𝔖 Scriptorium
✦   LIBER   ✦

📁

Introduction to Private Security, 2nd Edition

✍ Scribed by John S. Dempsey


Publisher
Wadsworth Publishing
Year
2010
Tongue
English
Leaves
478
Edition
2nd
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


PRIVATE SECURITY focuses on practical, real-world concepts and applications and includes detailed coverage of everything from industry background and related law to premise, retail, business, employment, and information/computer security as well as investigation, surveillance, and even homeland security. Throughout, the emphasis is on giving readers a clear sense of the numerous career opportunities available in this rapidly expanding field - including real-world insight on how to get a job in private security, concrete information on the skills needed, and succinct overviews of day-to-day job responsibilities.

✦ Table of Contents


Front Cover......Page 1
Title Page......Page 2
Copyright Page......Page 3
Contents......Page 7
Preface......Page 12
CHAPTER 1 The History and Professionalization of Private Security......Page 15
Early Development of Private Security......Page 16
Private Security in Ancient Rome......Page 17
Private Security in England......Page 18
Private Security in the United States......Page 21
Professionalization of Private Security......Page 29
College Education and Private Security......Page 35
Ethics and Private Security......Page 37
Summary......Page 42
Key Terms......Page 43
CHAPTER 2 The Business of the Private Security Industry......Page 44
What Is the Private Security Industry?......Page 45
Size and Scope of the Private Security Industry......Page 49
Why Do We Have Private Security?......Page 57
Licensing, Regulating, Hiring, and Training Standards in the Private Security Industry......Page 59
Summary......Page 68
KeyTerms......Page 69
CHAPTER 3 Private Security Concepts, Tools, and Systems Convergence......Page 70
Private Security Concepts......Page 71
Private Security Tools......Page 80
Private Security Systems Convergence......Page 97
Summary......Page 100
KeyTerms......Page 101
CHAPTER 4 Private Security Law......Page 102
Law......Page 103
The U.S. Legal System......Page 105
The Private Justice System......Page 107
The Legal Powers of Private Security......Page 108
Legal Liability of Private Security......Page 114
Courtroom Testimony and Private Security Officers......Page 120
Summary......Page 125
KeyTerms......Page 126
CHAPTER 5 Premises Security......Page 127
Property and Premises Crimes......Page 128
The Police, Private Security, and Property Crime......Page 129
Residential Locations......Page 132
Hospitals and Healthcare Facilities......Page 134
Educational Facilities......Page 137
Houses of Worship and Cemeteries......Page 141
Transportation Facilities......Page 143
Summary......Page 151
KeyTerms......Page 152
CHAPTER 6 Business Security......Page 153
Stores and Other Businesses......Page 154
Entertainment Facilities......Page 166
Summary......Page 172
KeyTerms......Page 173
CHAPTER 7 Retail Security and Loss Prevention......Page 174
The Retail Shrinkage Problem......Page 175
Reducing the Shrinkage Problem......Page 183
Academic and Professional Research in Loss Prevention......Page 198
Summary......Page 203
KeyTerms......Page 204
CHAPTER 8 Personal Security......Page 205
Personal Security in the United States......Page 206
Private Security Efforts for Personal Security......Page 207
Security While Living or Traveling Abroad......Page 216
Self-Protection Efforts......Page 218
Special Issues Regarding Personal Safety......Page 224
Summary......Page 245
KeyTerms......Page 246
CHAPTER 9 Employment-Related Security......Page 247
Need for Employment-Related Security......Page 251
Background Investigations......Page 254
Employment-Related Drug Testing or Drug Screening......Page 268
Sexual Harassment in the Workplace......Page 274
Employee Monitoring......Page 276
Employee-Misconduct Investigations......Page 279
Summary......Page 281
KeyTerms......Page 283
CHAPTER 10 Information and Computer Security......Page 284
The Computer Crime Problem in Business and Society......Page 286
Cybercrime and Cyber Problems......Page 288
How Organizations Maintain Computer Security......Page 307
Investigating Computer Crime......Page 311
Summary......Page 318
Key Terms......Page 319
CHAPTER 11 Investigative Security......Page 320
Major Forms of Private-Sector Investigations......Page 321
Overview of Private-Sector Investigations......Page 325
Major Types of Private-Sector Noncriminal Investigations......Page 328
Major Types of Private-Sector Criminal Investigations......Page 331
Information Resources for Private-Sector Investigators......Page 342
Summary......Page 345
Key Terms......Page 346
CHAPTER 12 Surveillance and Undercover Operations......Page 347
Definition and Purposes of Surveillance......Page 348
The Surveillance......Page 351
Debriefing the Surveillance......Page 354
Technological Surveillance Devices......Page 355
Definition and Purposes of Undercover Operations......Page 358
Types of Undercover Operations......Page 359
The Undercover Operation......Page 360
Advice from Experts......Page 363
Danger in the Undercover Operation and Illegal Activity......Page 364
Summary......Page 366
Key Terms......Page 367
CHAPTER 13 Private and Public Partnerships for Security......Page 368
Need for Cooperation......Page 369
Privatization......Page 371
Private and Public Partnerships......Page 372
Private and Public Partnerships against Terrorism......Page 382
Police Officers Working for Private Security Providers (Moonlighting)......Page 386
Private Security Officers Working for Government Agencies......Page 387
Community Crime-Prevention Programs......Page 389
Summary......Page 393
Key Terms......Page 394
CHAPTER 14 Homeland Security......Page 395
Homeland Security......Page 396
Terrorism......Page 399
Government Efforts for Homeland Security......Page 401
Private Security Efforts for Homeland Security......Page 404
Private Security Firms and the U.S. Military Abroad......Page 414
Summary......Page 416
Key Terms......Page 418
Glossary......Page 419
Notes......Page 427
Bibliography......Page 458
Index......Page 467

