دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 9th ed نویسندگان: Halibozek. Edward P., Walters. David, Fischer. Robert J سری: ISBN (شابک) : 9780123850577, 9780123850584 ناشر: Elsevier Science;Butterworth-Heinemann سال نشر: 2013;2012 تعداد صفحات: 0 زبان: English فرمت فایل : AZW3 (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 5 مگابایت
کلمات کلیدی مربوط به کتاب مقدمه ای بر امنیت، چاپ نهم: خدمات امنیتی خصوصی--مدیریت،صنایع--اقدامات امنیتی،تجارت خرده فروشی--اقدامات امنیتی،خدمات امنیتی خصوصی،کتابهای الکترونیکی،خدمات امنیتی خصوصی -- مدیریت،صنایع -- تدابیر امنیتی،تجارت خرده فروشی -- اقدامات امنیتی
در صورت تبدیل فایل کتاب Introduction to security, ninth edition به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مقدمه ای بر امنیت، چاپ نهم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Front-matter_2013_Introduction-to-Security Introduction to Security Copyright_2013_Introduction-to-Security Copyright Preface_2013_Introduction-to-Security Preface Acknowledgments_2013_Introduction-to-Security Acknowledgments Chapter Acknowledgments Part-1--Introduction_2013_Introduction-to-Security Part 1 Introduction 1---Origins-and-Development-of-21st-Century-Secu_2013_Introduction-to-Securi 1 Origins and Development of 21st Century Security Introduction Security in England The 18th Century The Impact of Industrial Expansion Security in the United States Development of Private Security The Beginning of Modern Security Early Security Information Sharing The Costs Crime Trends and Security Growth of Private Security Growing Pains and Government Involvement Professionalism New Thinking Summary Review Questions References 2---Defining-Security-s-Role_2013_Introduction-to-Security 2 Defining Security’s Role Introduction What Is Private Security? Protection of Life and Property Security Functions Security Services Contract versus Proprietary Services Advantages of Contract Services Cost Administration Staffing Unions Impartiality Expertise Advantages of Proprietary Officers Quality of Personnel Control Loyalty Prestige Deciding on a Contract Security Firm Hybrid Systems Engaged Liaison Support Reviews Measurement Private Security and Public Law Enforcement Complementary Roles Relationships after September 11, 2001 Summary Review Questions References 3---Career-Opportunities-in-Loss-Prevention_2013_Introduction-to-Security 3 Career Opportunities in Loss Prevention Introduction Key Factors Increasing Security Opportunities The Security/Loss-Prevention Occupation Security Manager Personal Security Brand Protection Private Investigators Consultants Opportunities in Sales Opportunities in Industry Opportunities in Retail Opportunities in Health Care Airport and Airline Security/Sky Marshals Hotel Security Campus Security Banking Security Security Services Guard Services Patrol Services Armored Delivery Services Locksmithing Alarm Response Services/Technology Experts Computer/Intellectual Property Security Government Service Other Services Summary Review Questions References 4---Security-Education--Training--Certification--an_2013_Introduction-to-Sec 4 Security Education, Training, Certification, and Regulation Introduction Adequacy of Private Security Training Proposed Federal Regulation The Role of Higher Education Training Certification and Regulation Regulation Certification Magazines and Periodicals Summary Review Questions References 5---Homeland-Security--Security-Since-September-11--_2013_Introduction-to-Se 5 Homeland Security: Security Since September 11, 2001 and Beyond Introduction Global Security Private Enterprise Response Transit Security Airport Security Bus Security Port/Shipping Security Rail Security Over-the-Road Electrical Grid Issues Nuclear Facilities Oil and Gas Facilities Water Utilities Retail City Centers Public Events and Cultural Centers Sports Arenas Conference Sites and Hotels Museums Construction Industry Agriculture Hospitals Federal Response in the United States Department of Homeland Security (DHS) Cyber Security and Computer Protection Comprehensive National Cyber Security Initiative The US-VISIT Program The Student and Exchange Visitor Information System (SEVIS) Federal Identification Cards Homeland Security Presidential Directive/Hspd-12 (HSPD-12) Total Information Awareness Program Federal Building Security Initiatives Protection of Chemical Manufacturing Sites Anti-Bioterrorism State/Local Response The Costs School Safety Emergency Response Plans Examples of Specific State Response Private/Public Joint Initiatives Concerns Review Questions References Part-2--Basics-of-Defense_2013_Introduction-to-Security Part 2 Basics of Defense 6---Security-and-the-Law_2013_Introduction-to-Security 6 Security and the Law Introduction Security, Public Police, and the U.S. Constitution Sources of Law Common Law Case Law Statutory Law The Power