Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    gbv_1804084948
    Umfang: 1 online resource (256 pages).
    Ausgabe: First edition.
    ISBN: 9781003215851 , 1003215858 , 9781000545760 , 1000545768 , 9781000545777 , 1000545776
    Inhalt: 1. The Changing Face of Healthcare Security" How has Hospital Security Changed Since 9/11" Aspects of Hospital Security: How is Hospital Security Changing in the New Century? " Hospital Security in the 21st Century: What Should We Expect " The Changing Face of Hospital Security: Retooling for the Future " The Changing Face of Hospital Security2. Security Management" The Hidden Cost of Downsizing: Where Loyalty Dies, Fraud Grows: " Stretching the Security Dollar " Investigating in a New Environment " Shoplifter Profiles and Tips on How They Steal " Asking the Right Questions About Fire Prevention " Putting the Spotlight on Security " Improving the Dependability of an ID Program 3. Disaster PreparednessTraining Security Officers to Recognize the Perils of Weapons of Mass Destruction and Pandemic Flu Contaminates Training Security Operatives to Recognize the Perils of Weapons of Mass Exposure Contaminates - part II Disaster Planning: Training for the Perils of Weapons of Mass Exposure, 2020 4. The Security SurveyBeyond Target Hardening: Preparing Community-wide Security Surveys The Access Control Security Survey The Security Survey: A Prescription for Enhancing Security Aspects of the Security Survey: Distinctions Between Single-client, Multi-client, and Community-wide Security Surveys The Security Survey: An Investigative Tool The Security Survey: An Investigative Tool - Part II Revising the Security Survey The Many Faces of the Security Survey 5. Practical Crime PreventionAn Alternate Perspective on Healthcare Crime Prevention A Clinical Approach to Crime Detection A Clinical Approach to Hospital Security The Art and Science of Proactive Security Programming The Varied Roles of the Crime Prevention Expert How is Crime Risk Measured and Managed Using Access and ID Control to Prevent Workplace Violence Workplace Violence Prevention: A Guide to Active Shooter and Workplace Violence Resources Aspects of Crime and Violence Avoidance Squeezing the Most from Your Security Dollar6. Metrics and Data Application " An Alternative View in the Development of Security Metrics " Resources Available for Applying Metrics in Security and Safety Programming " Applying Metrics to 21st Century Healthcare Security7. Physical Security Applications " The Man Behind the Security Camera " Shell Hardening " Digital Security Technology Simplified " Determining and Implementing Successful Access Control Solutions8. Customer Service Initiatives " The Patient Wish List: Getting Customer Service Right " Creating a Customer Service Program for Healthcare Security 9. Auditing and Forensics" Auditing Proactive Security Programs " Auditing Investigative Techniques: Internal Auditing Alert " Auditing Hospital Security " Auditing Crime Analysis Programs " Auditing Warehouse and Loading Dock Security " Auditing Access Control Procedures " Auditing Loss Prevention Programs " The Environmental School of Criminology: Proactive vs. Reactive Security " Auditing Hospital Security: is your Security Program in Compliance " Security Auditing: a Prescription for Keeping Protection Programs Healthy " Aspects of Preparing for a "No Prior Notice" Regulatory Audit " Forensic Accounting and the Criminal Justice Process: Internal Auditing Alert " How Have the Terrorist Attacks of 9/11 Affected the Corporate Hiring Process " Background Checks: A Diagnostic Tool to Decipher Deception " A New Approach to Handling Incoming Verifications " Forensics Role in the Investigative Process 10. Fraud Detection and Prevention" Play it Safe: A Guide to Preventing Shoplifting, Fraud, and Employee Theft " A Team Approach to Fraud Prevention " Delving Deeper to Decipher Fraud " The Fraud Prevention Jackpot " Safeguarding Assets Against Fraud " Objections to Active Fraud Prevention " Steps in a Fraud Audit " Investigating Money Laundering Schemes " Fraud Audit Checklist " The Fraud Equation " Ten Questions an Entrepreneur Should Ask About Fraud " What is Business Espionage and How Can it be Effectively Controlled?" Auditing for Identity Fraud " Aspects of Fraud Prevention " Aspects of Controlling Fraud in Healthcare Facilities11. Interview and Interrogation" Interview vs. Interrogation " Demystifying the Investigative Process " Decrypting the Interrogation Process " The Art of Non-Target Interviewing " Effective Interview Techniques 12. VIP Protection " Aspects of Hospital Security: Protecting the VIP " Aspects of Hospital Security: Protecting the VIP - Part II
    Weitere Ausg.: ISBN 9781032105475
    Weitere Ausg.: ISBN 9781032105499
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 9781032105475
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz