Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008805724/catalog> ?p ?o. }
Showing items 1 to 31 of
31
with 100 items per page.
- catalog contributor b12346980.
- catalog created "2002.".
- catalog date "2002".
- catalog date "2002.".
- catalog dateCopyrighted "2002.".
- catalog description "Closed-Circuit Television (CCTV) -- Intrusion Detection -- Threat Analysis -- 13. Investigations -- Internal Theft -- Fraud -- Characteristics of Fraud -- Bribery -- Frauds Committed by Outsiders -- Workers' Compensation Fraud -- Problems in Prosecuting -- The Forensic Investigator -- Compliance Investigations -- Whistle-Blower Rules -- Investigative Intelligence Gathering -- Interview and Interrogation -- Kinesics -- Polygraph -- Physical Evidence -- Forensic Tests -- Incident Scene -- Security Officer Involvement -- Investigative Photography -- Testifying -- 14. Preemployment Screening -- Records Checking -- References Checking -- Drug and Alcohol Testing -- Paper and Pencil Testing -- Validity -- Problems in Design and Interpretation -- The Fair Credit Reporting Act -- 15. Emergency Management -- Anticipation -- Preparation -- Prevention and Response -- Business Continuity -- Fire Emergencies -- Medical Emergencies -- Natural Disasters -- Severe Windstorm -- ".
- catalog description "Conducting an Assessment Audit -- Developing Plans and Procedures -- Workplace Violence Policy -- The Warning Signs -- Stalking -- Psychological Profiling -- Training -- Preventive Techniques -- Nondisclosure of Potential Violence -- Implications of the Americans with Disabilities Act -- 21. Security Awareness -- Three Dimensions -- Awareness Is an Ongoing Process -- Awareness Is Local -- Modes for Promoting Awareness -- Avoiding Apathy -- Choosing, Formulating, and Presenting the Message -- The Spotlight.".
- catalog description "I. Principles -- 1. Historical Roots -- The Industrial Revolution -- Scientific Management -- Human Relations -- Operations Research -- Age of Technology -- Business Today -- 2. Strategy -- Core and Support Activities -- Outsourcing -- Risks -- The Importance of Technical Knowledge -- Predict, Quantify, and Control -- Strategy Imperatives -- Strategic Planning -- Effect of Policy on Planning -- 3. Leading -- Focus on the Future -- Manager versus Leader -- Competencies -- Empowerment -- Conflicting Values -- Following -- Adding Value -- Competition -- Loyalty -- Price of Leadership -- Leading in the 21st Century -- 4. Organizing the Security Group -- Staffing -- The Independent Contractor -- The Practices of Organizing -- Setting Objectives -- Resourcing to Meet Targets -- When Security Is a Line Responsibility -- Assigning Tasks -- Monitoring -- Terminating an Employee -- Managing the Interview -- Organizational Structures -- The Security Group Fit -- 5. Managing People -- ".
- catalog description "Includes bibliographical references and index.".
- catalog description "Maslow's Theory -- Maslow in the Security Environment -- People Development -- Performance Appraisal -- Setting Targets -- Reviewing Performance -- The Performance Appraisal Cycle -- Merit Rating -- Upward Feedback -- Position Evaluation -- 6. Managing Resources -- Budgeting -- The Zero-Based Budget -- Controlling Costs -- 7. Managing Change -- Designing Change -- Working Through People -- Teamwork in Effecting Change -- Familiar but Not Understood -- Technology and Change -- The Politics of Change -- Dealing with Change on a Personal Level -- Action Coaching -- 8. Decision Making -- Frame the Issue -- Collect Information -- Decide -- Examine Feedback -- II. Administration -- 9. Risk Management -- Assets Identification -- Threat Identification -- Probability Assessment -- Impact Assessment -- Frequency Assessment -- Manageability Assessment -- Identification of Countermeasures -- Review and Audit Technique -- Reporting the Results -- Follow-up -- Project Review Technique -- ".