✦ Subjects


Безопасность жизнедеятельности и охрана труда;Безопасность жизнедеятельности (БЖД);


📜 SIMILAR VOLUMES


Introduction to Private Security , Fifth
✍ Kären M. Hess 📂 Library 📅 2008 🏛 Wadsworth Publishing 🌐 English

INTRODUCTION TO PRIVATE SECURITY, Fifth Edition, provides a comprehensive, accessible, state-of-the-art overview of private security, its principles, its legal authority, its growing role in the criminal justice system, and its impact on society. Newly updated with expanded coverage of important cur

Introduction to Vygotsky, 2nd Edition
✍ Harry Daniels 📂 Library 📅 2005 🌐 English

Lev Vygotsky provided the twentieth century with an enticing mix of intellectual traditions within an attempt to provide an account of the social formation of the mind. His legacy is an exciting, but at times chaotic fusion of ideas. An Introduction to Vygotsky, Second Edition provides students with

Introduction to Econometrics, 2nd Editio
✍ James H. Stock, Mark W. Watson 📂 Library 📅 2006 🏛 Addison Wesley 🌐 English

Designed for a first course in introductory econometrics, <I>Introduction to Econometrics,</I> reflects modern theory and practice, with interesting applications that motivate and match up with the theory to ensure students grasp the relevance of econometrics. Authors James H. Stock and Mark W. Wats

Introduction to Probability, 2nd Edition
✍ Dimitri P. Bertsekas, John N. Tsitsiklis 📂 Library 📅 2008 🏛 Athena Scientific 🌐 English

An intuitive, yet precise introduction to probability theory, stochastic processes, and probabilistic models used in science, engineering, economics, and related fields. The 2nd edition is a substantial revision of the 1st edition, involving a reorganization of old material and the addition of new m

Introduction to Probability, 2nd Edition
✍ Dimitri P. Bertsekas, John N. Tsitsiklis 📂 Library 📅 2008 🏛 Athena Scientific 🌐 English

An intuitive, yet precise introduction to probability theory, stochastic processes, and probabilistic models used in science, engineering, economics, and related fields. The 2nd edition is a substantial revision of the 1st edition, involving a reorganization of old material and the addition of new m