9780750671392

Industrial Security

by
  • ISBN13:

    9780750671392

  • ISBN10:

    0750671394

  • Edition: 2nd
  • Format: Hardcover
  • Copyright: 1999-02-10
  • Publisher: Elsevier Science

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $94.95 Save up to $9.49
  • Rent Book $85.46
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

A basic text on general security techniques, this book emphasizes the philosophical, moral and ethical responsibilities of the security officer, along with the elements of various specialties within the field. This book is designed for not only the beginning student, but for ambitious security personnel seeking advancement and directors training staff in the field. It is important for security personnel, in this age of the computer, to understand the background and basic elements of security procedures. It is also important to understand this philosophy in order to develop programs which may be used in defending against charges of "inadequate security" in civil litigation. this book is an update of a beginning text which has been used successfully in colleges and universities for twenty years. It updates the techniques of various specialties along with current technological approaches towards solving those security-related issues. It has left unchanged the philosophical, moral, and ethical approach to the security procedures, the abandonment of which has led to literally thousands of lawsuits against security departments and private guard companies, alleging "inadequate security" procedures, hiring and training. New technologies, in almost every subcategory of the security industry, have changed the profession forever. Computers have assumed much of the performance formerly conducted by both trained and untrained security officers. Skills have changed to a degree where knowledge is determined by one's level of computer awareness. This book presents many of those new techniques and developments.

