ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Security and Loss Prevention

دانلود کتاب امنیت و پیشگیری از ضرر

Security and Loss Prevention

مشخصات کتاب

Security and Loss Prevention

ویرایش: 7 
نویسندگان:   
سری:  
ISBN (شابک) : 9780128117958 
ناشر: Butterworth-Heinemann 
سال نشر: 2019 
تعداد صفحات: 742 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 27 مگابایت 

قیمت کتاب (تومان) : 49,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Security and Loss Prevention به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب امنیت و پیشگیری از ضرر نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب امنیت و پیشگیری از ضرر

امنیت و پیشگیری از ضرر: مقدمه، ویرایش هفتم، اطلاعات مقدماتی و پیشرفته ای را در مورد حرفه امنیت ارائه می دهد. متخصص امنیت، فیل پورپورا، CPP، شامل به روز رسانی در مورد تحقیقات امنیتی، روش ها، استراتژی ها، فن آوری ها، قوانین، مسائل، آمار و گزینه های شغلی، ارائه یک کتاب جامع و میان رشته ای است که از زمینه های مطالعاتی بسیاری برای مفاهیم، ​​استراتژی های حفاظت و تحقیق استفاده می کند. . این کتاب چالش های دنیای واقعی را که متخصصان امنیتی با آن مواجه هستند توضیح می دهد و گزینه هایی را برای راه حل های برنامه ریزی ارائه می دهد. این کتاب که امنیت فیزیکی را با امنیت فناوری اطلاعات مرتبط می کند، تهدیدات داخلی و خارجی برای افراد و دارایی ها و پاسخ ها و مسائل بخش خصوصی و دولتی را پوشش می دهد. مانند نسخه‌های قبلی، این کتاب دارای سبک تعاملی است که شامل مثال‌ها، تصاویر، سؤالات نوار کناری، موضوعات جعبه‌ای، دیدگاه‌های بین‌المللی و تمرین‌های وب است. علاوه بر این، مدرسان دوره می‌توانند موارد جانبی را دانلود کنند، از جمله کتابچه راهنمای مربی با طرح‌های فصل‌ها، موضوعات بحث/پروژه‌های ویژه، سؤالات مقاله، و یک بانک آزمون و ارائه پاورپوینت برای هر فصل.


توضیحاتی درمورد کتاب به خارجی

Security and Loss Prevention: An Introduction, Seventh Edition, provides introductory and advanced information on the security profession. Security expert, Phil Purpura, CPP, includes updates on security research, methods, strategies, technologies, laws, issues, statistics and career options, providing a comprehensive and interdisciplinary book that draws on many fields of study for concepts, strategies of protection and research. The book explains the real-world challenges facing security professionals and offers options for planning solutions. Linking physical security with IT security, the book covers internal and external threats to people and assets and private and public sector responses and issues. As in previous editions, the book maintains an interactive style that includes examples, illustrations, sidebar questions, boxed topics, international perspectives and web exercises. In addition, course instructors can download ancillaries, including an instructor's manual with outlines of chapters, discussion topics/special projects, essay questions, and a test bank and PowerPoint presentation for each chapter.



