Cargando…

Effective security management /

Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is id...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Sennewald, Charles A., 1931- (Autor), Baillie, Curtis (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Kidlington, Oxford, UK : Butterworth-Heinemann is an imprint of Elsevier, 2015.
Edición:Sixth edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn919756104
003 OCoLC
005 20231120112019.0
006 m o d
007 cr cnu---unuuu
008 150903s2015 enk ob 001 0 eng d
040 |a OPELS  |b eng  |e rda  |e pn  |c OPELS  |d OCLCO  |d OCLCF  |d OCLCO  |d YDXCP  |d U3W  |d D6H  |d DEHBZ  |d NLE  |d CEF  |d AU@  |d WYU  |d UKMGB  |d GGVRL  |d S2H  |d OCLCO  |d VT2  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB595506  |2 bnb 
015 |a GBB8I7335  |2 bnb 
016 7 |a 017445903  |2 Uk 
016 7 |a 019056889  |2 Uk 
019 |a 932054948  |a 941830970  |a 1066625678  |a 1235834809 
020 |a 9780128027905  |q (PDF ebook) 
020 |a 0128027908 
020 |a 0128027746  |q (hbk.) 
020 |a 9780128027745 
020 |z 9780128027745 
035 |a (OCoLC)919756104  |z (OCoLC)932054948  |z (OCoLC)941830970  |z (OCoLC)1066625678  |z (OCoLC)1235834809 
050 4 |a HV8290 
072 7 |a COM  |x 060000  |2 bisacsh 
072 7 |a COM  |x 060080  |2 bisacsh 
072 7 |a UBW  |2 bicssc 
072 7 |a UNN  |2 bicssc 
082 0 4 |a 658.4/7  |2 23 
100 1 |a Sennewald, Charles A.,  |d 1931-  |e author. 
245 1 0 |a Effective security management /  |c Charles A. Sennewald, Curtis Baillie. 
250 |a Sixth edition. 
264 1 |a Kidlington, Oxford, UK :  |b Butterworth-Heinemann is an imprint of Elsevier,  |c 2015. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers. The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media. 
588 0 |a Online resource; title from PDF title page (ScienceDirect, viewed September 3, 2015). 
505 0 |a Front Cover -- Effective Security Management -- Copyright Page -- Contents -- Preface -- Acknowledgments -- Introduction -- Managing the Organization -- Managerial Acts -- Managerial Functions -- The Successful Manager -- Characteristics of the Successful Manager -- 1 General Security Management -- 1 General Principles of Organization -- Organization Principles -- Logical Division of Work -- Purpose -- Process or Method -- Clientele -- Time -- Geography -- Clear Lines of Authority and Responsibility -- Span of Control -- Unity of Command -- Responsibility, Authority, and Accountability -- Coordination to Meet Organizational Goals -- Where Security Fits in the Organizational Structure -- The Changing Role of Security -- Security's Contribution to Profits -- To Whom Does Security Report? -- The Difference between Corporate and Company Security -- Summary -- Review -- 2 Organizational Structure -- The Informal Organization -- Subunit Structures -- Corporate Culture -- Additional Organizational Structure -- Summary -- Review -- 3 Security's Role in the Organization -- The Protective Service Role -- Special Services -- Executive's Home Security Survey -- Investigative Assistance -- Bodyguard/Escort Service -- Emergency Service -- Educational Services -- General Security Programs -- Supervisory Training Sessions -- Employee Self-Protection Programs -- Unit or Departmental Presentations -- Management Services -- Summary -- Review -- 4 The Security Director's Role -- The Security Director ... -- As a Leader -- As a Company Executive -- As an Executive with High Visibility -- As an Executive with a Broad Profile -- As an Innovator -- As a Counselor and Advisor (In-House Security Consultant) -- As a Trainer -- As a Contemporary Professional -- As a Goal Setter and Strategic Planner -- The New Security Director -- Summary -- Review. 
505 8 |a 5 The Security Supervisor's Role -- The Supervisor as an Inspector -- The Supervisor and the Individual Employee -- Supervisory Authority -- The Supervisor as the "In-Between" Person -- The Supervisor's Span of Control -- One Boss -- Automatic Shifting in the Line of Command -- Functional or Staff Supervision -- Supervisory Training -- Summary -- Review -- 6 The Individual Security Employee -- Standards of Conduct -- Courtesy -- Responsibility -- Due Process -- Cooperation -- Personal Integrity -- Self-Respect -- Honesty -- Cleanliness -- Stability -- Fidelity -- Morality -- Attitude -- Summary -- Review -- 7 Ethics and Conflicts of Interest -- Deciding between Right and Wrong: Listening to Our Inner Voice -- The Need for Ethics-Based Policies -- Higher Standard of Expectations -- Establishing a Business Ethics Policy -- Train Employees to Your Expectations -- Reporting Potential Unethical Conduct -- Deciding Ethical Dilemmas -- Identifying and Reporting Potential Conflicts of Interest -- Creating a Conflict of Interest Reporting Program -- Summary -- Review -- 2 Security Personnel Management -- 8 Hiring Security Personnel -- Hiring -- Recruiting -- Entry- or First-Level Positions -- Non-Entry-Level Recruiting -- Initial Interviewing -- Initial Human Resource Interview -- The Initial Security Interview -- Seven Interviewing Rules -- Secondary Interviewing -- Selection of Best Candidate -- Background Investigation of Applicant -- Job Offer -- Summary -- Review -- 9 Job Descriptions -- Accuracy and Completeness in Describing the Job -- Undesirable -- Desirable -- Matching Applicant to the Job -- Undesirable -- Desirable -- Employee's Understanding of the Job -- Matching Training to Job Description -- Performance Evaluations Based on Job Descriptions -- Job Descriptions are Current -- Composition of the Job Description -- Sample Job Description. 
