Preface | p. xiii |
Acknowledgments | p. xv |
Introduction and Security's Function | p. 1 |
Homeland Security--Changing the Emphasis on Security in the United States | p. 3 |
Introduction | p. 3 |
Private Enterprise Response | p. 4 |
Federal Response in the United States | p. 11 |
State/Local Response | p. 15 |
Public/Private Joint Initiatives | p. 17 |
Concerns | p. 17 |
Origins and Development of Security | p. 21 |
Introduction | p. 21 |
Security in England | p. 21 |
Security in the United States | p. 25 |
Defining Security's Role | p. 37 |
Introduction | p. 37 |
What Is Private Security? | p. 37 |
Security Services | p. 39 |
Contract versus Proprietary Services | p. 40 |
Hybrid Systems | p. 45 |
Private Security and Public Law Enforcement | p. 48 |
Relationships after September 11, 2001 | p. 51 |
The Proprietary Security Organization | p. 55 |
Introduction | p. 55 |
Determining the Need | p. 55 |
Security's Place in the Organization | p. 56 |
Organizing the Security Function | p. 63 |
Career Opportunities in Loss Prevention | p. 75 |
Introduction | p. 75 |
Factors Increasing Security Opportunities | p. 75 |
The Security/Loss-Prevention Occupation | p. 76 |
Security Education, Training, Certification, and Regulation | p. 89 |
Introduction | p. 89 |
Adequacy of Private Security Training | p. 90 |
Proposed Federal Regulation | p. 90 |
The Role of Higher Education | p. 91 |
Training | p. 93 |
Certification and Regulation | p. 94 |
Magazines and Periodicals | p. 97 |
Basics of Defense | p. 101 |
Security and the Law | p. 103 |
Introduction | p. 103 |
Security, Public Police, and the U.S. Constitution | p. 104 |
Sources of Law | p. 104 |
Classes of Crimes | p. 106 |
Private Security Powers | p. 108 |
Civil Law: The Controller for Private Security | p. 114 |
Security and Liability | p. 118 |
Duty to Protect from Third-Party Crime | p. 119 |
Recent Trends in Liability | p. 123 |
Recent Trends in Privacy | p. 124 |
New Laws | p. 124 |
The Courts | p. 124 |
Development of Case Law | p. 125 |
Risk Analysis and the Security Survey | p. 129 |
Introduction | p. 129 |
Risk Management | p. 130 |
The Security Survey | p. 131 |
Alternatives for Optimizing Risk Management | p. 141 |
The Outer Defenses: Building and Perimeter Protection | p. 147 |
Introduction | p. 147 |
Barriers, Fences, and Walls | p. 148 |
Gates and Other Barrier Breaches | p. 152 |
Barrier Protection | p. 153 |
Inside the Perimeter | p. 156 |
Lighting | p. 157 |
Planning Security | p. 164 |
Interior and Exterior Security Concerns | p. 167 |
Introduction | p. 167 |
Buildings on or as the Perimeter | p. 167 |
Windows and Doors | p. 167 |
Locks and Keys | p. 170 |
Roofs and Common Walls | p. 184 |
Surveillance Devices | p. 184 |
Old Construction | p. 188 |
New Construction | p. 189 |
Security at the Building Design Stage | p. 189 |
Security Principles in Design | p. 190 |
The Inner Defenses: Intrusion and Access Control | p. 193 |
Introduction | p. 193 |
Doors to Sensitive Areas | p. 194 |
Office Area Doors | p. 194 |
Traffic Patterns | p. 194 |
Traffic Control | p. 195 |
Employee Identification | p. 196 |
Package Control | p. 198 |
Files, Safes, and Vaults | p. 198 |
Inspections | p. 203 |
Alarms | p. 203 |
Fire Protection, Safety, and Emergency Planning | p. 215 |
Introduction | p. 215 |
Fire Prevention and Protection | p. 216 |
Safety and Loss Control | p. 228 |
Emergency Planning | p. 236 |
Insurance | p. 241 |
Introduction | p. 241 |
The Value of Insurance in a Total Loss-Prevention Program | p. 241 |
Types of Insurance | p. 242 |
Insuring against Crime | p. 247 |
Insuring Property | p. 248 |
Internal Theft Controls | p. 253 |
Introduction | p. 253 |