فهرست مطالب

Front-Matter_2019_Security-and-Loss-Prevention
	Security and Loss Prevention
Copyright_2019_Security-and-Loss-Prevention
	Copyright
Dedication_2019_Security-and-Loss-Prevention
	Dedication
About-the-Author_2019_Security-and-Loss-Prevention
	About the Author
Preface_2019_Security-and-Loss-Prevention
	Preface
Acknowledgments_2019_Security-and-Loss-Prevention
	Acknowledgments
Disclaimer_2019_Security-and-Loss-Prevention
	Disclaimer
1---The-History-of-Security-and-Loss-Prevention--A-_2019_Security-and-Loss-P
	1. The History of Security and Loss Prevention: A Critical Perspective
		Key Terms
		Why Critical Thinking?
		How Can We Think Critically?
		Why Think Critically About the History of Security and Loss Prevention?
		Security and Loss Prevention Defined
		History
			Early Civilizations
			Ancient Greece
			Ancient Rome
			The Middle Ages in Europe
		More Contemporary Times
			England
			Peel's Reforms
			Early America
			The Growth of Policing
			The Growth of Security Companies
			Railroads and Labor Unions
			The Great Wars
			The Third Wave
			Twenty-First Century/Post-9/11 Security Challenges
		Case Problems
		References
2---The-Business--Careers--and-Challenges-of-Securi_2019_Security-and-Loss-P
	2. The Business, Careers, and Challenges of Security and Loss Prevention
		Key Terms
		The Security Industry
			Contract Versus Proprietary Security
			Privatization
		Careers: Security and Loss Prevention Services and Specialists
		Occupational Outlook
		Challenges: Risks, Threats, and Hazards
		Data Analytics and Metrics
			Internal Metrics
				Why Emphasize Both Direct and Indirect Losses?
			External Metrics
				Crimes
				Fires
				Accidents
				Disasters
		Limitations of the Criminal Justice System: Implications for Loss Prevention Practitioners
		Challenges of the Security Industry
			Cooperation Between Public Police and Private Security
			Regulation of the Industry
			The Need for Training
			Ethics
			The False Alarm Problem
		Case Problems
		References
3---Foundations-of-Security-and-Loss-Prevent_2019_Security-and-Loss-Preventi
	3. Foundations of Security and Loss Prevention
		Key Terms
		The Security and Loss Prevention Profession
			Academic Programs
			Security Associations
			Periodicals
			Theoretical Foundations
				Rational Choice Theory
				Routine Activity Theory
				Situational Crime Prevention
		Methods for Protection Programs
			Business Concepts
			Planning and Budgeting
			Risk Analysis
				Conduct a Loss Prevention Survey
				Identify Vulnerabilities
				Determine Probability, Frequency, and Cost
				Annual Loss Exposure
			Input for Planning and Budgeting
			Planning From a Systems Perspective
		Standards and Regulations
			Standards
			Regulations
			Standards-Setting Organizations
		Research and Evaluation of Loss Prevention Programs
			Scientific Method
			Sources of Research Assistance
		Security Management
			Basics of Organization: The Vocabulary
		Case Problems
		References
4---Law_2019_Security-and-Loss-Prevention
	4. Law
		Key Terms
		Introduction
		Judicial System of the United States
			State Court Systems
			Federal Court System
		Origins of Law
		Tort Law and Controls Over Private Security
		Legal Theory of Premises Security Claims
		Contract Law
		Civil Justice Procedures
		Administrative Law
			Inspections and Searches
			Labor Law
		Criminal Justice Procedures
			Arrest Law
			Use of Force
			Searches
			Questioning
		Case Problems
		The Decision for “You Be the Judge”
		References
5---Internal-and-External-Relations_2019_Security-and-Loss-Prevention
	5. Internal and External Relations
		Key Terms
		Internal and External Relations
			Benefits of Positive Relations
		Internal Relations
			Customer-Driven Security and Loss Prevention
			Marketing
			Human Relations on the Job
			Management Support
			Orientation and Training Programs
			Involvement Programs
			Loss Prevention Meetings
			Intranet and E-Mail
		External Relations
