Security for business professionals : how to plan, implement, and manage your company's security program /
Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an existing security program. Th...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam :
Butterworth-Heinemann,
[2014]
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Front Cover; Security for Business Professionals: How to Plan, Implement, and Manage Your Company's Security Program; Copyright; Dedication; Contents; About the Author; 1
- Leadership and Management; 1.1 Relation Between Leadership and Management; 1.2 Leadership Techniques and Traits; 1.3 Management Techniques and Traits; 1.4 Conclusions Regarding Leadership and Management; References; Part 1
- Security Planning Considerations; 2
- Safety and Security Principles; 2.1 Overview of Safety and Security Principles; 2.2 Preparatory Actions to Emergency Incidents; 2.3 Security Fundamentals.
- 2.4 Balancing Security Measures with Business Operations2.5 Summary; 2.6 Safety and Security Principles Checklist; References; 3
- Security Plan Development and Risk Assessment; 3.1 Safety and Security Plans and Procedures; 3.2 Risk Assessment; 3.3 Quantifying Safety and Security Initiatives; 3.4 Summary of Security Plan Development and Risk Assessment; 3.5 Security Plan Development and Risk Assessment Checklist; References; 4
- Safety and Security Program Administration; 4.1 OSHA Employer Safety Requirements; 4.2 Considerations and Staffing for Security Guard Forces.
- 4.3 Security Measurements and Metrics4.4 Summary of Safety and Security Program Administration Areas; 4.5 Safety and Security Program Administration Checklist; References; 5
- Facility Security Design; 5.1 Crime Prevention through Environmental Design; 5.2 Conclusions Regarding Facility Security Design; Reference; Part 2
- Security Program Areas; 6
- Physical Security; 6.1 Overview; 6.2 Perimeter Security Measures; 6.3 Doors and Windows; 6.4 Lighting; 6.5 Access Control; 6.6 Alarm Systems; 6.7 Closed-Circuit Television; 6.8 Security Integration Systems; 6.9 Safes and Vaults; 6.10 Summary.
- Reference7
- Information Security; 7.1 Overview; 7.2 Confidentiality; 7.3 Integrity; 7.4 Availability; 7.5 Information Security Summary; References; 8
- Personnel Security; 8.1 Conducting the Pre-employment Screening; 8.2 Employee Investigations; 8.3 Protecting Employees from Discrimination and Unfounded Allegations; 8.4 Summary; References; Part 3
- Emergency Response and Training; 9
- Emergency Response and Contingency Planning; 9.1 Emergency Response Planning Factors; 9.2 Types of Emergency Incidents; 9.3 Additional Considerations Related to Emergency Planning Procedures; 9.4 Summary.
- Reference10
- Safety and Security Training Program; 10.1 Initial Safety and Security Training; 10.2 Recurring Safety and Security Training; 10.3 Safety and Security Exercises; 10.4 Conclusions on Safety and Security Training; Index.