دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 7
نویسندگان: Philip P. Purpura
سری:
ISBN (شابک) : 9780128117958
ناشر: Butterworth-Heinemann
سال نشر: 2019
تعداد صفحات: 742
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 27 مگابایت
در صورت تبدیل فایل کتاب Security and Loss Prevention به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب امنیت و پیشگیری از ضرر نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
امنیت و پیشگیری از ضرر: مقدمه، ویرایش هفتم، اطلاعات مقدماتی و پیشرفته ای را در مورد حرفه امنیت ارائه می دهد. متخصص امنیت، فیل پورپورا، CPP، شامل به روز رسانی در مورد تحقیقات امنیتی، روش ها، استراتژی ها، فن آوری ها، قوانین، مسائل، آمار و گزینه های شغلی، ارائه یک کتاب جامع و میان رشته ای است که از زمینه های مطالعاتی بسیاری برای مفاهیم، استراتژی های حفاظت و تحقیق استفاده می کند. . این کتاب چالش های دنیای واقعی را که متخصصان امنیتی با آن مواجه هستند توضیح می دهد و گزینه هایی را برای راه حل های برنامه ریزی ارائه می دهد. این کتاب که امنیت فیزیکی را با امنیت فناوری اطلاعات مرتبط می کند، تهدیدات داخلی و خارجی برای افراد و دارایی ها و پاسخ ها و مسائل بخش خصوصی و دولتی را پوشش می دهد. مانند نسخههای قبلی، این کتاب دارای سبک تعاملی است که شامل مثالها، تصاویر، سؤالات نوار کناری، موضوعات جعبهای، دیدگاههای بینالمللی و تمرینهای وب است. علاوه بر این، مدرسان دوره میتوانند موارد جانبی را دانلود کنند، از جمله کتابچه راهنمای مربی با طرحهای فصلها، موضوعات بحث/پروژههای ویژه، سؤالات مقاله، و یک بانک آزمون و ارائه پاورپوینت برای هر فصل.
Security and Loss Prevention: An Introduction, Seventh Edition, provides introductory and advanced information on the security profession. Security expert, Phil Purpura, CPP, includes updates on security research, methods, strategies, technologies, laws, issues, statistics and career options, providing a comprehensive and interdisciplinary book that draws on many fields of study for concepts, strategies of protection and research. The book explains the real-world challenges facing security professionals and offers options for planning solutions. Linking physical security with IT security, the book covers internal and external threats to people and assets and private and public sector responses and issues. As in previous editions, the book maintains an interactive style that includes examples, illustrations, sidebar questions, boxed topics, international perspectives and web exercises. In addition, course instructors can download ancillaries, including an instructor's manual with outlines of chapters, discussion topics/special projects, essay questions, and a test bank and PowerPoint presentation for each chapter.
