This is intended to provide public safety personnel a diagnostic tool to identify persons in their jurisdiction who might demonstrate such warning signs before their turn to violence.
This book is a must-have for any security and crisis manager.
This reference will be a valuable resource for security system designers, dealers and installers, security managers, and security consultants.
This book will assist you in developing awareness, identifying areas of prevention, and formulating a response to crime when it does occur so that your congregation may enjoy a safe environment in which to worship.
This book provides tips, key points, and a wealth of hard-earned knowledge necessary for avoiding pitfalls when establishing and/or managing a security program for a business.
This volume teaches how to combine, apply, and quantify these techniques to reach a numerical conclusion to the truthfulness of the interviewee.
This book outlines the instrumentation as well as the latest in questioning techniques and methods available to the professional interviewer to distinguish truth from deception.
This book is intended to help those with an interest in the executive protection field better understand what is involved in being an executive protection professional.
Presents practical definitions of workplace violence and the continuum of acts, from less severe to more severe, and a classification of workplace violence incidents based on the relationship of perpetrator to victim.
Hospitality Security: Managing Security in Today’s Hotel, Lodging, Entertainment, and Tourism Environment
Security practitioners worldwide will find this new book to be a valuable desk reference on project management and implementation of physical protection systems.
This timely, second edition presents the rapidly changing technology landscape of vastly improved image quality, better performance, and higher level of intelligence in the systems.
Identifies and examines best practices and recommended approaches, providing the reader with a variety of checklists and planning tools.
Dissects many facets and techniques about finding detailed information on people and businesses.
Proven approaches to enterprise security management.