What Is Honesty? | p. 253 |
The Dishonest Employee | p. 254 |
Management Responsibility in Loss Prevention | p. 257 |
Program for Internal Security | p. 259 |
Procedural Controls | p. 261 |
When Controls Fail | p. 269 |
Personnel Policies for Internal Security | p. 273 |
Introduction | p. 273 |
Human Resources Screening | p. 273 |
Employment History and Reference Checking | p. 274 |
Backgrounding | p. 281 |
Integrity and Lie Detection Tests | p. 282 |
Americans with Disabilities Act | p. 285 |
Drug Screening | p. 288 |
Other Screening Options | p. 288 |
Hiring Ex-convicts and Parolees | p. 289 |
Morale | p. 289 |
Specific Threats and Solutions | p. 295 |
Transportation/Cargo Security | p. 297 |
Introduction | p. 297 |
The Role of Private Security | p. 298 |
Accountability Procedures | p. 298 |
Theft and Pilferage | p. 300 |
Planning for Security | p. 304 |
Cargo in Transit | p. 307 |
Suggested Sealing Systems and Procedures | p. 309 |
Special Issues in Airline Security | p. 314 |
Other Transportation Industry Responses to Terrorism | p. 316 |
Workplace Violence: Prevention and Intervention | p. 319 |
Introduction | p. 319 |
Threat | p. 320 |
Harassment | p. 320 |
Attack | p. 320 |
Sabotage | p. 320 |
The Phenomenon of Workplace Violence | p. 320 |
The Work Environment and Violence | p. 322 |
Profiling Violent Behavior | p. 323 |
Basic Levels of Violence | p. 325 |
Preventing Workplace Violence | p. 326 |
The Violence Intervention and Contingency Team | p. 327 |
Perpetrators' Rights | p. 328 |
Intervention Strategy | p. 329 |
Drugs in the Workplace | p. 333 |
Introduction | p. 333 |
Impact of Drug Use | p. 334 |
Drug Testing | p. 336 |
Spotting Drug Use | p. 338 |
The Components of a Comprehensive Substance Abuse Program | p. 339 |
Retail Security | p. 345 |
Introduction | p. 345 |
Shoplifting | p. 346 |
Checks and Credit/Debit Cards | p. 356 |
Internal Theft | p. 362 |
Terrorism and Other Tools of Destruction | p. 369 |
Introduction | p. 369 |
Current Issues | p. 371 |
Historical Background | p. 372 |
Implications of a Changing World | p. 375 |
In Search of a Definition for International Terrorism | p. 376 |
Terrorism as a Tactic, Instrument, or Method | p. 378 |
Characterizing Modern Terrorism | p. 380 |
Specific Threats and Responses | p. 389 |
Other Specific Response Issues in the United States | p. 392 |
The Future/Summary | p. 395 |
Computer and Information Security | p. 399 |
Introduction | p. 399 |
Types of Computer Systems | p. 402 |
Networks | p. 404 |
The Database Problems | p. 406 |
The Need for Computer Security | p. 406 |
Computer Systems Protection | p. 411 |
Content Monitoring and Filtering | p. 418 |
Dealing with Identity Theft | p. 420 |
Other Data Resources Vulnerabilities | p. 422 |
Specific Security Threats | p. 427 |
Introduction | p. 427 |
Economic/White-Collar Crime | p. 427 |
Burglary and Robbery | p. 429 |
Labor Disputes | p. 436 |
Espionage | p. 438 |
Piracy | p. 439 |
Security: Its Problems, Its Future | p. 443 |
Introduction | p. 443 |
The Aftermath of September 11, 2001 | p. 443 |
Private Security Resources | p. 444 |
Interaction and Cooperation | p. 444 |
Limitations of Security | p. 445 |
Trends | p. 446 |
The Future | p. 447 |
Security Journals, Magazines, and Newsletters | p. 453 |
World Wide Web Sites | p. 455 |
Security Surveys | p. 457 |
Index | p. 465 |
Table of Contents provided by Rittenhouse. All Rights Reserved. |

Introduction to Security
by Fischer, Robert J.; Green, GionRent Textbook
New Textbook
We're Sorry
Sold Out
Used Textbook
We're Sorry
Sold Out
eTextbook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Table of Contents
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.