Book description
The most comprehensive resource on the subject, Asset Protection and Security Management Handbook is a must for all professionals involved in security and security management. For people new to the security profession, it gives a firm foundation for advanced development. For experienced security practitioners, the handbook is an invaluable reference. Not only does the book cover the fundamental aspects of security and security management, it also provides non-security information, from basic investigations work, legal issues, and ethics to workplace violence and risk analysis. It enables the development of emergency/disaster plans and procedures, and analyze risk and exposure.
Table of contents
- Front cover
- Contents (1/4)
- Contents (2/4)
- Contents (3/4)
- Contents (4/4)
- Chapter 1. Introduction to Assets Protection (1/4)
- Chapter 1. Introduction to Assets Protection (2/4)
- Chapter 1. Introduction to Assets Protection (3/4)
- Chapter 1. Introduction to Assets Protection (4/4)
- Chapter 2. Security Vulnerability (1/8)
- Chapter 2. Security Vulnerability (2/8)
- Chapter 2. Security Vulnerability (3/8)
- Chapter 2. Security Vulnerability (4/8)
- Chapter 2. Security Vulnerability (5/8)
- Chapter 2. Security Vulnerability (6/8)
- Chapter 2. Security Vulnerability (7/8)
- Chapter 2. Security Vulnerability (8/8)
- Chapter 3. Structural Barriers (1/5)
- Chapter 3. Structural Barriers (2/5)
- Chapter 3. Structural Barriers (3/5)
- Chapter 3. Structural Barriers (4/5)
- Chapter 3. Structural Barriers (5/5)
- Chapter 4. General Locking Concepts (1/7)
- Chapter 4. General Locking Concepts (2/7)
- Chapter 4. General Locking Concepts (3/7)
- Chapter 4. General Locking Concepts (4/7)
- Chapter 4. General Locking Concepts (5/7)
- Chapter 4. General Locking Concepts (6/7)
- Chapter 4. General Locking Concepts (7/7)
- Chapter 5. Alarm Sensors (1/9)
- Chapter 5. Alarm Sensors (2/9)
- Chapter 5. Alarm Sensors (3/9)
- Chapter 5. Alarm Sensors (4/9)
- Chapter 5. Alarm Sensors (5/9)
- Chapter 5. Alarm Sensors (6/9)
- Chapter 5. Alarm Sensors (7/9)
- Chapter 5. Alarm Sensors (8/9)
- Chapter 5. Alarm Sensors (9/9)
- Chapter 6. Systems Considerations (1/7)
- Chapter 6. Systems Considerations (2/7)
- Chapter 6. Systems Considerations (3/7)
- Chapter 6. Systems Considerations (4/7)
- Chapter 6. Systems Considerations (5/7)
- Chapter 6. Systems Considerations (6/7)
- Chapter 6. Systems Considerations (7/7)
- Chapter 7. Access Control (1/5)
- Chapter 7. Access Control (2/5)
- Chapter 7. Access Control (3/5)
- Chapter 7. Access Control (4/5)
- Chapter 7. Access Control (5/5)
- Chapter 8. Emergency Planning (1/8)
- Chapter 8. Emergency Planning (2/8)
- Chapter 8. Emergency Planning (3/8)
- Chapter 8. Emergency Planning (4/8)
- Chapter 8. Emergency Planning (5/8)
- Chapter 8. Emergency Planning (6/8)
- Chapter 8. Emergency Planning (7/8)
- Chapter 8. Emergency Planning (8/8)
- Chapter 9. Information Systems Security: An Overview (1/7)
- Chapter 9. Information Systems Security: An Overview (2/7)
- Chapter 9. Information Systems Security: An Overview (3/7)
- Chapter 9. Information Systems Security: An Overview (4/7)
- Chapter 9. Information Systems Security: An Overview (5/7)
- Chapter 9. Information Systems Security: An Overview (6/7)
- Chapter 9. Information Systems Security: An Overview (7/7)
- Chapter 10. Information Systems Security (1/5)
- Chapter 10. Information Systems Security (2/5)
- Chapter 10. Information Systems Security (3/5)
- Chapter 10. Information Systems Security (4/5)
- Chapter 10. Information Systems Security (5/5)
- Chapter 11. Investigations: General Comments (1/5)