505 8 |a Advantages of Multiple Layers -- Temporary Promotions -- Retreating -- Summary -- Review -- 14 Communication -- Types of Communication -- Verbal-Down -- Verbal-Up -- Written-Down -- Department Handbook or Manual -- Departmental Newsletter -- Written-Horizontal -- Written-Up -- Verbal-Horizontal -- Action -- About Listening -- Summary -- Review -- 15 Career (Proprietary) versus Noncareer (and Contract) Personnel -- Career Personnel -- Advantages of Career Personnel -- Example -- Disadvantages of Career Personnel -- Example -- Part-Time Noncareer Personnel -- Advantages of Part-Time Noncareer Personnel -- Example -- Disadvantages of Part-Time Noncareer Personnel -- Example -- Contractual Noncareer Personnel -- Advantages of Contractual Noncareer Personnel -- Example -- Disadvantages of Contractual Noncareer Personnel -- Example -- Combining Career and Noncareer Personnel -- Summary -- Review -- 3 Operational Management -- 16 Planning and Budgeting -- What is a Budget? -- Why Do We Have a Budget? -- When is a Budget Prepared? -- Who Participates in the Budgeting Process? -- Top-Down and Bottom-Up Process -- Phase One: Senior Management-Top-Down -- Phase Two: Security (Middle) Management-Bottom-Up -- Phase Three: Senior Management-Top-Down -- How is a Budget Prepared? -- Salary Expense Budget -- Sundry Expense Budget -- Justifying the Security Budget -- Summary -- Review -- 17 Program Management -- The Security Inspection Process -- Support of Senior Management -- Continuous Security Inspections -- Formal or Informal Security Inspections -- Structured or Unstructured Inspections -- Warehouse Exterior -- Who Conducts the Inspection? -- Assessment of Risks and Countermeasures -- Risk Assessment -- Selection of Countermeasures -- Procedural Controls -- Hardware -- Electronics -- Personnel -- Assessment of Countermeasures. 
505 8 |a Inspecting for Compliance with Procedures -- Statistics in Program Management -- Summary -- Review -- 18 Risk -- Risk Defined -- Risk Management Programs and the Security Professional's Role -- Risk Program Components -- Risk Analysis -- Risk Assessment and Risk Rating -- Risk Mitigation -- Reporting -- Summary -- Review -- 19 Crisis Management -- Crisis Management Defined -- Genesis of the Crisis Management Team -- The Media and Public Threat -- Composition of the Crisis Management Team -- Communication -- The Crisis Management Team Leader (CMTL) -- The Crisis Plan -- Red Teaming: Seeking Out Company Security Vulnerabilities -- Summary -- Review -- 20 The Security Survey -- What is a Security Survey? -- The Purpose of a Security Survey -- Defining Security Survey Goals -- Building a Survey Program: Components of a Security Survey -- Components of a Security Survey -- Summary -- Review -- 21 International Security Standards -- Introduction -- What is a Standard? -- International Standards Organization -- International Security Standards -- European Standardization Organizations -- National Standards Bodies -- American National Standards Institute -- British Standards Organization -- Examples of International Security Standards -- Information Security: ISO/IEC 27001 -- Business Continuity Management: ISO 22301 -- Supply Chain Security Management: ISO 28000 -- International Ship and Port Facilities Security Code -- BS 8549:2006: Security Consultancy: Code of Practice -- Summary -- Review -- 22 Office Administration -- Description of Functions -- Supervision -- Administrative Assistant -- Reception -- Clerical -- Records -- Record Filing Systems -- Control Ledger -- Master Index -- File Control -- Mail -- Office Security -- The Office Environment -- Summary -- Review -- 23 Written Policies and Procedures -- Historical Evolution -- Policy. 
504 |a Includes bibliographical references and index. 
650 0 |a Private security services  |x Management. 
650 0 |a Industries  |x Security measures. 
650 0 |a Retail trade  |x Security measures. 
650 6 |a Services priv�es de s�ecurit�e  |0 (CaQQLa)201-0076789  |x Gestion.  |0 (CaQQLa)201-0380063 
650 6 |a Industrie  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0023409 
650 6 |a Commerce de d�etail  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0032672 
650 7 |a Industries  |x Security measures  |2 fast  |0 (OCoLC)fst00971955 
650 7 |a Private security services  |x Management  |2 fast  |0 (OCoLC)fst01077618 
650 7 |a Retail trade  |x Security measures  |2 fast  |0 (OCoLC)fst01096139 
700 1 |a Baillie, Curtis,  |e author. 
776 0 8 |i Print version:  |z 9780128027745 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128027745  |z Texto completo