ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Introduction to security, ninth edition

دانلود کتاب مقدمه ای بر امنیت، چاپ نهم

Introduction to security, ninth edition

مشخصات کتاب

Introduction to security, ninth edition

ویرایش: 9th ed 
نویسندگان: , ,   
سری:  
ISBN (شابک) : 9780123850577, 9780123850584 
ناشر: Elsevier Science;Butterworth-Heinemann 
سال نشر: 2013;2012 
تعداد صفحات: 0 
زبان: English 
فرمت فایل : AZW3 (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 5 مگابایت 

قیمت کتاب (تومان) : 45,000



کلمات کلیدی مربوط به کتاب مقدمه ای بر امنیت، چاپ نهم: خدمات امنیتی خصوصی--مدیریت،صنایع--اقدامات امنیتی،تجارت خرده فروشی--اقدامات امنیتی،خدمات امنیتی خصوصی،کتابهای الکترونیکی،خدمات امنیتی خصوصی -- مدیریت،صنایع -- تدابیر امنیتی،تجارت خرده فروشی -- اقدامات امنیتی



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 14


در صورت تبدیل فایل کتاب Introduction to security, ninth edition به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مقدمه ای بر امنیت، چاپ نهم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Front-matter_2013_Introduction-to-Security
	Introduction to Security
Copyright_2013_Introduction-to-Security
	Copyright
Preface_2013_Introduction-to-Security
	Preface
Acknowledgments_2013_Introduction-to-Security
	Acknowledgments
		Chapter Acknowledgments
Part-1--Introduction_2013_Introduction-to-Security
	Part
1 Introduction
1---Origins-and-Development-of-21st-Century-Secu_2013_Introduction-to-Securi
	1 Origins and Development of 21st Century Security
		Introduction
		Security in England
			The 18th Century
			The Impact of Industrial Expansion
		Security in the United States
			Development of Private Security
		The Beginning of Modern Security
		Early Security Information Sharing
			The Costs
			Crime Trends and Security
		Growth of Private Security
			Growing Pains and Government Involvement
		Professionalism
		New Thinking
		Summary
		Review Questions
		References
2---Defining-Security-s-Role_2013_Introduction-to-Security
	2 Defining Security’s Role
		Introduction
		What Is Private Security?
			Protection of Life and Property
			Security Functions
		Security Services
			Contract versus Proprietary Services
			Advantages of Contract Services
				Cost
				Administration
				Staffing
				Unions
				Impartiality
				Expertise
			Advantages of Proprietary Officers
				Quality of Personnel
				Control
				Loyalty
				Prestige
			Deciding on a Contract Security Firm
		Hybrid Systems
			Engaged Liaison
			Support
			Reviews
			Measurement
		Private Security and Public Law Enforcement
			Complementary Roles
		Relationships after September 11, 2001
		Summary
		Review Questions
		References
3---Career-Opportunities-in-Loss-Prevention_2013_Introduction-to-Security
	3 Career Opportunities in Loss Prevention
		Introduction
		Key Factors Increasing Security Opportunities
		The Security/Loss-Prevention Occupation
			Security Manager
			Personal Security
			Brand Protection
			Private Investigators
			Consultants
			Opportunities in Sales
			Opportunities in Industry
			Opportunities in Retail
			Opportunities in Health Care
			Airport and Airline Security/Sky Marshals
			Hotel Security
			Campus Security
			Banking Security
			Security Services
			Guard Services
			Patrol Services
			Armored Delivery Services
			Locksmithing
			Alarm Response Services/Technology Experts
			Computer/Intellectual Property Security
			Government Service
			Other Services
		Summary
		Review Questions
		References
4---Security-Education--Training--Certification--an_2013_Introduction-to-Sec
	4 Security Education, Training, Certification, and Regulation
		Introduction
		Adequacy of Private Security Training
		Proposed Federal Regulation
		The Role of Higher Education
		Training
		Certification and Regulation
			Regulation
			Certification
		Magazines and Periodicals
		Summary
		Review Questions
		References
5---Homeland-Security--Security-Since-September-11--_2013_Introduction-to-Se
	5 Homeland Security: Security Since September 11, 2001 and Beyond
		Introduction
		Global Security
		Private Enterprise Response
			Transit Security
				Airport Security
				Bus Security
				Port/Shipping Security
				Rail Security
				Over-the-Road
			Electrical Grid Issues
			Nuclear Facilities
			Oil and Gas Facilities
			Water Utilities
			Retail
			City Centers
				Public Events and Cultural Centers
					Sports Arenas