- Chapter 11. Investigations: General Comments (2/5)
- Chapter 11. Investigations: General Comments (3/5)
- Chapter 11. Investigations: General Comments (4/5)
- Chapter 11. Investigations: General Comments (5/5)
- Chapter 12. Security and Protective Lighting (1/4)
- Chapter 12. Security and Protective Lighting (2/4)
- Chapter 12. Security and Protective Lighting (3/4)
- Chapter 12. Security and Protective Lighting (4/4)
- Chapter 13. Crime Prevention through Environmental Design: CPTED (1/10)
- Chapter 13. Crime Prevention through Environmental Design: CPTED (2/10)
- Chapter 13. Crime Prevention through Environmental Design: CPTED (3/10)
- Chapter 13. Crime Prevention through Environmental Design: CPTED (4/10)
- Chapter 13. Crime Prevention through Environmental Design: CPTED (5/10)
- Chapter 13. Crime Prevention through Environmental Design: CPTED (6/10)
- Chapter 13. Crime Prevention through Environmental Design: CPTED (7/10)
- Chapter 13. Crime Prevention through Environmental Design: CPTED (8/10)
- Chapter 13. Crime Prevention through Environmental Design: CPTED (9/10)
- Chapter 13. Crime Prevention through Environmental Design: CPTED (10/10)
- Chapter 14. United States Criminal Law (1/8)
- Chapter 14. United States Criminal Law (2/8)
- Chapter 14. United States Criminal Law (3/8)
- Chapter 14. United States Criminal Law (4/8)
- Chapter 14. United States Criminal Law (5/8)
- Chapter 14. United States Criminal Law (6/8)
- Chapter 14. United States Criminal Law (7/8)
- Chapter 14. United States Criminal Law (8/8)
- Chapter 15. The Civil Law (1/5)
- Chapter 15. The Civil Law (2/5)
- Chapter 15. The Civil Law (3/5)
- Chapter 15. The Civil Law (4/5)
- Chapter 15. The Civil Law (5/5)
- Chapter 16. Security as a Management Function (1/4)
- Chapter 16. Security as a Management Function (2/4)
- Chapter 16. Security as a Management Function (3/4)
- Chapter 16. Security as a Management Function (4/4)
- Chapter 17. Ethics in the Security Profession (1/5)
- Chapter 17. Ethics in the Security Profession (2/5)
- Chapter 17. Ethics in the Security Profession (3/5)
- Chapter 17. Ethics in the Security Profession (4/5)
- Chapter 17. Ethics in the Security Profession (5/5)
- Chapter 18. Detecting Deception in Interviews and Interrogations (1/3)
- Chapter 18. Detecting Deception in Interviews and Interrogations (2/3)
- Chapter 18. Detecting Deception in Interviews and Interrogations (3/3)
- Chapter 19. A Plan for Threat Management (1/6)
- Chapter 19. A Plan for Threat Management (2/6)
- Chapter 19. A Plan for Threat Management (3/6)
- Chapter 19. A Plan for Threat Management (4/6)
- Chapter 19. A Plan for Threat Management (5/6)
- Chapter 19. A Plan for Threat Management (6/6)
- Index (1/6)
- Index (2/6)
- Index (3/6)
- Index (4/6)
- Index (5/6)
- Index (6/6)
- Back cover
Product information
- Title: Asset Protection and Security Management Handbook
- Author(s):
- Release date: December 2002
- Publisher(s): Auerbach Publications
- ISBN: 9781420031386
You might also like
book
Asset Protection through Security Awareness
Supplying a high-level overview of how to protect your company's physical and intangible assets, this book …
book
Information Security Management Handbook, Volume 6, 6th Edition
This annually updated handbook provides a compilation of the fundamental knowledge, skills, techniques, and tools required …
book
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
Best practices for protecting critical data and systems Information Assurance Handbook: Effective Computer Security and Risk …
book
Information Security Management Handbook, Volume 7, 6th Edition
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and …