Readings contained in this book has been shaped with the interests of business and management programs in mind, as well as programs based within traditional security management and criminal justice milieus
Investigates motivational factors that contribute to loss and describes philosophies that can change the entire spectrum of employee dishonesty.
Explains how to evaluate the appropriateness of countermeasures, from a cost-effectiveness perspective.
Presents updated case studies and introduces existing and new methodologies and technologies for addressing present and future threats.
Counter threats such as terrorism, fraud, natural disasters, and information theft.
Provides policies, forms, and tips to help you understand the data you collect, and gives guidance along the way to make sure you are legally compliant with all avenues of background checks.
A step-by-step guide for creating and maintaining a comprehensive security program in any cultural facility or public institution.
Offers strategies for various types of business transactions, such as mergers and acquisitions, corporate-university R&D alliances, new product launches, early stage firms, and university-based spin-offs.
Helps people without formal security training—educators and school administrators—effectively address school risk.
Offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap.
Presents a framework that security planners and policymakers can use as a guide for cost-effective rail-security planning, specifically for the risk of terrorism.
Outlines threats to trade secrets that are commonly overlooked by security professionals and shows specific, concrete steps to minimize these threats.
Offers a holistic view of security planning for vulnerable capital projects, providing the strategic and tactical plans needed to protect large areas with a minimum investment in personnel and equipment.
includes a framework for implementing security throughout this growing system, directing security consultants, and system and network architects on how to keep the Smart Grid strong against attackers big and small.
Examines security in a wide range of contexts, spanning corporate issues such as personnel management and business continuity, and encompassing topics of terrorism and border security.