Table of Contents

Forward xv
Preface xvii
Acknowledgments xxiii
Part I Introduction 1(24)
The Evolution of Security
3(12)
The Early Years
3(1)
Growth and Problems
4(1)
The Turning Point
4(1)
First-Stage Protection: Contract Serivces
5(7)
Contract Services: An Overview
12(1)
Review Questions
13(1)
Notes
14(1)
Developing a Proprietary Security Program
15(10)
Cost and Control
15(1)
Added Security Needs of a Larger Company
16(1)
Initiating the Program
17(3)
Establishing Present and Future Goals
20(1)
Security's Effect on Other Areas
21(1)
``Perfect'' Security
21(1)
Management Policy
22(1)
Budget and Operating Cost Factors
23(1)
Review Questions
24(1)
Notes
24(1)
Part II Organizing for Security 25(54)
Security Orgranization and Staffing
27(14)
The Security Director
27(4)
Other Positions in the Security Department
31(2)
Typical Organizational Charts
33(4)
Uniforms and Equipment
37(1)
Male and Female Security Officers
38(1)
Review Questions
39(2)
Duties and Responsibilities
41(18)
Manual of Procedures
41(1)
Post Orders
42(1)
Logs
43(1)
Forms
44(2)
Orders and Directives
46(1)
Training Programs
46(3)
Supervision
49(1)
Promotions
50(1)
Review Questions
50(1)
Notes
50(9)
Security Uses of Photography
59(6)
Photographic Equipment
59(4)
Uses of Photography
63(1)
Reports
64(1)
Preservation of Photographs
64(1)
Review Questions
64(1)
Security Office and Facilities
65(6)
Filing Systems and Records
66(2)
Locker Room
68(1)
Training and Assembly Areas
68(1)
First-Aid Supplies
68(1)
The Control Center
69(1)
Review Questions
70(1)
Security Relationships
71(8)
Relations with Management
71(1)
General Relations with Personnel
72(1)
Selling Security
73(1)
The Union Factor
74(1)
Liaison with Outside Agencies
75(2)
Other Relationships
77(1)
Review Questions
77(1)
Notes
78(1)
Part III Internal Controls 79(80)
Access Control
81(10)
Locks and Keys
81(1)
Key Control Systems
81(1)
Types of Locks
82(2)
Master Key Systems
84(1)
Combination Locks
84(1)
Card-Key Control
85(1)
Identification Systems
85(1)
Identification Cards
85(1)
Posted Signs
86(2)
Guard Stations
88(2)
Review Questions
90(1)
Personnel Clearance
91(14)
Employment Application Form
92(4)
Protection of Applicant's Rights
96(2)
Investigation Procedures
98(4)
Updating
102(1)
Polygraph Examination
103(1)
The PSE
103(1)
Levels of Clearance
104(1)
Review Questions
104(1)
Document Control
105(6)
File Cabinets and Safes
105(1)
Microfilming and Downloading
106(1)
Destruction
106(1)
Access Limitations
107(2)
Review Questions
109(2)
Fire Prevention and Control
111(14)
Types of Fires
111(1)
Combative Methods
112(1)
Fire Extinguishers
113(2)
Fire Extinguisher Placement
115(1)
Sprinkler and Hose Systems
115(2)
Fire Doors
117(1)
Fire Alarm Systems
118(1)
Fire Prevention Planning
119(3)
Business and Industrial Fire Hazards
122(2)
Review Questions
124(1)
Notes
124(1)
Emergency and Disaster Planning
125(18)
Emergency Planning Manuals
126(1)
Types of Emergencies
127(2)
Basic Emergency Planning
129(5)
Emergency Security Responsibilities
134(1)
Bomb Threats
135(4)
Strikes
139(3)
Review Questions
142(1)
Notes
142(1)
Theft and Pilferage Controls
143(8)
Theft and Pilferage
143(2)
Theft Prevention
145(1)
Theft Detection
146(1)
Prosecution Policy
146(1)
Embezzlement
147(1)
Procedural Controls
147(3)
Review Questions
150(1)
Retail Security---Charles A. Sennewald
151(8)
Inventory Shrinkage
152(2)
Employee Theft
154(1)
Miscellaneours Other Crimes
155(1)
Sampling of Tools and Strategies
156(1)
Summary
157(1)
Notes
158(1)
Part IV External Threats and Special Problems 159(40)
Perimeter and Exterior Protection
161(14)
Barrier Protection
161(2)
Office Buildings
163(1)
Retail Stores
164(1)
Alarm Perimeter Protection
164(1)
Lighting
165(4)
Closed-Circuit Television
169(1)
Guards in Exterior Protection
169(3)
Parking Area Controls
172(1)
Review Questions
173(1)
Notes
173(2)
Executive Protection and Terrorism
175(14)
Knowing the enemy
176(1)
Risk Assessment
177(2)
Practical Executive Protection
179(6)
The Crisis Response
185(1)
Crisis Management Teams
186(1)
Review Questions
187(1)
Notes
188(1)
Specific Crime Problems
189(10)
Surveillance and Intelligence
189(1)
External Threats
190(3)
Sources of Information
193(1)
Wiretaps and Bugs
194(1)
Sabotage
194(2)
Narcotics, Alcohol, and Gambling
196(1)
Review Questions
197(2)
Part V Electronic Aids in Security 199(36)
Closed-Circuit Television
201(8)
Locating the Hardware
202(1)
Camera Hardware
203(2)
Fatigue Factors
205(1)
Videotape Recorders
206(1)
VCR As a Training Aid
207(1)
Review Questions
208(1)
Notes
208(1)
Communications Systems
209(8)
Advantages of Two-Way Radio
209(1)
Types of Systems
209(3)
Power
212(1)
Radio Procedure
212(2)
Station Call Signs
214(1)
Intercoms
214(1)
Paging Systems
215(1)
Computers
215(1)
Conclusion
215(1)
Review Questions
216(1)
Alarms
217(12)
Basics of Alarm Systems
217(1)
Types of Intrusion Sensors
218(4)
Capacitance Alarms
222(1)
Alarm Transmission and Response Systems
222(1)
Telephone Dialers
223(1)
Off-Premise Alarm Notification
223(1)
Proprietary Alarm Systems
224(1)
Security Console
224(1)
Alarm Applications
225(1)
Alarm Response
226(1)
Installation and Service
226(1)
Review Questions
227(2)
Automatic Access Control
229(6)
Magnetic Card Entry
230(1)
Digital System
231(1)
Combination Locks
231(1)
Key Lock Entry Identification
231(1)
Remote Locks
231(1)
Sophisticated Computerized ID Entry Systems
232(1)
Review Questions
233(2)
Part VI Security and Society 235(52)
Security Authority: Theory and Practice
237(8)
``Authority''---A Philosophical View
237(1)
The Law's View of Security
238(2)
Theory of Aprehension and Arrest
240(2)
A Practical Approach to Arrest
242(1)
Determining the Limits of Authority
243(1)
Review Questions
244(1)
Notes
244(1)
New Directions in Security
245(4)
What Lies Ahead
246(1)
The Challenge of Social Change
247(1)
Review Questions
248(1)
We Never Through It Would Happen Here: Preventing Workplace Violence---Steve Kaufer and Jurg W. Mattman
249(28)
Part One: Introduction
250(1)
Just How Serious Is the Problem?
251(1)
Other Threats in the Workplace
252(1)
Legal Issues of Workplace Violence
253(1)
Developing a Workplace Violence Prevention Program
254(1)
The Workplace Violence Committee
255(1)
Policies, Training, and Information Collection
256(1)
Hiring and Termination: Two Opportunities for Prevention
257(2)
Downsizing
259(1)
Physical Security and Hardware
260(1)
Planning for the Crisis to Reduce Its Impact
261(1)
Part Two: When Tragedy Strikes at Work
262(1)
General Guidelines
262(1)
How to Listen to Someone Who Is Hurting
263(2)
Recovering from the Death of a Coworker
265(2)
Supervising an Employee with Suicidal Concerns
267(2)
Helping an Employee Recover from an Assault
269(1)
Managing After a Disaster
270(2)
Managing When the Stress Does Not Go Away
272(2)
But It Could Happen Here ....
274(1)
Resources
274(3)
Private Security Faces High-Technology Crimes---Sanford Sherizen
277(10)
Introduction
279(1)
High Technology and Private Security
280(1)
Computer Crimes and Other Technical Changes in Crime
281(3)
Action Items for the Security Professional
284(2)
A Selected List of Information Security Resources
286(1)
Notes
286(1)
Appendix Industrial Security Survey Checklist 287(6)
Selected Bibliography 293(4)
Index 297

Rewards Program

Write a Review