Front-Matter_2019_Security-and-Loss-Prevention Security and Loss Prevention Copyright_2019_Security-and-Loss-Prevention Copyright Dedication_2019_Security-and-Loss-Prevention Dedication About-the-Author_2019_Security-and-Loss-Prevention About the Author Preface_2019_Security-and-Loss-Prevention Preface Acknowledgments_2019_Security-and-Loss-Prevention Acknowledgments Disclaimer_2019_Security-and-Loss-Prevention Disclaimer 1---The-History-of-Security-and-Loss-Prevention--A-_2019_Security-and-Loss-P 1. The History of Security and Loss Prevention: A Critical Perspective Key Terms Why Critical Thinking? How Can We Think Critically? Why Think Critically About the History of Security and Loss Prevention? Security and Loss Prevention Defined History Early Civilizations Ancient Greece Ancient Rome The Middle Ages in Europe More Contemporary Times England Peel's Reforms Early America The Growth of Policing The Growth of Security Companies Railroads and Labor Unions The Great Wars The Third Wave Twenty-First Century/Post-9/11 Security Challenges Case Problems References 2---The-Business--Careers--and-Challenges-of-Securi_2019_Security-and-Loss-P 2. The Business, Careers, and Challenges of Security and Loss Prevention Key Terms The Security Industry Contract Versus Proprietary Security Privatization Careers: Security and Loss Prevention Services and Specialists Occupational Outlook Challenges: Risks, Threats, and Hazards Data Analytics and Metrics Internal Metrics Why Emphasize Both Direct and Indirect Losses? External Metrics Crimes Fires Accidents Disasters Limitations of the Criminal Justice System: Implications for Loss Prevention Practitioners Challenges of the Security Industry Cooperation Between Public Police and Private Security Regulation of the Industry The Need for Training Ethics The False Alarm Problem Case Problems References 3---Foundations-of-Security-and-Loss-Prevent_2019_Security-and-Loss-Preventi 3. Foundations of Security and Loss Prevention Key Terms The Security and Loss Prevention Profession Academic Programs Security Associations Periodicals Theoretical Foundations Rational Choice Theory Routine Activity Theory Situational Crime Prevention Methods for Protection Programs Business Concepts Planning and Budgeting Risk Analysis Conduct a Loss Prevention Survey Identify Vulnerabilities Determine Probability, Frequency, and Cost Annual Loss Exposure Input for Planning and Budgeting Planning From a Systems Perspective Standards and Regulations Standards Regulations Standards-Setting Organizations Research and Evaluation of Loss Prevention Programs Scientific Method Sources of Research Assistance Security Management Basics of Organization: The Vocabulary Case Problems References 4---Law_2019_Security-and-Loss-Prevention 4. Law Key Terms Introduction Judicial System of the United States State Court Systems Federal Court System Origins of Law Tort Law and Controls Over Private Security Legal Theory of Premises Security Claims Contract Law Civil Justice Procedures Administrative Law Inspections and Searches Labor Law Criminal Justice Procedures Arrest Law Use of Force Searches Questioning Case Problems The Decision for “You Be the Judge” References 5---Internal-and-External-Relations_2019_Security-and-Loss-Prevention 5. Internal and External Relations Key Terms Internal and External Relations Benefits of Positive Relations Internal Relations Customer-Driven Security and Loss Prevention Marketing Human Relations on the Job Management Support Orientation and Training Programs Involvement Programs Loss Prevention Meetings Intranet and E-Mail External Relations Law Enforcement Public Safety Agencies The Community The Media External Loss Prevention Peers Special Topics Social Media Prosecution Decisions Loss Prevention Attire Case Problems References 6---Applicant-Screening-and-Employee-Socializ_2019_Security-and-Loss-Prevent 6. Applicant Screening and Employee Socialization Key Terms Introduction Employment Law Federal Legislation US Supreme Court Decisions Equal Employment Opportunity Commission Equal Employment Opportunity, Affirmative Action, and Quotas Diversity Sexual Harassment Social Media and Sexual Harassment Screening Methods Resumes and Applications Interview Tests Background Investigations Employee Socialization Employee Training Planning Training Step 1: Training Needs Step 2: Budget Step 3: Behavioral Objectives Step 4: Training Program Outline