of Security Personnel Classes of Crimes Felonies and Misdemeanors Private Security Powers Arrest Detention Interrogation Search and Seizure Exclusionary Rule Use of Force Self-Defense Defense of Others Defense of Property Force Used during Arrest or Detention Prevention of Crimes Use of Firearms Civil Law: The Controller for Private Security Tort Law: Source of Power and Limits Negligence Intentional Torts Assault Battery False Imprisonment or False Arrest Defamation Malicious Prosecution Invasion of Privacy Trespass and Conversion Intentional Infliction of Mental Distress Security and Liability Duty to Protect from Third-Party Crime Nondelegable Duty Imputed Negligence Vicarious Liability Criminal Liability Recent Trends in Liability Recent Trends in Privacy New Laws Background Investigations Social Security Numbers Privacy of Medical Information Privacy of Financial Information The Courts The Procedure Development of Case Law Legal Research Reporters Case Reports Digests and Summaries Computer-Based Legal Sources Summary Review Questions References 7---Risk-Analysis--Security-Surveys-and-Insuran_2013_Introduction-to-Securit 7 Risk Analysis, Security Surveys and Insurance Introduction Risk Management Asset Assessment Threat Assessment The Security Survey The Facility General Departmental Evaluations Human Resources Organization Accounting Information Systems Purchasing Shipping and Receiving Miscellaneous Report of the Survey Operational Audits and Programmed Supervision Probability Criticality The Probability/Criticality/Vulnerability Matrix Alternatives for Optimizing Risk Management The Cost-Effectiveness of Security Periodic Review Security Files Insurance The Value of Insurance as Part of a Total Loss Prevention Program Types of Insurance Fidelity Coverage Surety Coverage Federal Crime Insurance 3-D Coverage Insurance against Loss of Use and Extra Expense Coverage Kidnap and Ransom Insurance Fire Insurance Business Property Insurance Liability Insurance Workers’ Compensation Insurance Portfolio Commercial Crime Coverage Cyber Liability Coverage Terrorism Risk Insurance Act of 2002 How Much Insurance? Summary Review Questions References 8---Interior-and-Exterior-Security-Concerns_2013_Introduction-to-Security 8 Interior and Exterior Security Concerns Introduction Buildings On or As the Perimeter Windows and Doors Windows Burglary-Resistant Glass “Smash and Grab” Attacks Screening Doors Door Construction and Hardware Locks and Keys Attacks against Locks Locks as Delaying Devices Latches and Bolts Keying Devices and Systems Removable Cores Keying Systems Rekeying Key Management Locking Schedules A Managed Key Program Other Operating Mechanisms for Access Control Locking Devices Roofs and Common Walls Surveillance Devices Old Construction New Construction Security at the Building Design Stage Security Principles in Design Summary Review Questions References 9---The-Outer-Defenses--Building-and-Perimeter-Pro_2013_Introduction-to-Secu 9 The Outer Defenses Introduction Barriers, Fences, and Walls Barriers Fences Chain Link Barbed Wire Concertina Wire Walls Gates and Other Barrier Breaches Padlocking Personnel and Vehicle Gates Miscellaneous Openings Barrier Protection Clear Zone Inspection Hydraulic Defenses Fence Protection Devices Fluid Pressure Electromagnetic Cable Buried Cable Detection Fiber-optic Cable Capacitive Field Effect Active Infrared System (AIRS) External Microwave Taut Wire Vibration Sensors Inside the Perimeter Parking Surveillance Lighting Types of Lighting Incandescent Fluorescent Mercury Vapor Lamps Metal Halide Sodium Vapor Lights Quartz Lamps Light-Emitting Diodes (LEDs) Electroluminescent Types of Equipment Streetlights Floodlights Fresnel Lenses Searchlights Maintenance Perimeter Lighting Gates and Thoroughfares Other Areas General Planning Security Summary Review Questions References 10---The-Inner-Defenses--Intrusion-and-Access-Con_2013_Introduction-to-Secur 10 The Inner Defenses Introduction Doors to Sensitive Areas Office Area Doors Traffic Patterns Traffic Control Visitors Employee Identification Pass Systems Package Control Files, Safes, and Vaults Files Safes Record Safes Money Safes Securing the Safe Vaults Container Protection Continuing Evaluation Inspections Guard Patrols Alarms Kinds of Alarm Protection Alarm Sensors Electromechanical Devices Pressure Devices Photoelectric Devices Motion Detection Alarms Capacitance Alarm Systems Sonic Alarm Systems Vibration Detectors Alarm Monitoring Systems Cost Considerations Summary Review Questions References 11---Contingency-Planning--Fire-Protection--Emergency_2013_Introduction-to-S 11 Contingency Planning, Fire Protection, Emergency Response and Safety Introduction Contingency Planning Security and the Contingency Planning Process Contingency Planning Program Contingency