			Law Enforcement
			Public Safety Agencies
			The Community
			The Media
			External Loss Prevention Peers
		Special Topics
			Social Media
			Prosecution Decisions
			Loss Prevention Attire
		Case Problems
		References
6---Applicant-Screening-and-Employee-Socializ_2019_Security-and-Loss-Prevent
	6. Applicant Screening and Employee Socialization
		Key Terms
		Introduction
		Employment Law
			Federal Legislation
			US Supreme Court Decisions
			Equal Employment Opportunity Commission
			Equal Employment Opportunity, Affirmative Action, and Quotas
			Diversity
			Sexual Harassment
			Social Media and Sexual Harassment
		Screening Methods
			Resumes and Applications
			Interview
			Tests
			Background Investigations
		Employee Socialization
			Employee Training
			Planning Training
				Step 1: Training Needs
				Step 2: Budget
				Step 3: Behavioral Objectives
				Step 4: Training Program Outline
				Step 5: Learning Medium
				Step 6: Evaluation, Feedback, and Revision
			Learning Principles
			Bloom's Revised Taxonomy of Educational Objectives
			Wasted Training
			Examples Set by Superiors
			Employee Needs
		Case Problems
			The Decision for “You Be the Judge”
				Comment
		References
7---Internal-Threats-and-Countermeasures_2019_Security-and-Loss-Prevention
	7. Internal Threats and Countermeasures
		Key Terms
		Introduction
		Internal Theft
			How Serious Is the Problem?
			Why Do Employees Commit Theft?
			How Do Employees Commit Theft?
			Possible Indicators of Theft
		Management Countermeasures
			Loss Reporting and Reward System
			Signs
			Protecting Assets, Methods of Theft Detection
			Investigations
			Insurance, Bonding
			Confronting an Employee Suspect
		Physical Security Countermeasures
			Security for Security
			Integration and Convergence
			Cloud-Based Services
			Access Controls
				Controlling Employee Traffic
				Searching Employees
				Visitors
				Employee Identification System
				Automatic Access Control
				Biometric Technologies
			Locks and Keys
				Types of Locks
				Master Key Systems
				Key Control
				Entrances for Persons With a Disability
				Attacks and Hardware
			Intrusion Detection Systems
				Interior Sensors
				Trends
			Video Surveillance Systems
			Security Officers
			Safes, Vaults, and File Cabinets
				Safes
				Attacks
				Vaults
				File Cabinets
		Case Problems
		References
8---External-Threats-and-Countermeasures_2019_Security-and-Loss-Prevention
	8. External Threats and Countermeasures
		Key Terms
		Introduction
		Methods of Unauthorized Entry
		Countermeasures
			Environmental Security Design
			Sustainability and Green Security
			Perimeter Security
			Drones
			Barriers
			Protecting Buildings Against Terrorism
				Mitigation for Explosive Blasts
			Glazing
			Window Protection
				Window Locks
				Electronic Protection for Windows
			Doors
			Perimeter Intrusion Detection Systems
				Applications
			Alarm Signaling Systems
			Video Surveillance
			Lighting
				Illumination
				Lamps
				Light-Emitting Diode Lamps
				Lighting Trends and Applications
			Parking Sites and Vehicle Controls
			Security Officers
				Armed Versus Unarmed Security Officers
				Monitoring Officers
			Contraband Detection
			Protective Dogs
			Communications and the Operations Control Center
		Case Problems
		References
9---Services-and-Systems--Methods-for-Wise-Purcha_2019_Security-and-Loss-Pre
	9. Services and Systems: Methods for Wise Purchasing Decisions
		Key Terms
		Introduction
		Pitfalls and Advice When Purchasing Security Services and Systems
		Purchasing Security Services
			Questions When Considering Contract Security Officers
			Contract Undercover Investigations
			Consultants
			Certifications in Security
		Purchasing Security Systems
			Questions When Considering a Security System
			System Acquisition
		Outsourcing
		Case Problem
		The Decision for “You Be the Judge”
		References
10---Investigations_2019_Security-and-Loss-Prevention
	10. Investigations
