Handbook of Loss Prevention and Crime Prevention. için kapak resmi
Handbook of Loss Prevention and Crime Prevention.
Başlık:
Handbook of Loss Prevention and Crime Prevention.
Yazar:
Fennelly, Lawrence.
ISBN:
9780123852496
Yazar Ek Girişi:
Basım Bilgisi:
5th ed.
Fiziksel Tanımlama:
1 online resource (626 pages)
İçerik:
Front Cover -- Handbook of Loss Prevention and Crime Prevention -- Copyright Page -- Contents -- Preface -- Introduction -- I. APPROACHES TO CRIME PREVENTION & LOSS PREVENTION -- 1. Introduction to Vulnerability Assessment -- Risk Management and Vulnerability Assessment -- Risk Assessment and the Vulnerability Assessment Process -- Statistics and Quantitative Analysis -- Vulnerability Assessment Process Overview -- Planning the Vulnerability Assessment -- Project Management -- Establish the Vulnerability Assessment Team -- Project Kick-off Meetings -- Protection Objectives -- Facility Characterization -- Data Collection - Detection -- Intrusion Sensors -- Alarm Assessment -- Entry Control -- Alarm Communication and Display -- Data Collection - Delay -- Data Collection - Response -- Analysis -- Reporting and Using the Vulnerability Assessment -- Systems Engineering and Vulnerability Assessment -- System Requirements -- System Design and Analysis -- System Installation and Test -- System Replacement -- Summary -- References -- 2. Vulnerability Assessment Process Inputs - Establish Protection Objectives -- Defining the Threat -- Listing Information Needed -- Collecting Information -- Organizing Information -- Threat Definition Methods -- Insider Threat -- Other Notes on Threat Definition -- Estimating Likelihood of Attack -- Asset Identification -- Asset Identification Methods -- Manual Listing -- Logic Diagrams -- Consequence Analysis -- Consequence of Loss -- Criteria -- Threat/Asset Matrix -- Facility Characterization -- Characterization Tools -- Facility States -- Security Checklists -- Summary -- References -- 3. Designing Security and Working with Architects -- Leadership in Energy and Environmental Design -- CPTED Planning and Design Review -- Review Process -- Doors -- General Guidelines for Windows and Glazing.

Building Design to Achieve a Desired Protection Level -- Physical Security Systems -- 50 Things You Should Know - Checklist -- Glossary of Terms -- Terms and Definitions for Door and Window Security -- References -- 4. Designing Crime Risk Management Systems -- Understanding Crime Risk Management -- Who is the Manager? -- The Place Manager-Practitioner Relationship -- Crime Pattern Analysis -- Conducting the Security Survey -- Determination of Probable Maximum Loss -- Designing the System -- Risk Avoidance -- Risk Reduction -- Risk Spreading -- Risk Transfer -- Risk Acceptance -- Cost-Effectiveness -- Making Recommendations to Place Managers -- Conclusion -- References -- 5. Approaches to Physical Security -- Levels of Physical Security -- Minimum Security -- Low-Level Security -- Medium Security -- High-Level Security -- Maximum Security -- The Psychology of Maximum Security -- The Value of Planning -- Design-Reference Threat -- Layering for Protection -- Physical Barriers -- Locks -- Access Controls -- Security Force -- Alarm Systems -- Lighting -- Communications -- CCTV -- Response Force -- LLEA Coordination -- The Security Plan -- Justification -- Convincing Oneself That a Proposal Is Justified -- Convincing Others It Is Justified -- Company's Experience -- Personal Experience -- Formulating the Approach -- Presenting the Approach -- Conclusion -- References -- 6. Security Surveys and the Audit -- The Best Time to Conduct the Survey -- Why Conduct a Security Review -- Classification of Survey Recommendations -- Maximum Security -- Medium Security -- Minimum Security -- First Step -- Developing Security Points -- Dos and Don'ts in Developing a Report -- Dos -- Don'ts -- Other Keys to Being an Effective Surveyor -- Nine Points of Security Concern -- Personality of the Complex -- Positive and Negative Aspects of Making Recommendations.

Positive Aspects -- Negative Aspect -- Community Reaction -- Crime Analysis -- Key Control -- Guidelines for Key Control -- Digital Closed-Circuit Television -- Intrusion Alarms -- Lighting and Security -- Streetlights -- Other Security Aspects -- Security Survey Follow-Up -- Residential Security -- Defensive Measures -- Windows -- Entrances -- Setting up Inner Defenses -- Alarms -- Lighting -- Home Security Checklist -- Entrances -- Entrances from Garage and Basement -- Ground Floor Windows -- Upper Floor and Windows -- Basement Doors and Windows -- Garage Doors and Windows -- Protecting Personal Property -- Top Ten Security Threats -- The Audit -- Introduction -- Exterior Access Controls -- Interior Access Controls -- Mail Services Security -- Badges, Lock, and Key Controls -- Access Controls and Badge Designs -- Search Policy -- Emergency Planning -- Reporting of Incidents -- Investigations -- Emergency Response -- Fire and Life Safety -- References -- Appendix 6.A: Site Survey and Risk Assessment -- Appendix 6.B: Physical Security Survey -- Appendix 6.C: Plant Security Checklist -- Appendix 6.D: Security Officers Checklist -- Appendix 6.E: Office Security Checklist -- Appendix 6.F: Home Security Checklist -- Appendix 6.G: Fire Safety Inspection -- Appendix 6.H: Bullet-Resistant Glazing for a Secure Workplace -- Appendix 6.I: Window Film -- SECTION A. CPTED, NEIGHBORHOOD WATCH & SITUATIONAL CRIME & OPPORTUNITY BLOCKING -- 7. CPTED in the Twenty-First Century -- The Transition to the Future of CPTED -- CPTED Definitions -- CPTED in the New Millennium -- Information and Communications Technology -- Housing -- Transportation -- Institutional -- Commercial/Retail/Industrial -- Social Recognition/Control -- Materials/Construction -- CPTED Applications -- Objectives for Commercial Environment -- Downtown Streets and Pedestrian Areas -- Downtown Streets.

