セキュリティ産業入門(第7版)<br>Introduction to Security (7TH)

  • ポイントキャンペーン

セキュリティ産業入門(第7版)
Introduction to Security (7TH)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Hardcover:ハードカバー版/ページ数 570 p.
  • 言語 ENG
  • 商品コード 9780750676007
  • DDC分類 363.289

基本説明

Examines the attacks of September 11th, 2001 and the lasting impact on the security industry.

Full Description


Introduction to Security, Seventh Edition, presents the latest in security issues from security equipment and design theory to security management practice. This complete revision of the classic textbook has been reorganized to reflect the industry changes since the 9/11 World Trade Center attacks. It includes new coverage throughout of terrorism as it relates to cargo and travel security, potential areas of attack and target hardening techniques, and the use of current technologies to combat new threats. The book begins with a new chapter on the development of Homeland Security in the United States. Traditional physical and guard security is covered in addition to advances in the electronic and computer security areas, including biometric security, access control, CCTV surveillance advances, as well as the growing computer security issues of identity theft and computer fraud. The Seventh Edition provides the most comprehensive breakdown of security issues for the student while detailing the latest trends, legislation, and technology in the private and government sectors for real-world application in students' future careers. As the definitive resource for anyone entering or currently working in the security industry, this book will also benefit law enforcement personnel, security consultants, security managers, security guards and other security professionals, and individuals responsible for Homeland Security.

