Healing Threads: Traditional Medicines of the Highlands and Islands
Author: Mary Beith
A fascinating guide to the traditions of the ancient Gaelic pharmacy, with a directory of remedies and practices.
Book review: Community Mental Health Reader or Aging with HIV
Identifying and Exploring Security Essentials
Author: Mary Clifford
Identifying and Exploring Security Essentials gives readers a rare, hands-an approach to the study of security issues. Written in a clear and easy-to-understand style, this new text from Prentice Hall will help readers understand the history and fundamentals of security.
Special features of Identifying and Exploring Security Essentials
- Newspaper articles, case studies, and other examples bring the material to life
- Sample security tools including a physical security survey
- Each chapter concludes with review questions and detailed discussion questions
- Wide array of appendices cover security careers, associations and certifications, Internet resources, and a historical security timeline
Identifying and Exploring Security Essentials goes beyond technical security information to show how to actively identify, meet, and evaluate security objectives in multiple environments. This book provides test cases and activities for readers to review, evaluate, and critique. These activities will help readers become confident in their abilities as they identify, research, and explore multiple levels of security-related information.
Table of Contents:
Preface | ||
Pt. I | Reviewing the Basics | 1 |
Ch. 1 | A History of Private Security: A Pervasive Enterprise | 37 |
Ch. 2 | Identifying the Essentials | 64 |
Ch. 3 | Studying Security Threats and the Related Risk Levels | 91 |
Ch. 4 | A Prevention System Overview: Defining the Overall Security Objective | 102 |
Pt. II | Internal Resources and Integration: Identifying Resources from Within | 119 |
Ch. 5 | Physical Security and Asset Protection | 123 |
Ch. 6 | Information and Computer Security | 142 |
Ch. 7 | Personnel and Security Management | 163 |
Ch. 8 | Integration as the Centerpiece: Meeting Overall Security Objectives | 192 |
Ch. 9 | A Sampling of Settings | 213 |
Pt. III | Exploring Essential External Connections | 235 |
Ch. 10 | Public and Private Police Interactions | 237 |
Ch. 11 | Legal Liability Issues | 270 |
Ch. 12 | Preparing an Emergency Plan and a Disaster Response | 287 |
Ch. 13 | Securing Tomorrow: Drafting the Future of Public Safety | 303 |
Ch. 14 | Review of the Target Environments | 319 |
App. A | Basic Security Plan | 323 |
App. B | Company X Request for Proposal: Contract Security Service Specifications | 342 |
App. C | Protection Officer Code of Ethics | 359 |
App. D | Security Time Line | 365 |
Index | 373 |
No comments:
Post a Comment