduction Security Personnel Vulnerability to Fire Fireload The Nature of Fire By-Products of Fire Classes of Fire Extinguishers Fire Alarm Signaling Systems Sensors Signal Devices Automatic Sprinkler Systems Education in Fire Prevention and Safety Employees in Fire Fighting Evacuation Evacuating Industrial Facilities Evacuating High-Rise Buildings Planning and Training Safety and Loss Control OSHA Standards Setting up the Safety Program Finding the Causes of Accidents Identification and Control of Hazards A Hazardous Materials Program Management Leadership Assignment of Responsibility Training Emergency Care Employee Awareness and Participation Summary Review Questions References 13---Internal-Theft-Controls-Personnel-Issues_2019_Introduction-to-Security 13 Internal Theft Controls/Personnel Issues Introduction What Is Honesty? The Dishonest Employee The Fraud Triangle Danger Signs What Employees Steal Methods of Theft The Contagion of Theft Moral Obligation to Control Theft Program for Internal Security Need for Management Support Communicating the Program Continuing Supervision Program Changes Violations Personnel Policies for Internal Security Human Resources and the Screening Process Employment History and Reference Checking Backgrounding The Job Application Integrity and Lie Detection Tests Americans with Disabilities Act Drug Screening Other Screening Options Hiring Ex-Convicts and Parolees Employee Assistance Programs Continuity of the Screening Program Procedural Controls Auditing Assets Separation of Responsibility Promotion and Rotation Computer Records/Electronic Mail and Funds Transfer/Fax Physical Security The Mailroom Trash Removal When Controls Fail Undercover Investigation Prosecution Discharging the Thief Borderline Cases Review Questions References Part-III--Specific-Threats-and-Solutions_2019_Introduction-to-Security Specific Threats and Solutions 14---Violence-and-Drug-Use-in-the-Workplace_2019_Introduction-to-Security 14 Violence and Drug Use in the Workplace Introduction: Workplace Violence What Is Workplace Violence? Threat Harassment Attack Sabotage Violence and the Workplace: Not a New Issue The Phenomenon of Workplace Violence The Victims Costs Reasons for Workplace Violence Acceptance of Violence Availability of Guns Economic Factors The Work Environment and Violence Profiling Violent Behavior Basic Levels of Violence Preventing Workplace Violence The Violence Intervention and Contingency Team VIACT: Previolence Prevention Mission VIACT: Postviolence Mission VIACT: Developing Strategies for Dealing With Potential Violence Perpetrators’ Rights Intervention Strategy Intervention Education The Intervention Drugs in the Workplace Introduction Alcohol and Other Drugs in the Workplace Alcohol and Other Drug Use Distribution across Occupations and Industries The Economic Cost Problems Associated with Drugs in the Workplace Problems Unique to Marijuana Problems Unique to Opioids Theft Productivity, Quality Control, Accidents, and Injuries Absenteeism and Turnover Rates Personal Problems Using a Comprehensive Substance Abuse Program Drug Testing Preemployment Drug Testing Postemployment Drug Testing Types of Drug Tests Which Method of Drug Testing Is Best? What About Testing for Alcohol? What Are the Methods of Laboratory Analysis? What Is the Average Cost of Employee or Preemployee Screening Drug Testing? Drug Testing Process Additional Methods of Drug Use Detection Spotting Drug Use Methamphetamines Marijuana Opiates Cocaine Alcohol Inhalants Other Signs Summary Review Questions References Further Reading 15---Retail-Security_2019_Introduction-to-Security 15 Retail Security Introduction Supply Chain Shoplifting Extent of Shoplifting Methods of Shoplifting Common Red Flags Displayed by Shoplifters Who Shoplifts Professionals Organized Retail Crime Opportunist Impoverished Substance Abuser Thrill Seeker Kleptomaniac Prevention and Response Detaining Shoplifters Internal Theft Common Employee Theft Justifications Prevention and Response Methods of Internal Theft Cash Fraudulent Refunds Fraudulent Voids Fraudulent Suspensions “Sweethearting” Theft From the Safe Controls to Reduce the Risk of Safe Theft Merchandise Investigations External Threats Burglary Robbery Checks and Credit/Debit Cards The Nature of the Check Checks and the Retailer Check and Credit/Debit Card Approval Credit and Debit Cards ID Equipment and Systems Store Policy Policies, Procedures, and Practices Policy Components—The Three-Legged Stool Training Auditing for Compliance Technology Point of Sale Exception-Based Reporting (Software) Electronic Article Surveillance Alarm Systems Intrusion Detection Alarm Duress Alarm Merchandise Alarm Exit Alarm Closed Circuit Television Systems Access Control Radio Frequency Identification Summary Review Questions References 16---Terrorism--A-Global-Perspective_2019_Introduction-to-Security 16 Terrorism Introduction Why does terrorism exist? Current Issues Historical Background Europe Marxism Russia Ireland Palestine Chechnya Terrorism in the 21st Century State Sponsors of Terrorism Implications of a Changing World In Search of a Definition for International Terrorism Political Criminal Militaristic The Physiological Approach Psychological Approach Group Behavior Multifactor Approach Terrorism as a Tactic, Instrument, or Method