					Conference Sites and Hotels
					Museums
			Construction Industry
			Agriculture
			Hospitals
		Federal Response in the United States
			Department of Homeland Security (DHS)
			Cyber Security and Computer Protection
			Comprehensive National Cyber Security Initiative
			The US-VISIT Program
			The Student and Exchange Visitor Information System (SEVIS)
			Federal Identification Cards
			Homeland Security Presidential Directive/Hspd-12 (HSPD-12)
			Total Information Awareness Program
			Federal Building Security Initiatives
			Protection of Chemical Manufacturing Sites
			Anti-Bioterrorism
		State/Local Response
			The Costs
			School Safety
			Emergency Response Plans
			Examples of Specific State Response
		Private/Public Joint Initiatives
		Concerns
		Review Questions
		References
Part-2--Basics-of-Defense_2013_Introduction-to-Security
	Part
2 Basics of Defense
6---Security-and-the-Law_2013_Introduction-to-Security
	6 Security and the Law
		Introduction
		Security, Public Police, and the U.S. Constitution
		Sources of Law
			Common Law
			Case Law
			Statutory Law
			The Power of Security Personnel
			Classes of Crimes
			Felonies and Misdemeanors
		Private Security Powers
			Arrest
			Detention
			Interrogation
			Search and Seizure
			Exclusionary Rule
			Use of Force
				Self-Defense
				Defense of Others
				Defense of Property
				Force Used during Arrest or Detention
				Prevention of Crimes
				Use of Firearms
		Civil Law: The Controller for Private Security
			Tort Law: Source of Power and Limits
			Negligence
			Intentional Torts
				Assault
				Battery
				False Imprisonment or False Arrest
				Defamation
				Malicious Prosecution
				Invasion of Privacy
				Trespass and Conversion
				Intentional Infliction of Mental Distress
		Security and Liability
		Duty to Protect from Third-Party Crime
			Nondelegable Duty
			Imputed Negligence
				Vicarious Liability
			Criminal Liability
		Recent Trends in Liability
		Recent Trends in Privacy
		New Laws
			Background Investigations
			Social Security Numbers
			Privacy of Medical Information
			Privacy of Financial Information
		The Courts
			The Procedure
		Development of Case Law
			Legal Research
				Reporters
				Case Reports
				Digests and Summaries
				Computer-Based Legal Sources
		Summary
		Review Questions
		References
7---Risk-Analysis--Security-Surveys-and-Insuran_2013_Introduction-to-Securit
	7 Risk Analysis, Security Surveys and Insurance
		Introduction
		Risk Management
			Asset Assessment
			Threat Assessment
			The Security Survey
			The Facility
			General Departmental Evaluations
				Human Resources Organization
				Accounting
				Information Systems
				Purchasing
				Shipping and Receiving
			Miscellaneous
			Report of the Survey
		Operational Audits and Programmed Supervision
			Probability
			Criticality
			The Probability/Criticality/Vulnerability Matrix
			Alternatives for Optimizing Risk Management
				The Cost-Effectiveness of Security
				Periodic Review
				Security Files
		Insurance
			The Value of Insurance as Part of a Total Loss Prevention Program
			Types of Insurance
				Fidelity Coverage
				Surety Coverage
				Federal Crime Insurance
				3-D Coverage
				Insurance against Loss of Use and Extra Expense Coverage
				Kidnap and Ransom Insurance
				Fire Insurance
				Business Property Insurance
				Liability Insurance
				Workers’ Compensation Insurance
				Portfolio Commercial Crime Coverage
				Cyber Liability Coverage
			Terrorism Risk Insurance Act of 2002
			How Much Insurance?
		Summary
		Review Questions
		References
8---Interior-and-Exterior-Security-Concerns_2013_Introduction-to-Security
	8 Interior and Exterior Security Concerns
		Introduction
		Buildings On or As the Perimeter
			Windows and Doors
				Windows
					Burglary-Resistant Glass
					“Smash and Grab” Attacks
					Screening
			Doors
				Door Construction and Hardware
			Locks and Keys
				Attacks against Locks
				Locks as Delaying Devices
				Latches and Bolts
				Keying Devices and Systems
				Removable Cores
				Keying Systems
				Rekeying
				Key Management
				Locking Schedules
				A Managed Key Program
				Other Operating Mechanisms for Access Control
				Locking Devices
			Roofs and Common Walls
		Surveillance Devices
		Old Construction
		New Construction
		Security at the Building Design Stage
		Security Principles in Design
		Summary
		Review Questions