		Key Terms
		Introduction
		Types of Investigations
			Proprietary and Contract Investigations
			Private and Public Investigations
			Overt and Undercover Private Investigations
			Important Considerations
		Law
			Evidence Law
		Interviewing and Interrogation
		Information Sources
			Legal Restrictions When Collecting Information
		Investigative Leads
			Scene of the Loss
			Victims and Witnesses
			Informants
			Modus Operandi
			Computers and Software
			Forensic Analysis
			Digital Investigations and Evidence
			Surveillance
		Information Accuracy
		Report Writing
		Testimony
		Case Problems
		References
11---Accounting--Accountability--and-Auditin_2019_Security-and-Loss-Preventi
	11. Accounting, Accountability, and Auditing
		Key Terms
		Introduction
		Accounting
		Accountability
			Purchasing
			Inventory
		Auditing
			Internal Control Questionnaire
		Fraud
			Sarbanes–Oxley Act of 2002
			Fraud Investigations
		Governance, Risk Management, and Compliance
		Case Problems
		References
12---Resilience--Risk-Management--Business-Continuit_2019_Security-and-Loss-
	12. Resilience, Risk Management, Business Continuity, and Emergency Management
		Key Terms
		Introduction
			Resilience: A Critical Thinking Perspective
		Risk Management
			The Role of the Risk Manager
			The Risk Management Process
			Risk Modeling and Simulation
			Risk Management Tools
			Enterprise Risk Management and Enterprise Security Risk Management
		Insurance
			Types of Insurance
			Crime Insurance and Bonds
				Fidelity Bond
				Surety Bond
				Burglary, Robbery, and Theft Insurance
				Terrorism, Workplace Violence, and Insurance
				Kidnapping Insurance
				Cyber Insurance
				Fire Insurance
				Property and Liability Insurance
					Business Property Insurance
					Liability Insurance
					Workers' Compensation Insurance
		Claims
			Proof of Loss
		Business Continuity
			Guidance for Business Continuity Planning and Private Sector Preparedness
		Emergency Management
			Risk Management in Government
			All-Hazards Preparedness Concept
			The History of Emergency Management
			Emergency Management Operations
				Prevention
				Mitigation
				Preparedness
				Response
				Recovery
				Communications
		The Military
		Case Problems
			The Decision for “You Be the Judge #1”
			The Decision for “You Be the Judge #2”
		References
13---Life-Safety--Fire-Protection--and-Emerge_2019_Security-and-Loss-Prevent
	13. Life Safety, Fire Protection, and Emergencies
		Key Terms
		Life Safety
			Standards, Regulations, and Codes
				Occupational Safety and Health Administration Regulations
				NFPA 101 Life Safety Code
				Building Design and Building Codes
		Fire Protection
			The Fire Problem
			Private Organizations Involved in Fire Protection
			Fire Departments
			Fire Department Protection Efforts
				Facility Planning
				Prefire Planning
				Public Education
				Codes
				Inspections by Firefighting Personnel
				Legal Implications
		Fire Prevention and Fire Suppression in the Private Sector
			Fire Prevention Strategies
				Inspections by the Private Sector
				Planning
				Safety
				Hazardous Materials (Hazmat) Incidents
			Fire Suppression Strategies
				Integrated Systems
				Detection of Smoke and Fire
				Classes of Fires and Portable Extinguishers
				Sprinklers
				Standpipe and Hose Systems
				Fire Walls and Doors
				Stairwells
				Access Control
				Fire-Resistive Buildings
				Training and Fire Brigades
		Public Safety Agencies
			Police
			Emergency Medical Services
		Emergencies
			Critical Incident Management
			Human-Made Emergencies
				Accidents
				Technological Disasters
				Bomb Threats and Explosions
				Weapon of Mass Destruction
				Civil Disturbances
				Strikes
			Natural Disasters
				Windstorms
				Floods
				Blizzards
				Earthquakes
				Pandemics
		Case Problems
		References
14---Safety-in-the-Workplace_2019_Security-and-Loss-Prevention
	14. Safety in the Workplace
		Key Terms