Step 5: Learning Medium Step 6: Evaluation, Feedback, and Revision Learning Principles Bloom's Revised Taxonomy of Educational Objectives Wasted Training Examples Set by Superiors Employee Needs Case Problems The Decision for “You Be the Judge” Comment References 7---Internal-Threats-and-Countermeasures_2019_Security-and-Loss-Prevention 7. Internal Threats and Countermeasures Key Terms Introduction Internal Theft How Serious Is the Problem? Why Do Employees Commit Theft? How Do Employees Commit Theft? Possible Indicators of Theft Management Countermeasures Loss Reporting and Reward System Signs Protecting Assets, Methods of Theft Detection Investigations Insurance, Bonding Confronting an Employee Suspect Physical Security Countermeasures Security for Security Integration and Convergence Cloud-Based Services Access Controls Controlling Employee Traffic Searching Employees Visitors Employee Identification System Automatic Access Control Biometric Technologies Locks and Keys Types of Locks Master Key Systems Key Control Entrances for Persons With a Disability Attacks and Hardware Intrusion Detection Systems Interior Sensors Trends Video Surveillance Systems Security Officers Safes, Vaults, and File Cabinets Safes Attacks Vaults File Cabinets Case Problems References 8---External-Threats-and-Countermeasures_2019_Security-and-Loss-Prevention 8. External Threats and Countermeasures Key Terms Introduction Methods of Unauthorized Entry Countermeasures Environmental Security Design Sustainability and Green Security Perimeter Security Drones Barriers Protecting Buildings Against Terrorism Mitigation for Explosive Blasts Glazing Window Protection Window Locks Electronic Protection for Windows Doors Perimeter Intrusion Detection Systems Applications Alarm Signaling Systems Video Surveillance Lighting Illumination Lamps Light-Emitting Diode Lamps Lighting Trends and Applications Parking Sites and Vehicle Controls Security Officers Armed Versus Unarmed Security Officers Monitoring Officers Contraband Detection Protective Dogs Communications and the Operations Control Center Case Problems References 9---Services-and-Systems--Methods-for-Wise-Purcha_2019_Security-and-Loss-Pre 9. Services and Systems: Methods for Wise Purchasing Decisions Key Terms Introduction Pitfalls and Advice When Purchasing Security Services and Systems Purchasing Security Services Questions When Considering Contract Security Officers Contract Undercover Investigations Consultants Certifications in Security Purchasing Security Systems Questions When Considering a Security System System Acquisition Outsourcing Case Problem The Decision for “You Be the Judge” References 10---Investigations_2019_Security-and-Loss-Prevention 10. Investigations Key Terms Introduction Types of Investigations Proprietary and Contract Investigations Private and Public Investigations Overt and Undercover Private Investigations Important Considerations Law Evidence Law Interviewing and Interrogation Information Sources Legal Restrictions When Collecting Information Investigative Leads Scene of the Loss Victims and Witnesses Informants Modus Operandi Computers and Software Forensic Analysis Digital Investigations and Evidence Surveillance Information Accuracy Report Writing Testimony Case Problems References 11---Accounting--Accountability--and-Auditin_2019_Security-and-Loss-Preventi 11. Accounting, Accountability, and Auditing Key Terms Introduction Accounting Accountability Purchasing Inventory Auditing Internal Control Questionnaire Fraud Sarbanes–Oxley Act of 2002 Fraud Investigations Governance, Risk Management, and Compliance Case Problems References 12---Resilience--Risk-Management--Business-Continuit_2019_Security-and-Loss- 12. Resilience, Risk Management, Business Continuity, and Emergency Management Key Terms Introduction Resilience: A Critical Thinking Perspective Risk Management The Role of the Risk Manager The Risk Management Process Risk Modeling and Simulation Risk Management Tools Enterprise Risk Management and Enterprise Security Risk Management Insurance Types of Insurance Crime Insurance and Bonds Fidelity Bond Surety Bond Burglary, Robbery, and Theft Insurance Terrorism, Workplace Violence, and Insurance Kidnapping Insurance Cyber Insurance Fire Insurance Property and Liability Insurance Business Property Insurance Liability Insurance Workers' Compensation Insurance Claims Proof of Loss Business Continuity