Characterizing Modern Terrorism Ideological Shift Organizational Shift Geographical Shift Tactical Shift Technological Shift Organized Crime Shift Characterizing International Terrorist Groups Seeking Political Gain Motivation Seeking Publicity Requiring Member Loyalty Through Ideological, Religious, Ethnic, and Other Considerations Structure Tactical Diversity Assistance Organizational Maturity Violent Nature Weaponry Finance Reducing the Risk of Terrorism Specific Threats and Responses Executive Protection Bombs and Bomb Threats Telephone Operator’s Response Search Teams Evacuation Other Specific Response Issues in the United States Al-Qaeda and Other Terrorist Organizations Nuclear and Radiological Threats Bioterrorism Chemical Agents Cyber Terrorism The Future/Summary Review Questions References 17---Holistic-Security-Through-the-Application-of-Int_2019_Introduction-to-S 17 Holistic Security Through the Application of Integrated Technology Introduction CSO, CISO, and CIO Interactions IT and Security Cooperation Types of Computer Systems Microcomputers Personal Computers Workstations Mainframes Supercomputers Networks Local Area Networks Wireless LANs Wide Area Networks The Internet The Database Problems The Need for Computer Security Classic Methods for Committing Computer Crimes Data Manipulation or Theft Salami Technique Trojan Horse Viruses Worms Hostile Applets Bombs Trapdoors and Back Doors Time Stealing Electronic Eavesdropping Software Piracy Scavenging Memory War Driving Identity Theft Ransomware Scam Tech Support Scam Phishing Malware Federal Computer Legislation The Electronic Communications Privacy Act Computer Systems Protection Keyloggers Contingency Procedures Hardware Backup Software and Information Backup Backup for Related and Special Activities Identification and Access Control of Software and Data What a Person Has What a Person Knows Who a Person Is Encryption Physical Security Electronic Data Processing Centers Personal Computers Content Monitoring and Filtering Possible Security Solutions Network Security Policy Appropriate Use Policy Virus Scanning Email Filtering Software Web Monitoring Software Spam Filtering Computer Forensic Investigations Dealing With Identity Theft What to Do? Safeguarding Corporate Information Protecting Your Identity When You Are the Victim Education/Training Other Data Resource Vulnerabilities Summary Review Questions References Further Reading 18---Transportation-Security-Issues-and-Regulati_2019_Introduction-to-Securi 18 Transportation Security Issues and Regulation Introduction The Role of Private Security Accountability Procedures Invoice System Separation of Functions Driver Loading Theft and Pilferage Targets of Theft Pilferage Deterring Pilferage Large-Quantity Theft Removal of Goods Disposal of Stolen Goods Terminal Operations Surveillance A Total Program Planning for Security Controlled, Limited, and Exclusion Areas Pass Systems Vehicle Control Other Security Planning Security Surveys Inspections Education Cargo in Transit The Threat of Hijacking/Sabotage Global Positioning System Personnel Qualifications Procedures on the Road Seals Resealing Seal Security Modern Technology and Seals Special Issues in Airline Security Increased Security Measures Specific Solutions for a Specific Problem Other Transportation Industry Responses to Terrorism Bus Transportation Maritime Operations Amtrak/Local Commuter and Freight Trains Over-the-Road Oil and Gas Summary Review Questions References 19---Selected-Security-Threats-of-the-21st-Centu_2019_Introduction-to-Securi 19 Selected Security Threats of the 21st Century Introduction Economic/White-Collar Crime Definitions Impact Burglary and Robbery Burglary The Attack Merchandise as Target Cash as Target Physical Defense Against Burglary Alarms Safes Basic Burglary Protection Robbery The Nature of Robbery Robbery Targets Cash Handling Cash-Room Protection Opening Routine Transporting Cash Closing Routine Other Routines Employee Training Robbery Prevention Labor Disputes Security’s Role Right to Picket Prestrike Planning Law Enforcement Liaison Espionage Piracy and Counterfeiting Summary Review Questions References Further Reading 20---Security--Today-and-Tomorrow_2019_Introduction-to-Security 20 Security: Today and Tomorrow Introduction The Aftermath of September 11, 2001 Private Security Resources Interactions and Cooperation Leadership and Management Education and Professionalization Certification and Standards Limitations of Security Convergence: Integration of Logical and Physical Security Technologies Technology Evolving Trends Active Shooters Growth of the Profession and Financing The Testing Industry; Social Media Use of Consultants and Specialists Liability Drug Testing International Issues Terrorism The Continuing Challenge of Theft Pandemic Planning, Brand Protection Management, and Supply Chain Security Brand Protection Pandemics Supply Chain Security The Future Review Questions References Appendix-A---Security-Journals--Magazines--and-New_2019_Introduction-to-Secu Appendix A Security Journals, Magazines, and Newsletters United States Appendix-B---World-Wide-Websites_2019_Introduction-to-Security Appendix B World Wide Websites Appendix-C---Security-Surveys_2019_Introduction-to-Security Appendix C Security Surveys Index_2019_Introduction-to-Security Index