Skip Navigation LinksASIS International / Store / Products / Discontinued

Discontinued Products

​​​​​​​​​​​​​These products are no longer available in the ASIS Store.​

 Publications

  • Art of Investigative Interviewing, 2nd Ed (The)
  • Biometrics: Identity Verification in a Networked World
  • Building a World-Class Compliance Program: Best Practices and Strategies for Success
  • Cargo Theft Prevention: A Handbook for Logistics Security
  • Closed Circuit Television, Third Edition
  • Communicating Emergency Preparedness: Strategies for Creating a Disaster Resilient Public
  • Confidential: Business Secrets: Getting Theirs - Keeping Yours, 2nd Ed
  • Corporate Reputation: 12 Steps to Safeguarding and Recovering Reputation
  • Crime Prevention for Houses of Worship, 1st Ed
  • Cross-Training for First Responders
  • Detecting Forgery in Fraud Investigations: The Insider's Guide
  • Detecting Lies and Deceit: Pitfalls and Opportunities, 2nd Ed
  • Disaster Communications in a Changing Media World
  • Electronic Security Systems: A Manager's Guide to Evaluating and Selecting System Solutions
  • Emergency Management and Tactical Response Operations
  • Emergency Response Planning for Corporate and Municipal Managers, 2nd Ed
  • Enterprise Risk Management and COSO: A Guide for Directors, Executives, and Practitioners
  • Foreign Corrupt Practices Act Compliance Guidebook: Protecting Your Organization from Bribery and Corruption
  • Guard Force Management, 2nd Ed
  • Healthcare Fraud: Auditing and Detection Guide
  • High-Technology Crime Investigator's Handbook: Establishing and Managing a High-Technology Crime Prevention Program, 2nd Ed
  • Homeland Security and Private Sector Business: Corporations’ Role in Critical Infrastructure Protection
  • Hospital Emergency Response Teams
  • Implementación De Sistemas De Protección Física: Guía Práctica
  • Interview for Success: A Practical Guide to Increasing Job Interviews, Offers and Salaries, 8th Ed
  • Introduction to Homeland Security, 3rd Edition
  • Introduction to International Disaster Management, 2nd Edition
  • Introduction to Investigations, 2nd Ed
  • Investigations Management
  • Jihadists and Weapons of Mass Destruction
  • Manual to Online Public Records (The), 3rd Edition
  • Maritime Security: An Introduction
  • Military Transition to Civilian Success
  • Persuading Senior Management with Effective, Evaluated Security Metrics
  • Peter the Drug Dog
  • Physical and Logical Security Convergence: Powered By Enterprise Security Management
  • Physical Security for IT
  • Practical Aspects of Interview and Interrogation, 2nd Ed
  • Protecting Schools and Universities from Terrorism: A Guide for Administrators and Teachers
  • Resilient Enterprise (The): Overcoming Vulnerability for Competitive Advantage
  • Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications
  • Retail Security: 150 Things You Should Know
  • Safe Hiring Manual (The), 2nd Edition
  • Securing Global Transportation Networks: A Total Security Management Approach
  • Security Clearance Manual: How to Reduce the Time It Takes to Get Your Government Clearance
  • Security Surveys
  • Security: An Introduction
  • Strategies for Protecting National Critical Infrastructure Assets: A Focus on Problem-Solving
  • Terror and Iraq: How We Can Better Combat Islamic Terrorism
  • The Comprehensive Guide to County, State, and Federal Public Record Sources, 10th Ed
  • Tourism Management: An Introduction, 4th Edition
  • Transportation and Cargo Security: Threats and Solutions
  • Transportation Systems Security
  • Trauma of Terrorism (The)
  • Workplace Violence: Before, During, and After

 Merchandise

  • ASIS Certification Coin-CPP
  • ASIS Duffel Bag - 2013
  • ASIS Fleece Jacket, Gray - Large
  • ASIS Knit Shirt - Women's 2XLarge
  • ASIS Knit Shirt - Women's Large
  • PCI Coin
  • PSP Golf Shirt - XLarge

 Webinars

  • Webinar: Active Shooters in Healthcare Environments: Protecting Patients, Staff, and Visitors (CD)
  • Webinar: Advanced Internet/Social Network Investigations and Background Checks (CD)
  • Webinar: Bullying, Harassment, Hazing & Domestic School Violence (CD)
  • Webinar: Casino Robberies: Protecting the Casino and Guests (CD)
  • Webinar: Communicating in a Crisis (CD)
  • Webinar: Critical Infrastructure Protection: The Way Ahead (CD)
  • Webinar: Effects Based Security: Optimize Manpower and Budget (CD)
  • Webinar: Emergency Management Interface with Public Safety Responders (CD)
  • Webinar: Enhancing Safety & Security in Nursing Homes (CD)
  • Webinar: High Risk Operations: Mexico, a Case Study for Security Supporting Business (CD)
  • Webinar: Hiring Practices in the Security Industry (CD)
  • Webinar: Impact of ACA on the Contract Security Industry (CD)
  • Webinar: Insider Threat Mitigation: Bridging the Gap Between IT Systems and Human Threats (CD)
  • Webinar: It Won't Happen Here—Security’s Integral Role in Workplace Violence Preparedness (CD)
  • Webinar: Lessons Learned: Trends in Extreme Violence in the Workplace (CD)
  • Webinar: Open Source Intelligence: How to Use Open Source Information as Intelligence (CD)
  • Webinar: Organizational Resilience—An International Perspective (CD)
  • Webinar: Practical Applications of Video Analytics (CD)
  • Webinar: Proactive Surveillance Operations (CD)
  • Webinar: Protect Your Perimeter: Technology Solutions for Organizational Success (CD)
  • Webinar: Ready, Steady, Engage! Affordable Effective Tips for Reducing Turnover (CD)
  • Webinar: Reducing Crime Through Community Engagement (CD)
  • Webinar: Reducing Risk of Violence in Schools (CD)
  • Webinar: Retail Data Security-Intersection of the Physical and Digital Worlds (CD)
  • Webinar: Security and Emergency Preparedness 2013 (CD)
  • Webinar: Security Responds to International Disasters (CD)
  • Webinar: So You Would Like to be a Writer...It's Easy (CD)
  • Webinar: Social Media and Cloud Computing Threats to Privacy, Security and Liberty (CD)
  • Webinar: Soft Targets: Hardening & Protecting People from Attack (CD)
  • Webinar: Stop Issuing Secure Credentials to Imposters! (CD)
  • Webinar: Strategic Planning Made Easy: How a Security Department can Compete to get Their Slice of the Budgetary Pie (CD)
  • Webinar: The Role of Protective Intelligence in Managing Threats Associated with Targeted Violence (CD)
  • Webinar: Twelve Symptoms of a School with Problems (CD)
  • Webinar: Workplace Violence—Managing the Program (CD)

 DVD/CD

  • Seminar DVD - Get Off My Cloud: Opportunities, Dangers, and Realities of Cloud Computing
  • Seminar DVD - Perspectives on Security, What’s Your Weakest Link?
  • Seminar DVD - Security Insights Program, Connecting the Dots: Security and Corporate Ethics