Guidance for Business Continuity Planning and Private Sector Preparedness Emergency Management Risk Management in Government All-Hazards Preparedness Concept The History of Emergency Management Emergency Management Operations Prevention Mitigation Preparedness Response Recovery Communications The Military Case Problems The Decision for “You Be the Judge #1” The Decision for “You Be the Judge #2” References 13---Life-Safety--Fire-Protection--and-Emerge_2019_Security-and-Loss-Prevent 13. Life Safety, Fire Protection, and Emergencies Key Terms Life Safety Standards, Regulations, and Codes Occupational Safety and Health Administration Regulations NFPA 101 Life Safety Code Building Design and Building Codes Fire Protection The Fire Problem Private Organizations Involved in Fire Protection Fire Departments Fire Department Protection Efforts Facility Planning Prefire Planning Public Education Codes Inspections by Firefighting Personnel Legal Implications Fire Prevention and Fire Suppression in the Private Sector Fire Prevention Strategies Inspections by the Private Sector Planning Safety Hazardous Materials (Hazmat) Incidents Fire Suppression Strategies Integrated Systems Detection of Smoke and Fire Classes of Fires and Portable Extinguishers Sprinklers Standpipe and Hose Systems Fire Walls and Doors Stairwells Access Control Fire-Resistive Buildings Training and Fire Brigades Public Safety Agencies Police Emergency Medical Services Emergencies Critical Incident Management Human-Made Emergencies Accidents Technological Disasters Bomb Threats and Explosions Weapon of Mass Destruction Civil Disturbances Strikes Natural Disasters Windstorms Floods Blizzards Earthquakes Pandemics Case Problems References 14---Safety-in-the-Workplace_2019_Security-and-Loss-Prevention 14. Safety in the Workplace Key Terms Introduction Accident Statistics and Costs History of Safety Legislation Workers' Compensation The Development of OSHA Occupational Safety and Health Administration The Act's Jurisdiction OSHA Standards OSHA Hazard Communication Standard OSHA HAZWOPER Standard OSHA Bloodborne Pathogens Standard OSHA Standard for the Control of Hazardous Energy (Lockout/Tagout) OSHA Recordkeeping and Reporting Additional Employer Responsibilities OSHA Inspections OSHA: Criticism and Controversy Safety Strategies Assistance With Problems Safety and Health Committee Socialization and Incentive Programs Additional Safety Measures Investigations Accident Causation Case Problems References 15---Terrorism-and-Homeland-Security_2019_Security-and-Loss-Prevention 15. Terrorism and Homeland Security Key Terms Terrorism Defined History Religion and Politics The Measurement of Terrorism Causes of Terrorism Globalization Social Science Explanations Psychological Causes of Terrorism Rational Choice Causes of Terrorism Structural Causes of Terrorism International Terrorism ISIS Versus al-Qaida Domestic Terrorism Religious Extremists Racial Supremacy Ecoterrorists/Anarchists Leftist Class Struggles State-Sponsored Lone Wolf and Homegrown Terrorists Terrorist Methods Terrorist Violence Terrorist Weapons Bombs Suicide Bombers Other Weapons Weapons of Mass Destruction Chemical Weapons Biological Weapons Radiological Weapons Nuclear Weapons Homeland Security The Evolution of Homeland Security National Strategy for Counterterrorism and Homeland Security Presidential Directives Legislation Methods to Counter Terrorism National Security and Homeland Security Intelligence and Counterintelligence Responses to Weapons of Mass Destruction Chemical Attack Steps for First Responders Biological Attack Radiation Attack Nuclear Attack State and Local Governments Private Sector Public–Private Sector Partnerships The Homeland Security Market Business Countermeasures Against Terrorism Citizen Volunteers Case Problems References 16---Critical-Infrastructure-Protection-and-Cyb_2019_Security-and-Loss-Preve 16. Critical Infrastructure Protection and Cybersecurity Key Terms Critical Infrastructure The Foundations of Critical Infrastructure Protection CI Sectors The Private Sector Sharing Information on Critical Infrastructure Information Technology Information Technology Challenges Cybercrime Attack Methods Cybersecurity Cybersecurity of CI and the IoT Is Different From Protecting Data Artificial Intelligence Cyber Defense Versus Cyber Offense Cloud Computing Encryption Critical Infrastructure Sectors Agriculture and Food Water Energy