It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 03804cam 22005174a 4500
001 ocm52706532
003 OCoLC
005 20160204025620.0
008 030717s2004 njua b 001 0 eng
010 $a 2003015931
040 $aDLC$beng$cDLC$dBAKER$dBTCTA$dYDXCP$dOCLCG$dIG#$dOCLCQ$dCNCGM$dBDX$dOCLCF$dOCLCO$dOCLCQ
019 $a746864652
020 $a0131126202
020 $a9780131126206
035 $a(OCoLC)52706532$z(OCoLC)746864652
042 $apcc
050 00 $aHV8290$b.C58 2004
082 00 $a658.4/7$222
100 1 $aClifford, Mary,$d1964-
245 10 $aIdentifying and exploring security essentials /$cMary Clifford.
260 $aUpper Saddle River, N.J. :$bPearson Prentice Hall,$c℗♭2004.
300 $axviii, 382 pages :$billustrations ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
504 $aIncludes bibliographical references and index.
505 0 $apt. I. Reviewing the Basics -- Ch. 1. A History of Private Security: A Pervasive Enterprise -- Ch. 2. Identifying the Essentials -- Ch. 3. Studying Security Threats and the Related Risk Levels -- Ch. 4. A Prevention System Overview: Defining the Overall Security Objective -- pt. II. Internal Resources and Integration: Identifying Resources from Within -- Ch. 5. Physical Security and Asset Protection -- Ch. 6. Information and Computer Security -- Ch. 7. Personnel and Security Management -- Ch. 8. Integration as the Centerpiece: Meeting Overall Security Objectives -- Ch. 9. A Sampling of Settings -- pt. III. Exploring Essential External Connections -- Ch. 10. Public and Private Police Interactions -- Ch. 11. Legal Liability Issues -- Ch. 12. Preparing an Emergency Plan and a Disaster Response -- Ch. 13. Securing Tomorrow: Drafting the Future of Public Safety -- Ch. 14. Review of the Target Environments -- App. A. Basic Security Plan -- App. B. Company X Request for Proposal: Contract Security Service Specifications -- App. C. Protection Officer Code of Ethics -- App. D. Security Time Line.
520 1 $a"Identifying and Exploring Security Essentials gives readers a rare, hands-on approach to the study of security issues. Written in a clear and easy-to-understand style, this new text from Prentice Hall will help readers understand the history and fundamentals of security." "Identifying and Exploring Security Essentials goes beyond technical security information to show how to actively identify, meet, and evaluate security objectives in multiple environments. This book provides test cases and activities for readers to review, evaluate, and critique. These activities will help readers become confident in their abilities as they identify, research, and explore multiple levels of security-related information."--Jacket.
650 0 $aSecurity systems.
650 0 $aCrime prevention.
650 0 $aSafety education.
650 7 $aCrime prevention.$2fast$0(OCoLC)fst00883055
650 7 $aSafety education.$2fast$0(OCoLC)fst01103345
650 7 $aSecurity systems.$2fast$0(OCoLC)fst01110883
776 08 $iOnline version:$aClifford, Mary, 1964-$tIdentifying and exploring security essentials.$dUpper Saddle River, N.J. : Pearson Prentice Hall, ℗♭2004$w(OCoLC)891687121
856 41 $3Table of contents$uhttp://catdir.loc.gov/catdir/toc/ecip046/2003015931.html
938 $aBaker & Taylor$bBKTY$c66.20$d66.20$i0131126202$n0004251196$sactive
938 $aBrodart$bBROD$n00955051$c$84.60
938 $aBaker and Taylor$bBTCP$n2003015931
938 $aIngram$bINGR$n9780131126206
938 $aYBP Library Services$bYANK$n1997219
029 1 $aAU@$b000024806505
029 1 $aIG#$b9780131126206
029 1 $aYDXCP$b1997219
994 $aZ0$bPMR
948 $hNO HOLDINGS IN PMR - 93 OTHER HOLDINGS