IMIST


Vue normale Vue MARC vue ISBD

Security operations management /

par McCrie, Robert D. Mention d'édition :2nd ed. Détails physiques : 1 online resource (ix, 400 pages : illustrations) ISBN :0080469493 (electronic bk.); 9780080469492 (electronic bk.).
Tags de cette bibliothèque : Pas de tags pour ce titre. Connectez-vous pour ajouter des tags.
    Évaluation moyenne : 0.0 (0 votes)
Exemplaires : http://www.sciencedirect.com/science/book/9780750678827

Title from e-book title screen (viewed Oct. 15, 2007).

Includes bibliographical references and index.

Cover -- Security Operations Management -- Copyright page -- Table of Contents -- Preface -- Acknowledgments -- Part I: General Fundamentals and Competencies -- Chapter 1: Security Operations in the Management Environment -- ORGANIZATIONS AND MANAGERS -- A POINT ABOUT TITLES -- WHAT IS THE PURPOSE OF AN EXECUTIVE? -- WHAT IS THE STRATEGY OF MANAGEMENT? -- THE CHARACTERISTICS OF MODERN ORGANIZATIONS -- HOW ORGANIZATIONS ARE STRUCTURED -- GOVERNMENT SECURITY OPERATIONS -- LAYERS OF MANAGEMENT -- SECURITY IN THE ORGANIZATIONAL HIERARCHY -- STRUCTURE OF A COMPLEX SECURITY DEPARTMENT -- ETHICS AND SECURITY OPERATIONS -- SUMMARY -- DISCUSSION AND REVIEW -- ENDNOTES -- ADDITIONAL REFERENCES -- Chapter 2: Core Competencies to Initiate Effective Protection Programs -- CORE COMPETENCIES OF SECURITY OPERATIONS -- HOW CONTEMPORARY SECURITY SERVICES HAVE EVOLVED -- WHAT DRIVES SECURITY OPERATIONS? -- A BRIEF HISTORY OF A GROWING FIELD -- THE GROWTH OF THE MODERN PROTECTIVE INDUSTRY -- HOW SECURITY EXECUTIVES RANK PRIORITIES -- SPECIFIC CONCERNS FOR DIFFERENT INDUSTRIES -- SUMMARY -- DISCUSSION AND REVIEW -- ENDNOTES -- ADDITIONAL REFERENCES -- Chapter 3: Staffing to Meet Protective Goals -- PERSONNEL PLANNING -- JOB DESCRIPTIONS -- NEGLIGENT HIRING LITIGATION -- THE VETTING PROCESS -- SUMMARY -- DISCUSSION AND REVIEW -- ENDNOTES -- ADDITIONAL REFERENCES -- Chapter 4: Training and Development for High Performance -- WHY TRAIN, ANYHOW? -- THE TRAINING MANAGER OF OFFICER -- PLANNING TRAINING AND DEVELOPMENT REQUIREMENTS -- THE ORIENTATION -- TRAINING TECHNIQUES -- FIREARMS TRAINING -- ONGOING "IN-SERVICE" TRAINING -- SECURITY TRAINING FOR NONSECURITY PERSONNEL -- TRAINING FOR TRAINERS AND SUPERVISORS -- DEVELOPMENT AND EDUCATION FOR MANAGERS AND EXECUTIVES -- MEASURING EFFECTIVENESS -- SUMMARY -- DISCUSSION AND REVIEW -- ENDNOTES -- ADDITIONAL REFERENCES -- Chapter 5: Supporting and Motivating Supervisors and Staff -- SUPPORTING SUPERVISORS AND STAFF -- SAFETY AT WORK: THE RESPONSIBILITY OF SUPERVISORS -- WHY BE A SUPERVISOR, ANYWAY? -- DUTIES OF EMPLOYEES TO SUPERVISORS AND THE WORKPLACE -- MOTIVATING SUPERVISORS AND STAFF -- TIME MANAGEMENT FOR SUPERVISORS AND MANAGERS -- THE COMPLEXITY OF MOTIVATION -- THE LIMITATIONS OF MOTIVATION RESEARCH -- SUMMARY -- DISCUSSION AND REVIEW -- ENDNOTES -- ADDITIONAL REFERENCES -- Chapter 6: Appraising and Promoting People in Security Programs -- THE DIFFICULTIES OF PERFORMANCE APPRAISAL -- WHO SHOULD BE APPRAISED AND WHEN? -- APPRAISAL FOR ALL LEVELS AND BY ALL LEVELS -- WHAT TYPES OF EVALUATION DO WORKERS PREFER? -- WHAT NEEDS TO BE EVALUATED? -- USING A FORMAL APPRAISAL DOCUMENT -- JOB PERFORMANCE RATING -- THE NEED FOR APPRAISAL DOCUMENTATION -- OTHER WRITTEN APPRAISAL TECHNIQUES -- THE APPRAISAL INTERVIEW -- ASSESSING PERFORMANCE AMONG DIFFERENT EMPLOYMENT LEVELS -- REVIEWING MANAGEMENT STRATEGY -- PERFORMANCE REVIEWS FOR SENIOR MANAGEMENT -- THE LIMITATIONS OF APPRAISALS -- THE PROMOTION PROCESS -- WHAT'S WRONG WITH PROMOTION? -- WHY PROMOTIONS ARE IMPORTANT -- SUMMARY -- DISCUSSION AND REVIEW -- ENDNOTES -- ADDITIONAL REFERENCES -- Part II: Special Issues in Security Management -- Chapter 7: Discipline and Discharge --T$7520.

The second edition of Security Operations Management continues as the seminal reference on corporate security management operations. Revised and updated, topics covered in depth include: access control, selling the security budget upgrades to senior management, the evolution of security standards since 9/11, designing buildings to be safer from terrorism, improving relations between the public and private sectors, enhancing security measures during acute emergencies, and, finally, the increased security issues surrounding the threats of terrorism and cybercrime. An ideal reference for the professional, as well as a valuable teaching tool for the security student, the book includes discussion questions and a glossary of common security terms. Additionally, a brand new appendix contains contact information for academic, trade, and professional security organizations. * Fresh coverage of both the business and technical sides of security for the current corporate environment * Strategies for outsourcing security services and systems * Brand new appendix with contact information for trade, professional, and academic security organizations.

Il n'y a pas de commentaire pour ce document.

pour proposer un commentaire.
© Tous droits résérvés IMIST/CNRST
Angle Av. Allal Al Fassi et Av. des FAR, Hay Ryad, BP 8027, 10102 Rabat, Maroc
Tél:(+212) 05 37.56.98.00
CNRST / IMIST

Propulsé par Koha