Electricity Oil and Natural Gas Dams Nuclear Power Plants Chemical Industry Communications Defense Industry Base Critical Manufacturing Government Facilities Transportation Sectors Aviation Maritime Mass Transit and Passenger Rail Highway Infrastructure and Motor Carrier Freight Rail Pipelines Postal and Shipping National Monuments and Icons Border and Transportation Security Federal Government Agencies With Roles in Border and Transportation Security US Customs and Border Protection US Immigration and Customs Enforcement US Citizenship and Immigration Services Case Problems References 17---Protecting-Commercial-and-Institutional-Criti_2019_Security-and-Loss-Pr 17. Protecting Commercial and Institutional Critical Infrastructure Key Terms Introduction Commercial Facilities Sector Retail Subsector Retail Business Challenges and Countermeasures Shrinkage Human Resources Internal Loss Prevention Strategies Preventing Losses at the Checkout Counters Point-of-Sale Accounting Systems Video Systems Electronic Payments E-Commerce Checks Refund Fraud Gift Card Fraud Counterfeiting Organized Retail Crime Shoplifting and Countermeasures Types of Shoplifters and Motivational Factors Shoplifting Techniques Prevention of Shoplifting Through People Prevention of Shoplifting Through Physical Design and Physical Security Physical Design Electronic Article Surveillance Additional Measures Confronting the Suspected Shoplifter Detection and Apprehension Detention and Arrest Prosecution Civil Recovery Robbery and Burglary Shopping Mall Strategies Financial Services Sector Financial Services Challenges Legal Responsibilities of the Financial Services Sector Regulation H Bank Robbery Countermeasures Kidnapping and Extortion Automated Teller Machines Embezzlement, Fraud, and Online Risks Educational Facilities Subsector Educational Institution Challenges Safety and Fire Protection at Educational Institutions Protection for Educational Institutions School Districts and Private Schools Legislation and Grants for School Districts Protection for School Districts Colleges and Universities Legislation for Colleges and Universities Protection for Colleges and Universities Healthcare and Public Health Sector Laws, Regulatory Authorities, and Accreditation Healthcare and Public Health Challenges Violence at Health-Care Facilities Access Controls Security Officers Newborn Nursery Pharmacy Protection Cybersecurity for the Healthcare and Public Health Sector Accountability and Inventory Control Mortuary Fire and Other Disasters at Health-Care Facilities Case Problems References 18---Topics-of-Concern_2019_Security-and-Loss-Prevention 18. Topics of Concern Key Terms Workplace Violence Legal Guidelines Difficulties of Profiling the Potential Violent Offender Active Shooter and Active Assailant Protection Methods Security at Large-Scale Events Human Resources Protection Planning Education and Training Protection Strategies Avoidance of Predictable Patterns Recognition of Tricks Protection at Home Protection at the Office Attacks While Traveling Soft Targets Protection of Women If Abduction Occurs The Pluses and Minuses of Technology Privacy and Identity Theft Substance Abuse in the Workplace Countermeasures Employee Assistance Programs Legal Guidelines Drug Testing Types of Substances and Abuse Alcohol Other Substances Information Security Economic Espionage Act of 1996 and Defend Trade Secrets Act of 2016 Corporate Intelligence Gathering: Putting It in Perspective Espionage Techniques and the Vulnerabilities of Technology Countermeasures Operations Security Destruction of Information Assets Communications Security Eavesdropping, Electronic Surveillance, and Wiretapping Technical Surveillance Countermeasures The Countermeasures Consultant Techniques and Equipment Case Problems References 19---Your-Future-in-Security-and-Loss-Prevent_2019_Security-and-Loss-Prevent 19. Your Future in Security and Loss Prevention Key Terms Introduction Security and Loss Prevention in the Future Artificial Intelligence Robots Trends Affecting Security and Loss Prevention Education Security and Loss Prevention Education: Today and Tomorrow Academic Programs Following the 9/11 Attacks Research Training The Concept of the Security Institute Employment Sources of Employment Information Career Advice Case Problems References Index_2019_Security-and-Loss-Prevention Index A B C D E F G H I J K L M N O P Q R S T U V W X Y Z