The Three-D Approach -- Designation -- Definition -- Design -- Crime Prevention Through Environmental Design -- Territoriality -- Defensible Space -- Crime-Prevention Model -- The Environmental Influence on Criminal Behavior -- Natural Surveillance -- Natural Access Control -- Territorial Reinforcement -- References -- 8. Environmental Criminology and Crime Control -- Introduction -- Rational Choice Theory -- Twenty-Five Techniques of Situational Crime Prevention -- Four Components of Situational Crime Prevention, Part II -- Sixteen Opportunity Reducing Techniques -- Crime Pattern Theory -- Defensible Space: Crime Prevention Through Urban Design -- Displacement and Diffusion -- Displacement of Crime -- Diffusion of Benefits -- Implementation of CPTED: Two Case Studies -- Physical Facilities Challenges -- Potential Building Strengths -- Skateboarders 1999-2009 -- Undesirables 2000-2009 -- Conclusion -- References -- 9. Problem Solving - Community Policing -- What is a Problem? -- What is Community Policing? -- The Sara Problem-Solving Model -- References -- 10. Neighborhood Watch Guidelines for the Twenty-First Century -- Introduction -- Ten Secrets of Neighborhood Watch -- The Practitioner -- How to Report -- How to Avoid Becoming the Victim of an Attacker -- Safety Checklist for Apartments -- Look at the Building -- Look at the Apartment -- Securing the Apartment or Condominium -- Residential Burglar Alarms -- Get to Know Your Neighbors and Work Together -- Robbery Prevention - Tips for Small Business -- Cash -- Lights, Locks, and Alarms -- If Confronted by a Robber -- Burglary Prevention - Tips for Small Business -- Surveillance and Security Are Critical -- Employees and Crime -- How to Put Burglars Out of Business, the Rest of the Story -- Suspicious Situations to Report -- Suspicious Vehicles -- What to Report.

Additional Suspicious Situations to Report -- Vehicle Theft - A Big Problem -- Tips for Protecting Special Vehicles -- Do Not Make It Easy for Thieves to Steal a Vehicle -- What to Do If It Happens -- Safety Skills for Children -- Talking with Kids About Violence -- What Is a Stranger? -- Safety Skills at School and Play -- Safety Skills at Home -- Street Smarts - How to Protect Yourself -- Be Streetwise and Safe -- Jogging or Biking -- On the Bus or Subway -- What to Do If You Are a Victim of a Crime -- The Con Artist -- The Victim -- Key Words -- Some Rules -- The Con Game -- Victims Are Not Alone -- Think Smart, Avoid Cons -- Crime Prevention Tips for Senior Citizens -- Take Action - Stop the Violence -- At Home -- At School -- In the Community -- Protection from Telemarketing Fraud -- Crime Prevention Tips At ATMs -- Drive-Up ATMs -- Walk-Up ATMs -- 11. Situational Crime Prevention and Opportunity Blocking -- Introduction -- Opportunity Blocking -- Sixteen Techniques of Situational Crime Prevention in Public Housing -- Crime Control Strategy and Tactics -- Strategy -- Tactics -- References -- SECTION B. PLANNING AND EVALUATION -- 12. Design and Evaluation of Physical Protection Systems -- Safety Versus Security -- Deterrence -- Process Overview -- PPS Design and Evaluation Process - Objectives -- PPS Design and Evaluation Process - Design PPS -- PPS Design and Evaluation Process - Evaluate PPS -- Physical Protection System Design -- PPS Functions -- Detection -- Delay -- Response -- Design Goals -- Design Criteria -- Performance Measures -- Analysis -- Physical Protection System Design and the Relationship to Risk -- Summary -- References -- 13. Planning, Management, and Evaluation -- The Concepts Defined -- Planning -- Management -- Evaluation -- Planning, Management, and Evaluation - Associates in a Dynamic Process.

Statistical Information: The Backbone for Design of a Prevention Program.
Özet:
The Handbook of Loss Prevention and Crime Prevention, 5e, is a trusted resource for physical security professionals, students, and candidates for the coveted Certified Protection Professional (CPP) certification administered by ASIS International. The U.S. government recently announced that employees will have to obtain CPP certification to advance in their careers. Edited by the security practitioner and author Lawrence Fennelly, this handbook gathers in a single volume the key information on each topic from eminent subject-matter experts. Taken together, this material offers a range of approaches for defining security problems and tools for designing solutions in a world increasingly characterized by complexity and chaos. The 5e adds cutting-edge content and up-to-the-minute practical examples of its application to problems from retail crime to disaster readiness. Covers every important topic in the field, including the latest on wireless security applications, data analysis and visualization, situational crime prevention, and global security standards and compliance issues Required reading for the certification DHS selected for its infrastructure security professionals Each chapter is contributed by a top security professional with subject-matter expertise.
Notlar:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Elektronik Erişim:
Click to View
Ayırtma: Copies: