A basic text on general security techniques, this book emphasizes the philosophical, moral and ethical responsibilities of the security officer, along with the elements of various specialties within the field.
This book is designed for not only the beginning student, but for ambitious security personnel seeking advancement and directors training staff in the field. It is important for security personnel, in this age of the computer, to understand the background and basic elements of security procedures. It is also important to understand this philosophy in order to develop programs which may be used in defending against charges of "inadequate security" in civil litigation.
This book is an update of a beginning text which has been used successfully in colleges and universities for twenty years. It updates the techniques of various specialties along with current technological approaches towards solving those security-related issues. It has left unchanged the philosophical, moral, and ethical approach to the security procedures, the abandonment of which has led to literally thousands of lawsuits against security departments and private guard companies, alleging "inadequate security" procedures, hiring and training.
New technologies, in almost every subcategory of the security industry, have changed the profession forever. Computers have assumed much of the performance formerly conducted by both trained and untrained security officers. Skills have changed to a degree where knowledge is determined by one's level of computer awareness. This book presents many of those new techniques and developments.
Updated and current information Retains philosophical, moral and ethical approach to security procedures Three contributed articles from specialists in their individual fields
Professionals - the working security officer, security directors Private training institutions Security department libraries, for training purposes New students at the college and university level
Part I: Introduction The Evolution of Security Developing A Proprietary Security Program Part II: Organizing For Security Security Organization and Staffing Duties and Responsibilities Security Uses of Photography Security Office and Facilities Security Relationships Part III: Internal Controls Access Control Personnel Clearance Document Control Fire Prevention and Control Emergency and Disaster Planning Theft and Pilferage Controls Retail Security by Charles A.Sennewald Part IV: External Threats and Special Problems Perimeter and Exterior Protection Executive Protection and Terrorism Specific Crime Problems Part V: Electronic Aids in Security Closed Circuit Television Communications Systems Alarms Automatic Access Control Part VI: Security and Society Security Authority: Theory and Practice New Directions in Security We Never Thought It Would Happen Here: Preventing Workplace Violence by Steve Kaufer and Jug W. Mattman Private Security Faces High Technology Crimes by Sanford Sherizen Appendix Bibliography
- No. of pages:
- © Butterworth-Heinemann 1999
- 10th February 1999
- eBook ISBN:
- Hardcover ISBN:
Berger achieves his goal of providing a valuable resource to anyone interested in learning why they do what they do. . . .this edition is updated while retaining its emphasis on fundamentals. Berger includes thought-provoking review questions at the end of each chapter. . . Berger provides valuable insight, an important training tool, and a useful resource. -Security Management