		References
9---The-Outer-Defenses--Building-and-Perimeter-Pro_2013_Introduction-to-Secu
	9 The Outer Defenses
		Introduction
		Barriers, Fences, and Walls
			Barriers
			Fences
				Chain Link
				Barbed Wire
				Concertina Wire
			Walls
		Gates and Other Barrier Breaches
			Padlocking
			Personnel and Vehicle Gates
			Miscellaneous Openings
		Barrier Protection
			Clear Zone
			Inspection
			Hydraulic Defenses
			Fence Protection Devices
				Fluid Pressure
				Electromagnetic Cable
				Buried Cable Detection
				Fiber-optic Cable
				Capacitive Field Effect
				Active Infrared System (AIRS)
				External Microwave
				Taut Wire
				Vibration Sensors
		Inside the Perimeter
			Parking
			Surveillance
		Lighting
			Types of Lighting
				Incandescent
				Fluorescent
				Mercury Vapor Lamps
				Metal Halide
				Sodium Vapor Lights
				Quartz Lamps
				Light-Emitting Diodes (LEDs)
				Electroluminescent
			Types of Equipment
				Streetlights
				Floodlights
				Fresnel Lenses
				Searchlights
				Maintenance
				Perimeter Lighting
			Gates and Thoroughfares
			Other Areas
			General
		Planning Security
		Summary
		Review Questions
		References
10---The-Inner-Defenses--Intrusion-and-Access-Con_2013_Introduction-to-Secur
	10 The Inner Defenses
		Introduction
		Doors to Sensitive Areas
		Office Area Doors
		Traffic Patterns
		Traffic Control
			Visitors
		Employee Identification
			Pass Systems
			Package Control
		Files, Safes, and Vaults
			Files
			Safes
				Record Safes
				Money Safes
				Securing the Safe
			Vaults
			Container Protection
			Continuing Evaluation
		Inspections
			Guard Patrols
		Alarms
			Kinds of Alarm Protection
			Alarm Sensors
				Electromechanical Devices
				Pressure Devices
				Photoelectric Devices
				Motion Detection Alarms
				Capacitance Alarm Systems
				Sonic Alarm Systems
				Vibration Detectors
			Alarm Monitoring Systems
			Cost Considerations
		Summary
		Review Questions
		References
11---Contingency-Planning--Fire-Protection--Emergency_2013_Introduction-to-S
	11 Contingency Planning, Fire Protection, Emergency Response and Safety
		Introduction
		Contingency Planning
			Security and the Contingency Planning Process
			Contingency Planning Program
			Contingency Plans
		Emergency Response
		Crisis Management
		Business Continuity
		Business Recovery
		Business Resumption
		Pandemics
		Fire Prevention and Protection
			Security Personnel
			Vulnerability to Fire
			Fireload
			The Nature of Fire
			By-products of Fire
			Classes of Fire
			Extinguishers
			Fire Alarm Signaling Systems
				Sensors
				Signal Devices
				Automatic Sprinkler Systems
			Education in Fire Prevention and Safety
				Employees in Fire Fighting
				Evacuation
					Evacuating Industrial Facilities
					Evacuating High-Rise Buildings
					Planning and Training
		Safety and Loss Control
			OSHA Standards
			Setting Up the Safety Program
			Finding the Causes of Accidents
			Identification and Control of Hazards
			A Hazardous Materials Program
			Management Leadership
			Assignment of Responsibility
			Training
			Emergency Care
			Employee Awareness and Participation
		Summary
		Review Questions
		References
12---Internal-Theft-Controls-Personnel-Issues_2013_Introduction-to-Security
	12 Internal Theft Controls/Personnel Issues
		Introduction
		What Is Honesty?
		The Dishonest Employee
			The Fraud Triangle
			Danger Signs
			What Employees Steal
			Methods of Theft
			The Contagion of Theft
			Moral Obligation to Control Theft
		Program for Internal Security
			Need for Management Support
			Communicating the Program
			Continuing Supervision
			Program Changes
			Violations
			Personnel Policies for Internal Security
			Human Resources and the Screening Process
			Employment History and Reference Checking
			Backgrounding
			Integrity and Lie Detection Tests
			Americans with Disabilities Act
			Drug Screening
			Other Screening Options
			Hiring Ex-Convicts and Parolees
			Employee Assistance Programs
			Continuity of the Screening Program
		Procedural Controls
			Auditing Assets
			Separation of Responsibility
			Promotion and Rotation
			Computer Records/Electronic Mail and Funds Transfer/Fax
			Physical Security
				The Mailroom
				Trash Removal
		When Controls Fail
			Undercover Investigation
			Prosecution
			Discharging the Thief
			Borderline Cases
		Review Questions
		References