		Introduction
		Accident Statistics and Costs
		History of Safety Legislation
			Workers' Compensation
			The Development of OSHA
		Occupational Safety and Health Administration
			The Act's Jurisdiction
			OSHA Standards
				OSHA Hazard Communication Standard
				OSHA HAZWOPER Standard
				OSHA Bloodborne Pathogens Standard
				OSHA Standard for the Control of Hazardous Energy (Lockout/Tagout)
			OSHA Recordkeeping and Reporting
			Additional Employer Responsibilities
			OSHA Inspections
			OSHA: Criticism and Controversy
		Safety Strategies
			Assistance With Problems
			Safety and Health Committee
			Socialization and Incentive Programs
			Additional Safety Measures
			Investigations
			Accident Causation
		Case Problems
		References
15---Terrorism-and-Homeland-Security_2019_Security-and-Loss-Prevention
	15. Terrorism and Homeland Security
		Key Terms
		Terrorism Defined
		History
		Religion and Politics
		The Measurement of Terrorism
		Causes of Terrorism
			Globalization
			Social Science Explanations
				Psychological Causes of Terrorism
				Rational Choice Causes of Terrorism
				Structural Causes of Terrorism
		International Terrorism
			ISIS Versus al-Qaida
		Domestic Terrorism
			Religious Extremists
			Racial Supremacy
			Ecoterrorists/Anarchists
			Leftist Class Struggles
			State-Sponsored
			Lone Wolf and Homegrown Terrorists
		Terrorist Methods
			Terrorist Violence
			Terrorist Weapons
				Bombs
				Suicide Bombers
				Other Weapons
			Weapons of Mass Destruction
			Chemical Weapons
			Biological Weapons
			Radiological Weapons
			Nuclear Weapons
		Homeland Security
			The Evolution of Homeland Security
			National Strategy for Counterterrorism and Homeland Security Presidential Directives
			Legislation
			Methods to Counter Terrorism
			National Security and Homeland Security
			Intelligence and Counterintelligence
			Responses to Weapons of Mass Destruction
				Chemical Attack
				Steps for First Responders
				Biological Attack
				Radiation Attack
				Nuclear Attack
			State and Local Governments
			Private Sector
				Public–Private Sector Partnerships
				The Homeland Security Market
				Business Countermeasures Against Terrorism
				Citizen Volunteers
		Case Problems
		References
16---Critical-Infrastructure-Protection-and-Cyb_2019_Security-and-Loss-Preve
	16. Critical Infrastructure Protection and Cybersecurity
		Key Terms
		Critical Infrastructure
			The Foundations of Critical Infrastructure Protection
				CI Sectors
				The Private Sector
				Sharing Information on Critical Infrastructure
			Information Technology
				Information Technology Challenges
				Cybercrime
				Attack Methods
			Cybersecurity
				Cybersecurity of CI and the IoT Is Different From Protecting Data
				Artificial Intelligence
				Cyber Defense Versus Cyber Offense
				Cloud Computing
				Encryption
		Critical Infrastructure Sectors
			Agriculture and Food
			Water
			Energy
				Electricity
				Oil and Natural Gas
			Dams
			Nuclear Power Plants
			Chemical Industry
			Communications
			Defense Industry Base
			Critical Manufacturing
			Government Facilities
			Transportation Sectors
				Aviation
				Maritime
				Mass Transit and Passenger Rail
				Highway Infrastructure and Motor Carrier
				Freight Rail
				Pipelines
				Postal and Shipping
			National Monuments and Icons
			Border and Transportation Security
		Federal Government Agencies With Roles in Border and Transportation Security
			US Customs and Border Protection
			US Immigration and Customs Enforcement
			US Citizenship and Immigration Services
		Case Problems
		References
17---Protecting-Commercial-and-Institutional-Criti_2019_Security-and-Loss-Pr
	17. Protecting Commercial and Institutional Critical Infrastructure
		Key Terms
		Introduction
		Commercial Facilities Sector
		Retail Subsector
			Retail Business Challenges and Countermeasures
				Shrinkage
				Human Resources
				Internal Loss Prevention Strategies
