SHORT BLURB/BRIEF DESCRIPTION: This is the third in a series of proposals for new editions of existing texts that have been adopted by DeVry University. In this case, the Keller Graduate School of Management at DeVry University has adopted Contemporary Security Management for their Master's Degree Program in Business Administration, Security Management concentration. It is at Keller's request that we update the material presented by John Fay in his original edition of the work. CONTEMPORARY SECURITY MANAGEMENT, 2e will be updated from the successful first edition which provides current, experience-proven business practices applicable to security operations. Vital topics covered include: managing in times of risk, target-hardening against terrorism, and strategies for cross-functional leadership. The author proposes he add two new chapters to cover terrorism and the new government mandate to perform standard vulnerability assessments for various industries. His outline of proposed changes is as follows: Am The Terrorist Threat o International -- Al Qaeda; Hezbollah; Hamas; FLN; Sendero Luminoso; etc. o Domestic -- Aryan Nation; Animal Liberation Front; Environmental Liberation Front; etc. Am Terrorist Motivations Political; Religious; Racial; Environmental; Special Interest Am The Early Signals of Terrorism Target Surveillance; Information Collection; Tests of Security; Acquisition of Supplies; Dry Runs; Positioning to Act Am Rating the Terrorist Group History; Current Configuration; Capabilities; Resolve; Target Preferences Am Weapons of Major Concern Chemical; Biological; Radiological; Nuclear; Explosive; Incendiary Am Vulnerability Factors Visibility of the Potential Target; Criticality of the Potential Target; Probability of Attack; Potential Consequences; Adversary Access and Proximity; Population Casualties; Collateral Damage Am Vulnerability Assessment Models Generic; Industry Specific --Petroleum; Chemical; etc. Am Vulnerabilities of Facilities Power; Water; Sewage; IT; HVAC Am Special Targets Government Buildings; High-Impact Industrial Facilities; Financial Centers; Entertainment Venues; Schools; Hospitals; Food Supply Systems; Transportation Systems Am Applicable Security Concepts All hazards and Design-Basis Analyses; Environmental Design; Stand-off Distance; Protection in Depth; Redundancy; Operations Security (OPSEC); Mitigation and remediation Am Security Plan Development Gather and Analyze Data; Identify Critical Assets; Assess Current Protective Scheme; Identify Needs (Physical Security; Procedures; Manpower);; Write the Plan; Multidisciplinary Buy-In; Organize, Equip, and Train; Rehearse; Evaluate Am Samples Vulnerability Assessment Checklist; Elements of a Security Plan; Department of Energy Best Practices Ancillary material: Instructor's Manual and Power Point Slides UNIQUE FEATURE: Am An experience-proven, practical approach to the business of security Am Author, John Fay, is very well known among security professionals and his sensible, down-to-earth style is accessible to those new to the business BENEFIT TO THE READER: Am Case studies throughout the text provide real-world examples and solutions to management issues. Am Samples of security plans and procedures, checklists, diagrams and illustrations aid in explaining a wide range of critical conceptsA clean desk policy is the name given to a work rule that requires employees to ac Place classified materials under lock and key ... Confidentiality agreements can be crafted to apply to sensitive information generally or to certain forms of information specifically. Noncompetition. Agreement. A noncompetition agreement (see Figure 17-1) grants protection to an employer from the unauthorized use of theanbsp;...
|Title||:||Contemporary Security Management|
|Publisher||:||Butterworth-Heinemann - 2006|