Part-3--Specific-Threats-and-Solutions_2013_Introduction-to-Security
	3 Specific Threats and Solutions
13---Transportation-Security-Issues-and-Regulati_2013_Introduction-to-Securi
	13 Transportation Security Issues and Regulation
		Introduction
		The Role of Private Security
		Accountability Procedures
			Invoice System
			Separation of Functions
			Driver Loading
			Theft and Pilferage
				Targets of Theft
				Pilferage
				Deterring Pilferage
				Large-Quantity Theft
				Removal of Goods
				Disposal of Stolen Goods
			Terminal Operations
			Surveillance
			A Total Program
		Planning for Security
			Controlled, Limited, and Exclusion Areas
			Pass Systems
			Vehicle Control
			Other Security Planning
			Security Surveys
			Inspections
			Education
		Cargo in Transit
			The Threat of Hijacking/Sabotage
			Global Positioning System (GPS)
			Personnel Qualifications
			Procedures on the Road
			Seals
				Resealing
				Seal Security
				Modern Technology and Seals
		Special Issues in Airline Security
			Increased Security Measures
			Specific Solutions for a Specific Problem
		Other Transportation Industry Responses to Terrorism
			Bus Transportation
			Maritime Operations
			Amtrak/Local Commuter Trains
			Oil and Gas
		Summary
		Review Questions
		References
14---Violence-and-Drug-Use-in-the-Workplace_2013_Introduction-to-Security
	14 Violence and Drug Use in the Workplace
		Introduction
			Threat
			Harassment
			Attack
			Sabotage
		Violence and the Workplace
			The Phenomenon of Workplace Violence
			The Work Environment and Violence
			Profiling Violent Behavior
			Basic Levels of Violence
			Preventing Workplace Violence
			The Violence Intervention and Contingency Team (VIACT)
				Pre-Violence Prevention Mission
				Post-Violence Mission
				Strategies for Dealing with Potential Violence
			Perpetrators’ Rights
			Intervention Strategy
				Intervention Education
				The Intervention
		Drugs in the Workplace
			Impact of Drug Use
				Theft
				Productivity, Quality Control, Accidents, and Injuries
				Absenteeism and Turnover Rates
				Personal Problems
			Using a Comprehensive Substance Abuse Program
			Drug Testing
				Preemployment Drug Testing
				Postemployment Drug Testing
				Types of Drug Tests
				Drug Testing Process
		Additional Methods
			Spotting Drug Use
				Marijuana
				Crack Cocaine
				Cocaine
				Other Methods
		Summary
		Review Questions
		References
15---Retail-Security_2013_Introduction-to-Security
	15 Retail Security
		Introduction
			Supply Chain
		Shoplifting
			Extent of Shoplifting
			Methods of Shoplifting
				Common Red Flags Displayed by Shoplifters
			Who Shoplifts
				Professionals
				Organized Retail Crime
				Opportunist
				Impoverished
				Substance Abuser
				Thrill Seeker
				Kleptomaniac
			Prevention and Response
			Detaining Shoplifters
				Common Associate Theft Justifications
		Internal Theft
			Prevention and Response
			Methods of Internal Theft
				Cash
				Fraudulent Refunds
				Fraudulent Voids
				Fraudulent Suspensions
				“Sweethearting”
				Theft from the Safe
				Controls to Reduce the Risk of Safe Theft
				Merchandise
			Investigations
		External Threats
			Burglary
			Robbery
			Checks and Credit/Debit Cards
			The Nature of the Check
			Checks and the Retailer
			Check and Credit/Debit Card Approval
			Credit and Debit Cards
			ID Equipment and Systems
			Store Policy
				Policy Components—The Three-legged Stool
		Policies, Procedures and Practices
			Training
			Auditing for Compliance
		Technology
			Point of Sale
			Exception-based Reporting (Software)
			Electronic Article Surveillance
			Alarm Systems
				Intrusion Detection Alarm (IDA)
				Duress Alarm
				Merchandise Alarm
				Exit Alarm
			Closed Circuit Television (CCTV) Systems
			Access Control
			Radio Frequency Identification (RFID)
		Summary
		Review Questions
		References
16---Terrorism--A-Global-Perspective_2013_Introduction-to-Security
	16 Terrorism
		Introduction
		Current Issues
		Historical Background
			Europe
			Marxism
			Russia
			Ireland
			Palestine
			Chechnya
			Terrorism in the 21st Century
				State Sponsors of Terrorism
		Implications of a Changing World
		In Search of a Definition for International Terrorism
			Political
			Criminal
			Militaristic
			The Physiological Approach
			Psychological Approach
			Group Behavior
			Multifactor Approach
		Terrorism as a Tactic, Instrument, or Method
