Security Operations Management
The second edition of Security Operations Management continues as the seminal reference on corporate security management operations. Revised and updated, topics covered in depth include: access control, selling the security budget upgrades to senior management, the evolution of security standards since 9/11, designing buildings to be safer from terrorism, improving relations between the public and private sectors, enhancing security measures during acute emergencies, and, finally, the increased security issues surrounding the threats of terrorism and cybercrime. An ideal reference for the professional, as well as a valuable teaching tool for the security student, the book includes discussion questions and a glossary of common security terms. Additionally, a brand new appendix contains contact information for academic, trade, and professional security organizations.
* Fresh coverage of both the business and technical sides of security for the current corporate environment
* Strategies for outsourcing security services and systems
* Brand new appendix with contact information for trade, professional, and academic security organizations
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
achieve action activities alarm systems applicant appraisal areas ASIS International assessed assets assigned behavior budget CCTV circumstances client conduct contractor corporation cost CPTED Crime Prevention criminal detection employee’s employees employment ethical evaluation example executive protection facility factors federal footcandles fraud goals hiring identify incidents individual internal interview investigation involved issues law enforcement liability loss measures needs negligent hiring occur organization percent performance Performance Appraisal person physical pin tumbler locks planning polygraph position pre-employment pre-employment screening private security private security personnel procedures proposal proprietary Pygmalion effect relevant responsibility RFID risk screening security directors security guard Security Management security officer security practitioners security programs security services specific standards subordinates supervisor tasks theft tion types U.S. Postal Service vendors White-collar crime Wi-Fi workers Workplace Violence York