- catalog description "Security Incident Causation Model (SICM) -- Applying the SICM Technique -- 10. Security Officer Operations -- Developing the Protective Scheme -- Staffing -- Skills Needed -- Tools and Equipment -- Proprietary versus Contract Security -- Selecting a Contractor -- Contract Performance -- Security Officer Supervision -- Monitoring -- Determining the Value of Security Officer Services -- Understanding the Contractor -- Mutual Respect -- Legal Issues -- Guard Dogs -- Life Safety -- 11. Physical Security -- Facility Protection -- Choosing the Safeguards -- Starting at the Perimeter -- Protective Barriers -- Protective Lighting -- Intrusion Detection -- Monitoring and Communication -- Tamper Detection -- Sensor Types -- Lock and Key Systems -- Types of Locks -- Key Control -- 12. Access Control -- Employee Badges and Visitor Passes -- Types of Identification Cards -- Traffic Control -- Materials Control -- Physical Security -- Layered Protection -- Business Rationale -- ".
- catalog description "Standard Operating Procedures -- Dealing with the Media -- 16. Management of Bomb Incidents -- Planning -- The Bomb Threat -- Bomb Types -- The Aftermath -- 17. Information Security -- Sensitive Information -- Proprietary Information -- Data Protection -- Data and Dollars -- Risk Assessment of Information Systems -- Cybervandalism -- Employee Behaviors -- The Intranet -- Protective Techniques -- Industrial Espionage -- Competitive Intelligence -- Product and Process -- 18. Substance Abuse Prevention -- The Rationale for Prevention -- The Security Leader's Role in Prevention -- Testing for Illegal Drugs -- Testing for Alcohol -- Working Through Others -- The Indicators of Abuse -- Substance Abuse Investigations -- 19. Executive Protection -- Kidnap Prevention -- Kidnap Planning -- Abduction -- The Personal Security Mission -- Event-Based Protection -- Absolute Protection Is Not Possible -- 20. Workplace Violence -- Forming a Team -- Assessing Readiness -- ".
- catalog extent "x, 393 p. :".
- catalog identifier "0750672714 (pbk. : alk. paper)".
- catalog issued "2002".
- catalog issued "2002.".
- catalog language "eng".
- catalog publisher "Boston : Butterworth-Heinemann,".
- catalog subject "658.4/7 21".
- catalog subject "HV8290 .F39 2001".
- catalog subject "Industries Security measures.".
- catalog subject "Personnel management.".
- catalog subject "Private security services.".
- catalog tableOfContents "Closed-Circuit Television (CCTV) -- Intrusion Detection -- Threat Analysis -- 13. Investigations -- Internal Theft -- Fraud -- Characteristics of Fraud -- Bribery -- Frauds Committed by Outsiders -- Workers' Compensation Fraud -- Problems in Prosecuting -- The Forensic Investigator -- Compliance Investigations -- Whistle-Blower Rules -- Investigative Intelligence Gathering -- Interview and Interrogation -- Kinesics -- Polygraph -- Physical Evidence -- Forensic Tests -- Incident Scene -- Security Officer Involvement -- Investigative Photography -- Testifying -- 14. Preemployment Screening -- Records Checking -- References Checking -- Drug and Alcohol Testing -- Paper and Pencil Testing -- Validity -- Problems in Design and Interpretation -- The Fair Credit Reporting Act -- 15. Emergency Management -- Anticipation -- Preparation -- Prevention and Response -- Business Continuity -- Fire Emergencies -- Medical Emergencies -- Natural Disasters -- Severe Windstorm -- ".
- catalog tableOfContents "Conducting an Assessment Audit -- Developing Plans and Procedures -- Workplace Violence Policy -- The Warning Signs -- Stalking -- Psychological Profiling -- Training -- Preventive Techniques -- Nondisclosure of Potential Violence -- Implications of the Americans with Disabilities Act -- 21. Security Awareness -- Three Dimensions -- Awareness Is an Ongoing Process -- Awareness Is Local -- Modes for Promoting Awareness -- Avoiding Apathy -- Choosing, Formulating, and Presenting the Message -- The Spotlight.".