Table of Contents

Preface                                            xiii
Acknowledgments xv
Part I Introduction and Security's Function 1 (100)
Homeland Security--Changing the Emphasis on 3 (18)
Security in the United States
Introduction 3 (1)
Private Enterprise Response 4 (7)
Federal Response in the United States 11 (4)
State/Local Response 15 (2)
Public/Private Joint Initiatives 17 (1)
Concerns 17 (2)
Review Questions 19 (1)
References 19 (2)
Origins and Development of Security 21 (16)
Introduction 21 (1)
Security in England 21 (4)
Security in the United States 25 (9)
Summary 34 (1)
Review Questions 34 (1)
References 34 (3)
Defining Security's Role 37 (18)
Introduction 37 (1)
What Is Private Security? 37 (2)
Security Service 39 (1)
Contract versus Proprietary Services 40 (5)
Hybrid Systems 45 (3)
Private Security and Public Law 48 (3)
Enforcement
Relationships after September 11, 2001 51 (1)
Summary 51 (1)
Review Questions 52 (1)
References 52 (3)
The Proprietary Security Organization 55 (20)
Introduction 55 (1)
Determining the Need 55 (1)
Security's Place in the Organization 56 (7)
Organizing the Security Function 63 (9)
Summary 72 (1)
Review Questions 73 (1)
References 73 (2)
Career Opportunties in Loss Prevention 75 (14)
Introduction 75 (1)
Factors Increasing Security Opportunities 75 (1)
The Security/Loss-Prevention Occupation 76 (10)
Summary 86 (1)
Review Questions 86 (1)
References 86 (3)
Security Education, Training, 89 (12)
Certification, and Regulation
Introduction 89 (1)
Adequacy of Private Security Training 90 (1)
Proposed Federal Regulation 90 (1)
The Role of Higher Education 91 (2)
Training 93 (1)
Certification and Regulation 94 (3)
Magazines and Periodicals 97 (1)
Summary 97 (2)
Review Questions 99 (1)
References 99 (2)
Part II Basics of Defense 101 (194)
Security and the Law 103 (26)
Introduction 103 (1)
Security, Public Police, and the U.S. 104 (1)
Constitution
Sources of Law 104 (2)
Classes of Crimes 106 (2)
Private Security Powers 108 (6)
Civil Law: The Controller for Private 114 (4)
Security
Security and Liability 118 (1)
Duty to Protect from Third-Party Crime 119 (4)
Recent Trends in Liability 123 (1)
Recent Trends in Privacy 124 (1)
New Laws 124 (1)
The Courts 124 (1)
Development of Case Law 125 (2)
Summary 127 (1)
Review Questions 127 (1)
References 127 (2)
Risk Analysis and the Security Survey 129 (18)
Introduction 129 (1)
Risk Management 130 (1)
The Security Survey 131 (10)
Alternatives for Optimizing Risk 141 (5)
Management
Summary 146 (1)
Review Questions 146 (1)
Reference 146 (1)
The Outer Defenses: Building and Perimeter 147 (20)
Protection
Introduction 147 (1)
Barriers, Fences, and Walls 148 (4)
Gates and Other Barrier Breaches 152 (1)
Barrier Protection 153 (3)
Inside the Perimeter 156 (1)
Lighting 157 (7)
Planning Security 164 (1)
Summary 164 (1)
Review Questions 165 (1)
References 165 (2)
Interior and Exterior Security Concerns 167 (26)
Introduction 167 (1)
Buildings on or as the Perimeter 167 (1)
Windows and Doors 167 (3)
Locks and Keys 170 (14)
Roofs and Common Walls 184 (1)
Surveillance Devices 184 (4)
Old Construction 188 (1)
New Construction 189 (1)
Security at the Building Design Stage 189 (1)
Security Principles in Design 190 (1)
Summary 190 (1)
Review Questions 191 (1)
References 191 (2)
The Inner Defenses: Intrusion and Access 193 (22)
Control
Introduction 193 (1)
Doors to Sensitive Areas 194 (1)
Office Area Doors 194 (1)
Traffic Patterns 194 (1)
Traffic Control 195 (1)
Employee Identification 196 (2)
Package Control 198 (1)
Files, Safes, and Vaults 198 (5)
Inspections 203 (1)
Alarms 203 (9)
Summary 212 (1)
Review Questions 213 (1)
References 214 (1)
Fire Protection, Safety, and Emergency 215 (26)
Planning
Introduction 215 (1)
Fire Prevention and Protection 216 (12)
Safety and Loss Control 228 (8)
Emergency Planning 236 (3)
Summary 239 (1)
Review Questions 240 (1)
References 240 (1)
Insurance 241 (12)
Introduction 241 (1)
The Value of Insurance in a Total 241 (1)
Loss-Prevention Program
Types of Insurance 242 (5)
Insuring against Crime 247 (1)
Insuring Property 248 (2)
Summary 250 (1)
Review Questions 251 (1)
References 251 (2)
Internal Theft Controls 253 (20)
Introduction 253 (1)
What Is Honesty? 253 (1)
The Dishonest Employee 254 (3)
Management Responsibility in Loss 257 (2)
Prevention
Program for Internal Security 259 (2)
Procedural Controls 261 (8)
When Controls Fail 269 (3)
Summary 272 (1)
Review Questions 272 (1)
References 272 (1)
Personnel Policies for Internal Security 273 (22)
Introduction 273 (1)
Human Resources Screening 273 (1)
Employment History and Reference Checking 274 (7)
Backgrounding 281 (1)
Integrity and Lie Detection Tests 282 (3)
Americans with Disabilities Act 285 (3)
Drug Screening 288 (1)
Other Screening Options 288 (1)
Hiring Ex-convicts and Parolees 289 (1)
Morale 289 (2)
Summary 291 (1)
Review Questions 292 (1)
References 292 (3)
Part III Specific Threats and Solutions 295 (158)
Transportation/Cargo Security 297 (22)
Introduction 297 (1)
The Role of Private Security 298 (1)
Accountability Procedures 298 (2)
Theft and Pilferage 300 (4)
Planning for Security 304 (3)
Cargo in Transit 307 (2)
Suggested Sealing Systems and Procedures 309 (5)
Special Issues in Airline Security 314 (2)
Other Transportation Industry Responses 316 (1)
to Terrorism
Summary 316 (1)
Review Questions 317 (1)
References 317 (2)
Workplace Violence: Prevention and 319 (14)
Intervention
Introduction 319 (1)
Threat 320 (1)
Harassment 320 (1)
Attack 320 (1)
Sabotage 320 (1)
The Phenomenon of Workplace Violence 320 (2)
The Work Environment and Violence 322 (1)
Profiling Violent Behavior 323 (2)
Basic Levels of Violence 325 (1)
Preventing Workplace Violence 326 (1)
The Violence Intervention and Contingency 327 (1)
Team
Perpetrators' Rights 328 (1)
Intervention Strategy 329 (3)
Summary 332 (1)
Review Questions 332 (1)
References 332 (1)
Drugs in the Workplace 333 (12)
Introduction 333 (1)
Impact of Drug Use 334 (2)
Drug Testing 336 (2)
Spotting Drug Use 338 (1)
The Components of a Comprehensive 339 (3)
Substance Abuse Program
Summary 342 (1)
Review Questions 342 (1)
References 342 (3)
Retail Security 345 (24)
Introduction 345 (1)
Shoplifting 346 (10)
Checks and Credit/Debit Cards 356 (6)
Internal Theft 362 (4)
Summary 366 (1)
Review Questions 366 (1)
References 367 (2)
Terrorism and Other Tools of Destruction 369 (30)
Introduction 369 (2)
Current Issues 371 (1)
Historical Background 372 (3)
Implications of a Changing World 375 (1)
In Search of a Definition for 376 (2)
International Terrorism
Terrorism as a Tactic, Instrument, or 378 (2)
Method
Characterizing Modern Terrorism 380 (9)
Specific Threats and Responses 389 (3)
Other Specific Response Issues in the 392 (3)
United States
The Future/Summary 395 (1)
Review Questions 395 (1)
References 395 (4)
Computer and Information Security 399 (28)
Introduction 399 (3)
Types of Computer Systems 402 (2)
Networks 404 (2)
The Database Problems 406 (1)
The Need for Computer Security 406 (5)
Computer Systems Protection 411 (7)
Content Monitoring and Filtering 418 (2)
Dealing with Identity Theft 420 (2)
Other Data Resources Vulnerabilities 422 (1)
Summary 423 (1)
Review Questions 423 (1)
References 423 (4)
Specific Security Threats 427 (16)
Introduction 427 (1)
Economic/White-Collar Crime 427 (2)
Burglary and Robbery 429 (7)
Labor Disputes 436 (2)
Espionage 438 (1)
Piracy 439 (1)
Summary 440 (1)
Review Questions 440 (1)
References 441 (2)
Security: Its Problems, Its Future 443 (10)
Introduction 443 (1)
The Aftermath of September 11, 2001 443 (1)
Private Security Resources 444 (1)
Interaction and Cooperation 444 (1)
Limitations of Security 445 (1)
Trends 446 (1)
The Future 447 (3)
Summary 450 (1)
Review Questions 450 (1)
References 450 (3)
Appendix A Security Journals, Magazines, and 453 (2)
Newsletters
Appendix B World Wide Web Sites 455 (2)
Appendix C Security Surveys 457 (8)
Index 465