Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Oxford :Butterworth-Heinemann,
    UID:
    edoccha_9960073840102883
    Format: 1 online resource (xv, 214 pages)
    Edition: 1st edition
    ISBN: 0-12-800917-9
    Series Statement: Gale eBooks
    Content: Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. A good security assessment is a fact-finding process that determines an organization's state of security protection. It exposes vulnerabilities, determines the potential for losses, and devises a plan to address these security concerns. While most security professionals have heard of a security assessment, many do not know how to conduct one, how it's used, or how to evaluate what they have found. Security Risk Assessment offers secur
    Note: Includes index. , Front Cover; Security RiskAssessment; Copyright; Contents; Acknowledgments; About the Author; Preface; Chapter 1 - Introduction to Security Risk Assessments; WHAT IS A SECURITY RISK ASSESSMENT?; SECURITY RISK ASSESSMENT INTENT; WHO WILL CONDUCT THE ASSESSMENT?; HOW OFTEN DO I NEED TO COMPLETE AN ASSESSMENT?; HOW LONG WILL THIS PROCESS TAKE?; Chapter 2 - Preassessment Planning; SERVICES AGREEMENT; PROJECT MANAGEMENT; IDENTIFY THE PARTICIPANTS; PROJECT SCHEDULE; BUDGETING CONSIDERATIONS; PROJECT ASSUMPTIONS; DELIVERABLES; Chapter 3 - Project Management , SECURITY MANAGEMENT VERSUS SECURITY CONSULTANTINTERNAL PERSONNEL; SECURITY CONSULTANTS; Chapter 4 - Defining the Project Scope; THE PROJECT SCOPE; MEASUREMENT STANDARDS; LOCATIONS INCLUDED; Chapter 5 - Information Gathering; INTERNAL SOURCES; EXTERNAL SOURCES; STAFF SURVEY; PROJECT INTERVIEWS; Chapter 6 - Physical Security Assessment; KICKOFF MEETING; INTERVIEWS; CONDUCTING THE ASSESSMENT; BUILDING EXTERIOR; BUILDING INTERIOR; Chapter 7 - Security Department Operations; MANAGEMENT REVIEW; SECURITY CULTURE; MANAGEMENT SPAN OF CONTROL; SECURITY MANAGEMENT PLAN , STATUTORY AND REGULATORY REQUIREMENTSSECURITY STAFF SCHEDULING; SECURITY PATROL OPERATIONS; SECURITY POLICIES; SECURITY RECORDKEEPING; SECURITY INCIDENT REPORT FOLLOW-UP; Chapter 8 - Security Training; STAFF SECURITY AWARENESS TRAINING; SECURITY OFFICER TRAINING; TRAINING DOCUMENTATION; FREQUENCY OF TRAINING; PROFESSIONAL CERTIFICATIONS; TRAINING RESOURCES; SUMMARY; Chapter 9 - Workplace Violence Risks and Vulnerabilities; VIOLENCE INDICATORS; SUSPECT PROFILING; WORKPLACE VIOLENCE RISK ASSESSMENT; DOCUMENTATION REVIEW; THREAT ASSESSMENT TEAM; PREVENTION STRATEGIES; RISK FORESEEABILITY , SUMMARYChapter 10 - Financial Risk Assessment; FINANCIAL ASSET MANAGEMENT; CASH HANDLING; PAID PARKING; LOST AND FOUND; TRANSPORTATION OF MONEY; FIDUCIARY RESPONSIBILITY; Chapter 11 - Security Technology Assessment; LOCKS AND KEYS; SECURITY CAMERAS; SECURITY ALARMS; MASS NOTIFICATION SYSTEMS; SECURITY OFFICER EQUIPMENT; SPECIALIZED SECURITY EQUIPMENT; SUMMARY; Chapter 12 - Access Control; LOCK AND KEY CONTROL; CIPHER LOCKS; ELECTRONIC CARD ACCESS CONTROL; DOOR HARDWARE; VISITOR MANAGEMENT; CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN (CPTED); GEOGRAPHIC CONSIDERATIONS; BIOMETRICS , Chapter 13 - Legal Considerations and Prevention StrategiesLITIGATION AVOIDANCE; CRIME PREVENTION; LOSS PREVENTION STRATEGIES; SECURITY VULNERABILITY ANALYSIS; THREAT IDENTIFICATION; SUMMARY; Chapter 14 - Contracted Services; POLICE SERVICES AND CONTRACTED STAFFING; ELECTRONIC SECURITY CONTRACTORS: INSTALLS; BACKGROUND INVESTIGATION FIRMS; PARKING MANAGEMENT FIRMS; DOCUMENT SHREDDING SERVICES; CONTRACT SECURITY SERVICES; SUMMARY; Chapter 15 - The Security Risk Assessment Report; REPORT WRITING; COMPONENTS OF THE ASSESSMENT REPORT; Chapter 16 - Conclusion; IMPLEMENTATION PROJECT MANAGEMENT , PROJECT TEAM , English
    Additional Edition: ISBN 0-12-800221-2
    Additional Edition: ISBN 1-306-99286-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages