ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Introduction to Security

دانلود کتاب مقدمه ای بر امنیت

Introduction to Security

مشخصات کتاب

Introduction to Security

ویرایش: 10 
نویسندگان: ,   
سری:  
ISBN (شابک) : 9780128053102 
ناشر: Butterworth-Heinemann 
سال نشر: 2019 
تعداد صفحات: 560 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 14 مگابایت 

قیمت کتاب (تومان) : 43,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Introduction to Security به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مقدمه ای بر امنیت نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مقدمه ای بر امنیت

مقدمه ای بر امنیت، ویرایش دهم، مروری بر صنعت امنیت با تاکید بر تئوری های امنیت و پیشگیری از ضرر که این حرفه را شکل داده اند، ارائه می دهد. امنیت به طور کلی پوشش داده شده است، و به خوانندگان نگاهی اجمالی از اجزای مختلف و متنوعی که عملکرد امنیتی را تشکیل می دهند، ارائه می دهد. این کتاب به روز شده آخرین نسخه از کتابی است که در طول تاریخ بیش از 30 سال است که در این موضوع مورد استفاده قرار گرفته است. در حالی که این نسخه کاملاً به روز شده همچنان از مفاهیم اساسی استفاده می کند که این متن را به عنوان آغازگر برتر در زمینه امنیتی تبدیل کرده است، همچنین به شدت بر مسائل امنیتی فعلی و آینده تمرکز دارد.


توضیحاتی درمورد کتاب به خارجی

Introduction to Security, Tenth Edition, provides an overview of the security industry with an emphasis on the theories of security and loss prevention that have shaped the profession. Security is covered in totality, providing readers with a glimpse of the various and diverse components that make up the security function. This updated book is the latest edition in what has historically been the go-to textbook on the subject for more than 30 years. While this fully updated edition continues to utilize the basic concepts that have made this text the premier primer in the security field, it also focuses heavily on current and future security issues.



فهرست مطالب

Front-matter_2019_Introduction-to-Security
	Introduction to Security
Copyright_2019_Introduction-to-Security
	Copyright
About-the-Authors_2019_Introduction-to-Security
	About the Authors
Preface_2019_Introduction-to-Security
	Preface
Acknowledgments_2019_Introduction-to-Security
	Acknowledgments
Part-I--Introduction_2019_Introduction-to-Security
	Introduction
1---Origins-and-Development-of-21st-Century-Secu_2019_Introduction-to-Securi
	1 Origins and Development of 21st Century Security
		Introduction
		Security in England
			The 18th Century
			The Impact of Industrial Expansion
		Security in the United States
			Development of Private Security
		The Beginning of Modern Security
		Early Security Information Sharing
			The Costs
			Crime Trends and Security
			Crime Against Business – Only an Estimate?
			White Collar and Economic Crimes
			Society and Crime
		Growth of Private Security
			Growing Pains and Government Involvement
		Professionalism
			Professional Organizations
			The Problem With Training
		New Thinking
		Summary
		Review Questions
		References
2---Defining-Security-s-Role_2019_Introduction-to-Security
	2 Defining Security’s Role
		Introduction
		What is Private Security?
			Protection of Life and Property
			Security Functions
		Security Services
			Contract Versus Proprietary Services
			Advantages of Contract Services
				Cost
				Administration
				Staffing
				Unions
				Impartiality
				Expertise
			Advantages of Proprietary Officers
				Quality of Personnel
				Control
				Loyalty
				Prestige
			Deciding on a Contract Security Firm
		Hybrid Systems
			Engaged Liaison
			Support
			Reviews
			Measurement
		Private Security and Public Law Enforcement
			Complementary Roles
		Relationships After September 11, 2001
		Summary
		Review Questions
		References
3---Career-Opportunities-in-Loss-Prevention_2019_Introduction-to-Security
	3 Career Opportunities in Loss Prevention
		Introduction
		Key Factors Increasing Security Opportunities
		The Security/Loss-Prevention Occupation
			Security Executives and Management
			Personal Security (Protection of High Profile Individuals)
			Brand Protection
			Private Investigators
			Consultants
			Opportunities in Sales
			Opportunities in Industry
			Opportunities in Retail
			Opportunities in Health Care
			Airport and Airline Security/Sky Marshals
			Hotel Security
			Campus Security
			Banking Security
			Security Services
			Security Officer (aka Guards) Services
			Patrol Services
			Armored Delivery Services
			Locksmithing
			Alarm Response Services/Technology Experts
			Computer/Intellectual Property Security
			Government Service
			Other Services
		Summary
		Review Questions
		References
4---Security-Education--Training--Certification--an_2019_Introduction-to-Sec
	4 Security Education, Training, Certification, and Regulation
		Introduction
		Adequacy of Private Security Training
		Proposed Federal Regulation—A Brief History
		The Role of Higher Education
		Training
		Certification and Regulation
			Regulation
			Certification
				The ASIS International Initiative for Managers
				Certification for Line Officers
				Other Certification Efforts
		Magazines and Periodicals
		Summary
		Review Questions
		References
5---Terrorism-as-a-Threat-to-Business_2019_Introduction-to-Security
	5 Terrorism as a Threat to Business
		Introduction
		Global Security
		Private Enterprise Response
			Transit Security
			Electrical Grid Issues
			Nuclear Facilities
			Oil and Gas Facilities
			Water Utilities
			Retail
			City Centers
				Public Events and Cultural Centers
					Sports Arenas
					Conference Sites and Hotels
					Museums
			Construction Industry
			Agriculture
			Hospitals
		Federal Response in the United States
			Department of Homeland Security
			Cyber Security and Computer Protection
			Comprehensive National Cyber Security Initiative
			The United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Program
			The Student and Exchange Visitor Information System
			Federal Identification Cards
			Homeland Security Presidential Directive 12 (HSPD-12)
			Federal Building Security Initiatives
			Protection of Chemical Manufacturing Sites
			Antibioterrorism
		State/Local Response
			The Costs
			School Safety
			Emergency Response Plans
			Examples of Specific State Responses
		Private/Public Joint Initiatives
		Concerns
		Review Questions
		References
Part-II--Basics-of-Defense_2019_Introduction-to-Security
	Basics of Defense
6---Security-and-the-Law_2019_Introduction-to-Security
	6 Security and the Law
		Introduction
		Security, Public Police, and the US Constitution
		Sources of Law
			Common Law
			Case Law
			Statutory Law
			The Power of Security Personnel
			Classes of Crimes
			Felonies and Misdemeanors
		Private Security Powers
			Arrest
			Detention
			Interrogation
			Search and Seizure
			Exclusionary Rule
			Use of Force
				Self-Defense
				Defense of Others
				Defense of Property
				Force Used During Arrest or Detention
				Prevention of Crimes
				Use of Firearms
		Civil Law: The Controller for Private Security
			Tort Law: Source of Power and Limits
			Negligence
			Intentional Torts
				Assault
				Battery
				False Imprisonment or False Arrest
				Defamation
				Malicious Prosecution
				Invasion of Privacy
				Trespass and Conversion
				Intentional Infliction of Mental Distress
		Security and Liability
		Duty to Protect From Third-Party Crime
			Nondelegable Duty
			Imputed Negligence
				Vicarious Liability
			Criminal Liability
		Recent Trends in Liability
		Recent Trends in Privacy
		New Laws
			Background Investigations
			Social Security Numbers
			Privacy of Medical Information
			Privacy of Financial Information
		The Courts
			The Procedure
		Development of Case Law
			Legal Research
				Reporters
				Case Reports
				Digests and Summaries
				Computer-Based Legal Sources
		Summary
		Review Questions
		References
7---Risk-Analysis--Security-Surveys-and-Insuran_2019_Introduction-to-Securit
	7 Risk Analysis, Security Surveys and Insurance
		Introduction
		Risk Management
			Asset Assessment
			Threat Assessment
			The Security Survey
			The Facility
			General Departmental Evaluations
				Human Resources Organization
				Accounting and Treasury
				Information Systems
				Purchasing and Procurement
				Shipping and Receiving
			The Survey Report
		Operational Audits and Programed Supervision
			Probability
			Criticality
			The Probability/Criticality/Vulnerability Matrix
			Alternatives for Optimizing Risk Management
				The Cost-Effectiveness of Security
				Periodic Review
				Security File
		Insurance
			The Value of Insurance as Part of a Total Loss-Prevention Program
			Types of Insurance
				Fidelity Coverage
				Surety Coverage
				Federal Crime Insurance
				3-D Coverage
				Insurance Against Loss of Use, Business Interruption, and Extra Expense Coverage
				Kidnap and Ransom Insurance
				Fire Insurance
				Business Property Insurance
				Liability Insurance
				Workers’ Compensation Insurance
				Portfolio Commercial Crime Coverage
				Cyber Insurance Coverage
			Terrorism Risk Insurance Act of 2002
			How Much Insurance?
		Summary
		Review Questions
		References
8---Interior-and-Exterior-Security-Concerns_2019_Introduction-to-Security
	8 Interior and Exterior Security Concerns
		Introduction
		Buildings on or as the Perimeter
			Windows and Doors
				Windows
					Burglary-Resistant Glass
					“Smash and Grab” Attacks
					Screening
			Doors
				Door Construction and Hardware
			Locks and Keys
				Attacks Against Locks
				Locks as Delaying Devices
				Latches and Bolts
				Keying Devices and Systems
				Removable Cores
				Keying Systems
				Rekeying
				Key Management
				Locking Schedules
				A Managed Key Program
				Other Operating Mechanisms for Access Control
				Locking Devices
			Roofs and Common Walls
		Surveillance Devices
		Old Construction
		New Construction
		Security at the Building Design Stage
		Security Principles in Design
		Summary
		Review Questions
		Further Reading
9---The-Outer-Defenses--Building-and-Perimeter-Pro_2019_Introduction-to-Secu
	9 The Outer Defenses
		Introduction
		Barriers, Fences, and Walls
			Barriers
			Fences
				Chain Link
				Barbed Wire
				Concertina Wire
			Walls
		Gates and Other Barrier Breaches
			Padlocking
			Personnel and Vehicle Gates
			Miscellaneous Openings
		Barrier Protection
			Clear Zone
			Inspection
			Hydraulic Defense
			Fence Protection Devices
				Fluid Pressure
				Electromagnetic Cable
				Buried Cable Detection
				Fiber-optic Cable
				Capacitive Field Effect
				Active Infrared System (AIRS)
				External Microwave
				Taut Wire
				Vibration Sensors
		Inside the Perimeter
			Parking
			Surveillance
		Lighting
			Types of Lighting
				Incandescent
				Fluorescent
				Mercury Vapor Lamps
				Metal Halide
				Sodium Vapor Lights
				Quartz Lamps
				Light-Emitting Diodes (LEDs)
				Electroluminescent
			Types of Equipment
				Streetlights
				Floodlights
				Fresnel Lenses
				Searchlights
				Maintenance
