Thursday, February 12, 2009

Healing Threads or Identifying and Exploring Security Essentials

Healing Threads: Traditional Medicines of the Highlands and Islands

Author: Mary Beith

A fascinating guide to the traditions of the ancient Gaelic pharmacy, with a directory of remedies and practices.



Book review: Community Mental Health Reader or Aging with HIV

Identifying and Exploring Security Essentials

Author: Mary Clifford

Identifying and Exploring Security Essentials gives readers a rare, hands-an approach to the study of security issues. Written in a clear and easy-to-understand style, this new text from Prentice Hall will help readers understand the history and fundamentals of security.

Special features of Identifying and Exploring Security Essentials

  • Newspaper articles, case studies, and other examples bring the material to life
  • Sample security tools — including a physical security survey
  • Each chapter concludes with review questions and detailed discussion questions
  • Wide array of appendices cover security careers, associations and certifications, Internet resources, and a historical security timeline

Identifying and Exploring Security Essentials goes beyond technical security information to show how to actively identify, meet, and evaluate security objectives in multiple environments. This book provides test cases and activities for readers to review, evaluate, and critique. These activities will help readers become confident in their abilities as they identify, research, and explore multiple levels of security-related information.



Table of Contents:
Preface
Pt. IReviewing the Basics1
Ch. 1A History of Private Security: A Pervasive Enterprise37
Ch. 2Identifying the Essentials64
Ch. 3Studying Security Threats and the Related Risk Levels91
Ch. 4A Prevention System Overview: Defining the Overall Security Objective102
Pt. IIInternal Resources and Integration: Identifying Resources from Within119
Ch. 5Physical Security and Asset Protection123
Ch. 6Information and Computer Security142
Ch. 7Personnel and Security Management163
Ch. 8Integration as the Centerpiece: Meeting Overall Security Objectives192
Ch. 9A Sampling of Settings213
Pt. IIIExploring Essential External Connections235
Ch. 10Public and Private Police Interactions237
Ch. 11Legal Liability Issues270
Ch. 12Preparing an Emergency Plan and a Disaster Response287
Ch. 13Securing Tomorrow: Drafting the Future of Public Safety303
Ch. 14Review of the Target Environments319
App. ABasic Security Plan323
App. BCompany X Request for Proposal: Contract Security Service Specifications342
App. CProtection Officer Code of Ethics359
App. DSecurity Time Line365
Index373

No comments:

Post a Comment