Plans Emergency Response Crisis Management Business Continuity Business Recovery Business Resumption Pandemics Fire Prevention and Protection Security Personnel Vulnerability to Fire Fireload The Nature of Fire By-products of Fire Classes of Fire Extinguishers Fire Alarm Signaling Systems Sensors Signal Devices Automatic Sprinkler Systems Education in Fire Prevention and Safety Employees in Fire Fighting Evacuation Evacuating Industrial Facilities Evacuating High-Rise Buildings Planning and Training Safety and Loss Control OSHA Standards Setting Up the Safety Program Finding the Causes of Accidents Identification and Control of Hazards A Hazardous Materials Program Management Leadership Assignment of Responsibility Training Emergency Care Employee Awareness and Participation Summary Review Questions References 12---Internal-Theft-Controls-Personnel-Issues_2013_Introduction-to-Security 12 Internal Theft Controls/Personnel Issues Introduction What Is Honesty? The Dishonest Employee The Fraud Triangle Danger Signs What Employees Steal Methods of Theft The Contagion of Theft Moral Obligation to Control Theft Program for Internal Security Need for Management Support Communicating the Program Continuing Supervision Program Changes Violations Personnel Policies for Internal Security Human Resources and the Screening Process Employment History and Reference Checking Backgrounding Integrity and Lie Detection Tests Americans with Disabilities Act Drug Screening Other Screening Options Hiring Ex-Convicts and Parolees Employee Assistance Programs Continuity of the Screening Program Procedural Controls Auditing Assets Separation of Responsibility Promotion and Rotation Computer Records/Electronic Mail and Funds Transfer/Fax Physical Security The Mailroom Trash Removal When Controls Fail Undercover Investigation Prosecution Discharging the Thief Borderline Cases Review Questions References Part-3--Specific-Threats-and-Solutions_2013_Introduction-to-Security 3 Specific Threats and Solutions 13---Transportation-Security-Issues-and-Regulati_2013_Introduction-to-Securi 13 Transportation Security Issues and Regulation Introduction The Role of Private Security Accountability Procedures Invoice System Separation of Functions Driver Loading Theft and Pilferage Targets of Theft Pilferage Deterring Pilferage Large-Quantity Theft Removal of Goods Disposal of Stolen Goods Terminal Operations Surveillance A Total Program Planning for Security Controlled, Limited, and Exclusion Areas Pass Systems Vehicle Control Other Security Planning Security Surveys Inspections Education Cargo in Transit The Threat of Hijacking/Sabotage Global Positioning System (GPS) Personnel Qualifications Procedures on the Road Seals Resealing Seal Security Modern Technology and Seals Special Issues in Airline Security Increased Security Measures Specific Solutions for a Specific Problem Other Transportation Industry Responses to Terrorism Bus Transportation Maritime Operations Amtrak/Local Commuter Trains Oil and Gas Summary Review Questions References 14---Violence-and-Drug-Use-in-the-Workplace_2013_Introduction-to-Security 14 Violence and Drug Use in the Workplace Introduction Threat Harassment Attack Sabotage Violence and the Workplace The Phenomenon of Workplace Violence The Work Environment and Violence Profiling Violent Behavior Basic Levels of Violence Preventing Workplace Violence The Violence Intervention and Contingency Team (VIACT) Pre-Violence Prevention Mission Post-Violence Mission Strategies for Dealing with Potential Violence Perpetrators’ Rights Intervention Strategy Intervention Education The Intervention Drugs in the Workplace Impact of Drug Use Theft Productivity, Quality Control, Accidents, and Injuries Absenteeism and Turnover Rates Personal Problems Using a Comprehensive Substance Abuse Program Drug Testing Preemployment Drug Testing Postemployment Drug Testing Types of Drug Tests Drug Testing Process Additional Methods Spotting Drug Use Marijuana Crack Cocaine Cocaine Other Methods Summary Review Questions References 15---Retail-Security_2013_Introduction-to-Security 15 Retail Security Introduction Supply Chain Shoplifting Extent of Shoplifting Methods of Shoplifting Common Red Flags Displayed by Shoplifters Who Shoplifts Professionals Organized Retail Crime Opportunist Impoverished Substance Abuser Thrill Seeker Kleptomaniac Prevention and Response Detaining Shoplifters Common Associate Theft Justifications Internal Theft Prevention and Response Methods of Internal Theft Cash Fraudulent Refunds Fraudulent Voids Fraudulent Suspensions “Sweethearting” Theft from the Safe Controls to Reduce the Risk of Safe Theft Merchandise Investigations External Threats Burglary Robbery Checks and Credit/Debit Cards The Nature of the Check Checks and the Retailer Check and Credit/Debit Card Approval