				Perimeter Lighting
			Gates and Thoroughfares
			Other Areas
			General
		Planning Security
		Summary
		Review Questions
		References
10---The-Inner-Defenses--Intrusion-and-Access-Con_2019_Introduction-to-Secur
	10 The Inner Defenses
		Introduction
		Doors to Sensitive Areas
		Office Area Doors
		Traffic Patterns
		Traffic Control
			Visitors
		Employee Identification
			Pass (Badge) Systems
			Package Control
		Files, Safes, and Vaults
			Files
			Safes
				Record Safes
				Money Safes
				Securing the Safe
			Vaults
			Container Protection
			Continuing Evaluation
		Inspections
			Security Officer Patrols
		Alarms
			Kinds of Alarm Protection
			Alarm Sensors
				Electromechanical Devices
				Pressure Devices
				Photoelectric Devices
				Motion Detection Alarms
				Capacitance Alarm Systems
				Sonic Alarm Systems
				Vibration Detectors
			Alarm Monitoring Systems
			Cost Considerations
		Summary
		Review Questions
		References
11---Contingency-Planning-Emergency-Response-and-_2019_Introduction-to-Secur
	11 Contingency Planning Emergency Response and Safety
		Introduction
		Contingency Planning
			Security and the Contingency Planning Process
			Contingency Planning Program
			Contingency Plans
		Emergency Response
		Crisis or Incident Management
		Business Continuity
		Business Recovery
		Business Resumption
		Pandemics
		Summary
		Review Questions
		References
12---Fire-Prevention-and-Protection--and-Occupatio_2019_Introduction-to-Secu
	12 Fire Prevention and Protection, and Occupational Safety
		Introduction
			Security Personnel
			Vulnerability to Fire
			Fireload
			The Nature of Fire
			By-Products of Fire
			Classes of Fire
			Extinguishers
			Fire Alarm Signaling Systems
				Sensors
				Signal Devices
				Automatic Sprinkler Systems
			Education in Fire Prevention and Safety
				Employees in Fire Fighting
				Evacuation
					Evacuating Industrial Facilities
					Evacuating High-Rise Buildings
					Planning and Training
		Safety and Loss Control
			OSHA Standards
			Setting up the Safety Program
			Finding the Causes of Accidents
			Identification and Control of Hazards
			A Hazardous Materials Program
			Management Leadership
			Assignment of Responsibility
			Training
			Emergency Care
			Employee Awareness and Participation
		Summary
		Review Questions
		References
13---Internal-Theft-Controls-Personnel-Issues_2019_Introduction-to-Security
	13 Internal Theft Controls/Personnel Issues
		Introduction
		What Is Honesty?
		The Dishonest Employee
			The Fraud Triangle
			Danger Signs
			What Employees Steal
			Methods of Theft
			The Contagion of Theft
			Moral Obligation to Control Theft
		Program for Internal Security
			Need for Management Support
			Communicating the Program
			Continuing Supervision
			Program Changes
			Violations
			Personnel Policies for Internal Security
			Human Resources and the Screening Process
			Employment History and Reference Checking
			Backgrounding
			The Job Application
			Integrity and Lie Detection Tests
			Americans with Disabilities Act
			Drug Screening
			Other Screening Options
			Hiring Ex-Convicts and Parolees
			Employee Assistance Programs
			Continuity of the Screening Program
		Procedural Controls
			Auditing Assets
			Separation of Responsibility
			Promotion and Rotation
			Computer Records/Electronic Mail and Funds Transfer/Fax
			Physical Security
				The Mailroom
				Trash Removal
		When Controls Fail
			Undercover Investigation
			Prosecution
			Discharging the Thief
			Borderline Cases
		Review Questions
		References
Part-III--Specific-Threats-and-Solutions_2019_Introduction-to-Security
	Specific Threats and Solutions
14---Violence-and-Drug-Use-in-the-Workplace_2019_Introduction-to-Security
	14 Violence and Drug Use in the Workplace
		Introduction: Workplace Violence
		What Is Workplace Violence?
			Threat
			Harassment
			Attack
			Sabotage
		Violence and the Workplace: Not a New Issue
			The Phenomenon of Workplace Violence
			The Victims
			Costs
			Reasons for Workplace Violence
				Acceptance of Violence
				Availability of Guns
				Economic Factors
			The Work Environment and Violence
			Profiling Violent Behavior
			Basic Levels of Violence
			Preventing Workplace Violence
			The Violence Intervention and Contingency Team
				VIACT: Previolence Prevention Mission
				VIACT: Postviolence Mission
				VIACT: Developing Strategies for Dealing With Potential Violence
			Perpetrators’ Rights
			Intervention Strategy
				Intervention Education
				The Intervention
		Drugs in the Workplace