- catalog tableOfContents "I. Principles -- 1. Historical Roots -- The Industrial Revolution -- Scientific Management -- Human Relations -- Operations Research -- Age of Technology -- Business Today -- 2. Strategy -- Core and Support Activities -- Outsourcing -- Risks -- The Importance of Technical Knowledge -- Predict, Quantify, and Control -- Strategy Imperatives -- Strategic Planning -- Effect of Policy on Planning -- 3. Leading -- Focus on the Future -- Manager versus Leader -- Competencies -- Empowerment -- Conflicting Values -- Following -- Adding Value -- Competition -- Loyalty -- Price of Leadership -- Leading in the 21st Century -- 4. Organizing the Security Group -- Staffing -- The Independent Contractor -- The Practices of Organizing -- Setting Objectives -- Resourcing to Meet Targets -- When Security Is a Line Responsibility -- Assigning Tasks -- Monitoring -- Terminating an Employee -- Managing the Interview -- Organizational Structures -- The Security Group Fit -- 5. Managing People -- ".
- catalog tableOfContents "Maslow's Theory -- Maslow in the Security Environment -- People Development -- Performance Appraisal -- Setting Targets -- Reviewing Performance -- The Performance Appraisal Cycle -- Merit Rating -- Upward Feedback -- Position Evaluation -- 6. Managing Resources -- Budgeting -- The Zero-Based Budget -- Controlling Costs -- 7. Managing Change -- Designing Change -- Working Through People -- Teamwork in Effecting Change -- Familiar but Not Understood -- Technology and Change -- The Politics of Change -- Dealing with Change on a Personal Level -- Action Coaching -- 8. Decision Making -- Frame the Issue -- Collect Information -- Decide -- Examine Feedback -- II. Administration -- 9. Risk Management -- Assets Identification -- Threat Identification -- Probability Assessment -- Impact Assessment -- Frequency Assessment -- Manageability Assessment -- Identification of Countermeasures -- Review and Audit Technique -- Reporting the Results -- Follow-up -- Project Review Technique -- ".
- catalog tableOfContents "Security Incident Causation Model (SICM) -- Applying the SICM Technique -- 10. Security Officer Operations -- Developing the Protective Scheme -- Staffing -- Skills Needed -- Tools and Equipment -- Proprietary versus Contract Security -- Selecting a Contractor -- Contract Performance -- Security Officer Supervision -- Monitoring -- Determining the Value of Security Officer Services -- Understanding the Contractor -- Mutual Respect -- Legal Issues -- Guard Dogs -- Life Safety -- 11. Physical Security -- Facility Protection -- Choosing the Safeguards -- Starting at the Perimeter -- Protective Barriers -- Protective Lighting -- Intrusion Detection -- Monitoring and Communication -- Tamper Detection -- Sensor Types -- Lock and Key Systems -- Types of Locks -- Key Control -- 12. Access Control -- Employee Badges and Visitor Passes -- Types of Identification Cards -- Traffic Control -- Materials Control -- Physical Security -- Layered Protection -- Business Rationale -- ".
- catalog tableOfContents "Standard Operating Procedures -- Dealing with the Media -- 16. Management of Bomb Incidents -- Planning -- The Bomb Threat -- Bomb Types -- The Aftermath -- 17. Information Security -- Sensitive Information -- Proprietary Information -- Data Protection -- Data and Dollars -- Risk Assessment of Information Systems -- Cybervandalism -- Employee Behaviors -- The Intranet -- Protective Techniques -- Industrial Espionage -- Competitive Intelligence -- Product and Process -- 18. Substance Abuse Prevention -- The Rationale for Prevention -- The Security Leader's Role in Prevention -- Testing for Illegal Drugs -- Testing for Alcohol -- Working Through Others -- The Indicators of Abuse -- Substance Abuse Investigations -- 19. Executive Protection -- Kidnap Prevention -- Kidnap Planning -- Abduction -- The Personal Security Mission -- Event-Based Protection -- Absolute Protection Is Not Possible -- 20. Workplace Violence -- Forming a Team -- Assessing Readiness -- ".
- catalog title "Contemporary security management / John J. Fay.".
- catalog type "text".