				Preventing Losses at the Checkout Counters
				Point-of-Sale Accounting Systems
				Video Systems
				Electronic Payments
				E-Commerce
				Checks
				Refund Fraud
				Gift Card Fraud
				Counterfeiting
				Organized Retail Crime
			Shoplifting and Countermeasures
				Types of Shoplifters and Motivational Factors
				Shoplifting Techniques
				Prevention of Shoplifting Through People
				Prevention of Shoplifting Through Physical Design and Physical Security
				Physical Design
				Electronic Article Surveillance
					Additional Measures
			Confronting the Suspected Shoplifter
				Detection and Apprehension
				Detention and Arrest
				Prosecution
				Civil Recovery
			Robbery and Burglary
			Shopping Mall Strategies
		Financial Services Sector
			Financial Services Challenges
			Legal Responsibilities of the Financial Services Sector
			Regulation H
			Bank Robbery Countermeasures
			Kidnapping and Extortion
			Automated Teller Machines
			Embezzlement, Fraud, and Online Risks
		Educational Facilities Subsector
			Educational Institution Challenges
			Safety and Fire Protection at Educational Institutions
			Protection for Educational Institutions
			School Districts and Private Schools
				Legislation and Grants for School Districts
				Protection for School Districts
			Colleges and Universities
				Legislation for Colleges and Universities
				Protection for Colleges and Universities
		Healthcare and Public Health Sector
			Laws, Regulatory Authorities, and Accreditation
			Healthcare and Public Health Challenges
				Violence at Health-Care Facilities
				Access Controls
				Security Officers
				Newborn Nursery
				Pharmacy Protection
				Cybersecurity for the Healthcare and Public Health Sector
				Accountability and Inventory Control
				Mortuary
				Fire and Other Disasters at Health-Care Facilities
		Case Problems
		References
18---Topics-of-Concern_2019_Security-and-Loss-Prevention
	18. Topics of Concern
		Key Terms
		Workplace Violence
			Legal Guidelines
			Difficulties of Profiling the Potential Violent Offender
			Active Shooter and Active Assailant
			Protection Methods
			Security at Large-Scale Events
		Human Resources Protection
			Planning
			Education and Training
			Protection Strategies
				Avoidance of Predictable Patterns
				Recognition of Tricks
				Protection at Home
				Protection at the Office
				Attacks While Traveling
				Soft Targets
				Protection of Women
				If Abduction Occurs
				The Pluses and Minuses of Technology
				Privacy and Identity Theft
		Substance Abuse in the Workplace
			Countermeasures
				Employee Assistance Programs
				Legal Guidelines
				Drug Testing
			Types of Substances and Abuse
				Alcohol
				Other Substances
		Information Security
			Economic Espionage Act of 1996 and Defend Trade Secrets Act of 2016
			Corporate Intelligence Gathering: Putting It in Perspective
			Espionage Techniques and the Vulnerabilities of Technology
			Countermeasures
				Operations Security
				Destruction of Information Assets
		Communications Security
			Eavesdropping, Electronic Surveillance, and Wiretapping
			Technical Surveillance Countermeasures
				The Countermeasures Consultant
				Techniques and Equipment
		Case Problems
		References
19---Your-Future-in-Security-and-Loss-Prevent_2019_Security-and-Loss-Prevent
	19. Your Future in Security and Loss Prevention
		Key Terms
		Introduction
		Security and Loss Prevention in the Future
			Artificial Intelligence
			Robots
		Trends Affecting Security and Loss Prevention
		Education
			Security and Loss Prevention Education: Today and Tomorrow
			Academic Programs Following the 9/11 Attacks
		Research
		Training
			The Concept of the Security Institute
		Employment
			Sources of Employment Information
			Career Advice
		Case Problems
		References
Index_2019_Security-and-Loss-Prevention
	Index
		A
		B
		C
		D
		E
		F
		G
		H
		I
		J
		K
		L
		M
		N
		O
		P
		Q
		R
		S
		T
		U
		V
		W
		X
		Y
		Z




نظرات کاربران