			Introduction
			Alcohol and Other Drugs in the Workplace
			Alcohol and Other Drug Use Distribution across Occupations and Industries
			The Economic Cost
			Problems Associated with Drugs in the Workplace
			Problems Unique to Marijuana
			Problems Unique to Opioids
				Theft
				Productivity, Quality Control, Accidents, and Injuries
				Absenteeism and Turnover Rates
				Personal Problems
			Using a Comprehensive Substance Abuse Program
			Drug Testing
				Preemployment Drug Testing
				Postemployment Drug Testing
				Types of Drug Tests
			Which Method of Drug Testing Is Best?
			What About Testing for Alcohol?
			What Are the Methods of Laboratory Analysis?
			What Is the Average Cost of Employee or Preemployee Screening Drug Testing?
				Drug Testing Process
		Additional Methods of Drug Use Detection
			Spotting Drug Use
				Methamphetamines
				Marijuana
				Opiates
				Cocaine
				Alcohol
				Inhalants
				Other Signs
		Summary
		Review Questions
		References
		Further Reading
15---Retail-Security_2019_Introduction-to-Security
	15 Retail Security
		Introduction
			Supply Chain
		Shoplifting
			Extent of Shoplifting
			Methods of Shoplifting
				Common Red Flags Displayed by Shoplifters
			Who Shoplifts
				Professionals
				Organized Retail Crime
				Opportunist
				Impoverished
				Substance Abuser
				Thrill Seeker
				Kleptomaniac
			Prevention and Response
			Detaining Shoplifters
		Internal Theft
			Common Employee Theft Justifications
			Prevention and Response
			Methods of Internal Theft
				Cash
				Fraudulent Refunds
				Fraudulent Voids
				Fraudulent Suspensions
				“Sweethearting”
				Theft From the Safe
				Controls to Reduce the Risk of Safe Theft
				Merchandise
			Investigations
		External Threats
			Burglary
			Robbery
			Checks and Credit/Debit Cards
			The Nature of the Check
			Checks and the Retailer
			Check and Credit/Debit Card Approval
			Credit and Debit Cards
			ID Equipment and Systems
			Store Policy
		Policies, Procedures, and Practices
			Policy Components—The Three-Legged Stool
			Training
			Auditing for Compliance
		Technology
			Point of Sale
			Exception-Based Reporting (Software)
			Electronic Article Surveillance
			Alarm Systems
				Intrusion Detection Alarm
				Duress Alarm
				Merchandise Alarm
				Exit Alarm
			Closed Circuit Television Systems
			Access Control
			Radio Frequency Identification
		Summary
		Review Questions
		References
16---Terrorism--A-Global-Perspective_2019_Introduction-to-Security
	16 Terrorism
		Introduction
		Why does terrorism exist?
		Current Issues
		Historical Background
			Europe
			Marxism
			Russia
			Ireland
			Palestine
			Chechnya
			Terrorism in the 21st Century
				State Sponsors of Terrorism
		Implications of a Changing World
		In Search of a Definition for International Terrorism
			Political
			Criminal
			Militaristic
			The Physiological Approach
			Psychological Approach
			Group Behavior
			Multifactor Approach
		Terrorism as a Tactic, Instrument, or Method
		Characterizing Modern Terrorism
			Ideological Shift
			Organizational Shift
			Geographical Shift
			Tactical Shift
			Technological Shift
			Organized Crime Shift
			Characterizing International Terrorist Groups
				Seeking Political Gain
				Motivation
				Seeking Publicity
				Requiring Member Loyalty Through Ideological, Religious, Ethnic, and Other Considerations
				Structure
				Tactical Diversity
				Assistance
				Organizational Maturity
				Violent Nature
				Weaponry
				Finance
			Reducing the Risk of Terrorism
		Specific Threats and Responses
			Executive Protection
			Bombs and Bomb Threats
			Telephone Operator’s Response
			Search Teams
			Evacuation
		Other Specific Response Issues in the United States
			Al-Qaeda and Other Terrorist Organizations
			Nuclear and Radiological Threats
			Bioterrorism
			Chemical Agents
			Cyber Terrorism
		The Future/Summary
		Review Questions
		References
17---Holistic-Security-Through-the-Application-of-Int_2019_Introduction-to-S
	17 Holistic Security Through the Application of Integrated Technology
		Introduction
		CSO, CISO, and CIO Interactions
			IT and Security Cooperation
		Types of Computer Systems
			Microcomputers
				Personal Computers
				Workstations
			Mainframes
			Supercomputers
		Networks
			Local Area Networks
				Wireless LANs
				Wide Area Networks
				The Internet
		The Database Problems
			The Need for Computer Security
			Classic Methods for Committing Computer Crimes
				Data Manipulation or Theft
				Salami Technique