		Characterizing Modern Terrorism
			Ideological Shift
			Organizational Shift
			Geographical Shift
			Tactical Shift
			Technological Shift
			Organized Crime Shift
			Characterizing International Terrorist Groups
				Seeking Political Gain
				Motivation
				Seeking Publicity
				Requiring Member Loyalty through Ideological, Religious, Ethnic, and Other Considerations
				Structure
				Tactical Diversity
				Assistance
				Organizational Maturity
				Violent Nature
				Weaponry
				Finance
			Reducing the Risk of Terrorism
		Specific Threats and Responses
			Executive Protection
			Bombs and Bomb Threats
			Telephone Operator’s Response
			Search Teams
			Evacuation
		Other Specific Response Issues in the United States
			Al-Qaeda
			Nuclear and Radiological Threats
			Bioterrorism
			Chemical Agents
			Cyber Terrorism
		The Future/Summary
		Review Questions
		References
17---Computer-Technology-and-Information-Security_2013_Introduction-to-Secur
	17 Computer Technology and Information Security Issues
		Introduction
		CSO, CISO and CIO Interactions
			IT and Security Cooperation
		Types of Computer Systems
			Microcomputers
				Personal Computers
				Workstations
			Minicomputers
			Mainframes
			Supercomputers
		Networks
			Local Area Networks
				Wireless LANs
				Wide Area Networks
				The Internet
		The Database Problems
			The Need for Computer Security
			Classic Methods for Committing Computer Crimes
				Data Manipulation or Theft
				Salami Technique
				Trojan Horse
				Viruses
				Worms
				Hostile Applets
				Bombs
				Trapdoors and Back Doors
				Time Stealing
				Electronic Eavesdropping
				Software Piracy
				Scavenging Memory
				War Driving
				Identity Theft
			Federal Computer Legislation
				Patriot Act
		Computer Systems Protection
			Disaster-Recovery Planning
				Contingency Procedures
				Hardware Backup
				Software and Information Backup
				Backup for Related and Special Activities
				Identification and Access Control of Software and Data
					What a Person Has
					What a Person Knows
					Who a Person Is
			Encryption
			Physical Security
				Electronic Data Processing (EDP) Centers
				Personal Computers
		Content Monitoring and Filtering
			Possible Security Solutions
			Network Security Policy (NSP)
			Appropriate Use Policy (AUP)
			Virus Scanning
			Email Filtering Software
			Web Monitoring Software
			Spam Filtering
			Computer Forensic Investigations
		Dealing with Identity Theft
			What to Do?
			Safeguarding Corporate Information
			Protecting Your Identity
			When You Are the Victim
			Education/Training
		Other Data Resource Vulnerabilities
		Summary
		Review Questions
		References
18---Selected-Security-Threats-of-the-21st-Centu_2013_Introduction-to-Securi
	18 Selected Security Threats of the 21st Century
		Introduction
		Economic/White-Collar Crime
			Definitions
			Impact
		Burglary and Robbery
			Burglary
			The Attack
			Merchandise as Target
			Cash as Target
			Physical Defense against Burglary
				Alarms
				Safes
				Basic Burglary Protection
			Robbery
				The Nature of Robbery
				Robbery Targets
				Cash Handling
				Cash-Room Protection
				Opening Routine
				Transporting Cash
				Closing Routine
				Other Routines
				Employee Training
				Robbery Prevention
		Labor Disputes
			Security’s Role
			Right to Picket
			Pre-strike Planning
			Law Enforcement Liaison
		Espionage
		Piracy
		Summary
		Review Questions
		References
19---Security--The-Future_2013_Introduction-to-Security
	19 Security: The Future
		Introduction
		The Aftermath of September 11, 2001
		Private Security Resources
		Interactions and Cooperation
		Limitations of Security
		Evolving Trends
			Convergence: Integration of Logical and Physical Security Technologies
		The Future
			Technology
			Leadership and Management
			The Challenge of Theft
			Education and Professionalization
			Pandemic Planning and Brand Protection Management
			Certification and Standards
		Summary
		Review Questions
		References
Appendix-A---Security-Journals--Magazines--and-New_2013_Introduction-to-Secu
	Security Journals, Magazines, and Newsletters
		United States
Appendix-B---World-Wide-Web-Sites_2013_Introduction-to-Security
	World Wide Web Sites
Appendix-C---Security-Surveys_2013_Introduction-to-Security
	Security Surveys
No-title-available_2013_Introduction-to-Security
	Index




نظرات کاربران