Credit and Debit Cards ID Equipment and Systems Store Policy Policy Components—The Three-legged Stool Policies, Procedures and Practices Training Auditing for Compliance Technology Point of Sale Exception-based Reporting (Software) Electronic Article Surveillance Alarm Systems Intrusion Detection Alarm (IDA) Duress Alarm Merchandise Alarm Exit Alarm Closed Circuit Television (CCTV) Systems Access Control Radio Frequency Identification (RFID) Summary Review Questions References 16---Terrorism--A-Global-Perspective_2013_Introduction-to-Security 16 Terrorism Introduction Current Issues Historical Background Europe Marxism Russia Ireland Palestine Chechnya Terrorism in the 21st Century State Sponsors of Terrorism Implications of a Changing World In Search of a Definition for International Terrorism Political Criminal Militaristic The Physiological Approach Psychological Approach Group Behavior Multifactor Approach Terrorism as a Tactic, Instrument, or Method Characterizing Modern Terrorism Ideological Shift Organizational Shift Geographical Shift Tactical Shift Technological Shift Organized Crime Shift Characterizing International Terrorist Groups Seeking Political Gain Motivation Seeking Publicity Requiring Member Loyalty through Ideological, Religious, Ethnic, and Other Considerations Structure Tactical Diversity Assistance Organizational Maturity Violent Nature Weaponry Finance Reducing the Risk of Terrorism Specific Threats and Responses Executive Protection Bombs and Bomb Threats Telephone Operator’s Response Search Teams Evacuation Other Specific Response Issues in the United States Al-Qaeda Nuclear and Radiological Threats Bioterrorism Chemical Agents Cyber Terrorism The Future/Summary Review Questions References 17---Computer-Technology-and-Information-Security_2013_Introduction-to-Secur 17 Computer Technology and Information Security Issues Introduction CSO, CISO and CIO Interactions IT and Security Cooperation Types of Computer Systems Microcomputers Personal Computers Workstations Minicomputers Mainframes Supercomputers Networks Local Area Networks Wireless LANs Wide Area Networks The Internet The Database Problems The Need for Computer Security Classic Methods for Committing Computer Crimes Data Manipulation or Theft Salami Technique Trojan Horse Viruses Worms Hostile Applets Bombs Trapdoors and Back Doors Time Stealing Electronic Eavesdropping Software Piracy Scavenging Memory War Driving Identity Theft Federal Computer Legislation Patriot Act Computer Systems Protection Disaster-Recovery Planning Contingency Procedures Hardware Backup Software and Information Backup Backup for Related and Special Activities Identification and Access Control of Software and Data What a Person Has What a Person Knows Who a Person Is Encryption Physical Security Electronic Data Processing (EDP) Centers Personal Computers Content Monitoring and Filtering Possible Security Solutions Network Security Policy (NSP) Appropriate Use Policy (AUP) Virus Scanning Email Filtering Software Web Monitoring Software Spam Filtering Computer Forensic Investigations Dealing with Identity Theft What to Do? Safeguarding Corporate Information Protecting Your Identity When You Are the Victim Education/Training Other Data Resource Vulnerabilities Summary Review Questions References 18---Selected-Security-Threats-of-the-21st-Centu_2013_Introduction-to-Securi 18 Selected Security Threats of the 21st Century Introduction Economic/White-Collar Crime Definitions Impact Burglary and Robbery Burglary The Attack Merchandise as Target Cash as Target Physical Defense against Burglary Alarms Safes Basic Burglary Protection Robbery The Nature of Robbery Robbery Targets Cash Handling Cash-Room Protection Opening Routine Transporting Cash Closing Routine Other Routines Employee Training Robbery Prevention Labor Disputes Security’s Role Right to Picket Pre-strike Planning Law Enforcement Liaison Espionage Piracy Summary Review Questions References 19---Security--The-Future_2013_Introduction-to-Security 19 Security: The Future Introduction The Aftermath of September 11, 2001 Private Security Resources Interactions and Cooperation Limitations of Security Evolving Trends Convergence: Integration of Logical and Physical Security Technologies The Future Technology Leadership and Management The Challenge of Theft Education and Professionalization Pandemic Planning and Brand Protection Management Certification and Standards Summary Review Questions References Appendix-A---Security-Journals--Magazines--and-New_2013_Introduction-to-Secu Security Journals, Magazines, and Newsletters United States Appendix-B---World-Wide-Web-Sites_2013_Introduction-to-Security World Wide Web Sites Appendix-C---Security-Surveys_2013_Introduction-to-Security Security Surveys No-title-available_2013_Introduction-to-Security Index