				Trojan Horse
				Viruses
				Worms
				Hostile Applets
				Bombs
				Trapdoors and Back Doors
				Time Stealing
				Electronic Eavesdropping
				Software Piracy
				Scavenging Memory
				War Driving
				Identity Theft
				Ransomware Scam
				Tech Support Scam
				Phishing
				Malware
				Federal Computer Legislation
				The Electronic Communications Privacy Act
		Computer Systems Protection
			Keyloggers
				Contingency Procedures
				Hardware Backup
				Software and Information Backup
				Backup for Related and Special Activities
				Identification and Access Control of Software and Data
					What a Person Has
					What a Person Knows
					Who a Person Is
			Encryption
			Physical Security
				Electronic Data Processing Centers
				Personal Computers
		Content Monitoring and Filtering
			Possible Security Solutions
			Network Security Policy
			Appropriate Use Policy
			Virus Scanning
			Email Filtering Software
			Web Monitoring Software
			Spam Filtering
			Computer Forensic Investigations
		Dealing With Identity Theft
			What to Do?
			Safeguarding Corporate Information
			Protecting Your Identity
			When You Are the Victim
			Education/Training
		Other Data Resource Vulnerabilities
		Summary
		Review Questions
		References
		Further Reading
18---Transportation-Security-Issues-and-Regulati_2019_Introduction-to-Securi
	18 Transportation Security Issues and Regulation
		Introduction
		The Role of Private Security
		Accountability Procedures
			Invoice System
			Separation of Functions
			Driver Loading
			Theft and Pilferage
				Targets of Theft
				Pilferage
				Deterring Pilferage
				Large-Quantity Theft
				Removal of Goods
				Disposal of Stolen Goods
			Terminal Operations
			Surveillance
			A Total Program
		Planning for Security
			Controlled, Limited, and Exclusion Areas
			Pass Systems
			Vehicle Control
			Other Security Planning
			Security Surveys
			Inspections
			Education
		Cargo in Transit
			The Threat of Hijacking/Sabotage
			Global Positioning System
			Personnel Qualifications
			Procedures on the Road
			Seals
				Resealing
				Seal Security
				Modern Technology and Seals
		Special Issues in Airline Security
			Increased Security Measures
			Specific Solutions for a Specific Problem
		Other Transportation Industry Responses to Terrorism
			Bus Transportation
			Maritime Operations
			Amtrak/Local Commuter and Freight Trains
				Over-the-Road
			Oil and Gas
		Summary
		Review Questions
		References
19---Selected-Security-Threats-of-the-21st-Centu_2019_Introduction-to-Securi
	19 Selected Security Threats of the 21st Century
		Introduction
		Economic/White-Collar Crime
			Definitions
			Impact
		Burglary and Robbery
			Burglary
			The Attack
			Merchandise as Target
			Cash as Target
			Physical Defense Against Burglary
				Alarms
				Safes
				Basic Burglary Protection
			Robbery
				The Nature of Robbery
				Robbery Targets
				Cash Handling
				Cash-Room Protection
				Opening Routine
				Transporting Cash
				Closing Routine
				Other Routines
				Employee Training
				Robbery Prevention
		Labor Disputes
			Security’s Role
			Right to Picket
			Prestrike Planning
			Law Enforcement Liaison
		Espionage
		Piracy and Counterfeiting
		Summary
		Review Questions
		References
		Further Reading
20---Security--Today-and-Tomorrow_2019_Introduction-to-Security
	20 Security: Today and Tomorrow
		Introduction
		The Aftermath of September 11, 2001
		Private Security Resources
		Interactions and Cooperation
			Leadership and Management
			Education and Professionalization
			Certification and Standards
		Limitations of Security
			Convergence: Integration of Logical and Physical Security Technologies
			Technology
		Evolving Trends
			Active Shooters
			Growth of the Profession and Financing
			The Testing Industry; Social Media
			Use of Consultants and Specialists
			Liability
			Drug Testing
			International Issues
			Terrorism
			The Continuing Challenge of Theft
		Pandemic Planning, Brand Protection Management, and Supply Chain Security
			Brand Protection
			Pandemics
			Supply Chain Security
		The Future
		Review Questions
		References
Appendix-A---Security-Journals--Magazines--and-New_2019_Introduction-to-Secu
	Appendix A Security Journals, Magazines, and Newsletters
		United States
Appendix-B---World-Wide-Websites_2019_Introduction-to-Security
	Appendix B World Wide Websites
Appendix-C---Security-Surveys_2019_Introduction-to-Security
	Appendix C Security Surveys
Index_2019_Introduction-to-Security
	Index




نظرات کاربران