The Process of Investigation, Second Edition, zeroes in on the specific areas of concern to the private investigator. The new edition covers a wide range of subjects such as the fundamentals of investigation, legal aspects, organisational objectives and strategies. Two new chapters have been added on Imagery and Computers as well containing all new updated information on the Internet, Private Information Providers, Resource references, digital imaging, documenting crime scenes, and managing and analysing investigation information. The Process of Investigations is co-authored by professionals with broad experience in both private and public sector investigations spanning five decades. Drawing on their extensive experience, the authors have updated and revised all chapters, targeting corporate executives, shoplifters, organized burglary rings, warehouse thieves, cashiers, workplace drug dealers, and corrupt public officials. Written for both the student and professional alike, this book compares and contrasts public and private sector enforcers, pinpoints the unique problems facing the investigator in a private agency, and provides updated case studies that illustrate the theories an
This latest edition of Effective Security Management retains the qualities that made the previous editions a standard of the profession: a readable, comprehensive guide to the planning, staffing, and operation of the security function within an organization. All chapters are completely updated with the focus on practical methods that the reader can put to use in managing an effective security department.The Fourth Edition covers current computer applications that can help in the administrative, managerial, and supervisory aspects of the security function. In addition, two new chapters address employee management in detail. The first, Lifestyle Management for Managers, will discuss motivation at work: the how, when, where, what and why of self-motivation for the boss. The second, The Departing Employee, will discuss the exit interview and the information that can be gained in that process. Also, back by popular demand, are the author's "Jackass Management Traits," 32 humorous portrayals of negative management traits that illustrate very real problems that can undermine the effectiveness of supervisors and managers.* Includes a new chapter on the use of statistics as a security management tool * Contains complete updates to every chapter while retaining the outstanding organization of the previous editions * Recommended reading for The American Society for Industrial Security's (ASIS) Certified Protection Professional (CPP) exam
Retail Crime, Security, and Loss Prevention is destined to become the "go to" source of crime- and loss prevention- related information in the retail industry. Written and edited by two nationally recognized retail security experts and enhanced with 63 contributions by others who contribute expertise in specialized areas, this book provides over 150 definitions of loss prevention terms, and discusses topics ranging from accident investigations, counterfeit currency, emergency planning, and workplace violence to vendor frauds. No other single work contains such a wealth of retail security information. The co-authors are Charles "Chuck Sennewald, CSC, CPP former Director of Security at The Broadway Department Stores, a major division of Carter Hawley Hale Stores, Inc., founder of the IAPSC and author of numerous security industry books, and John Christman, CPP, former VP and Director of Security for Macy's West. They have put in one book a wealth of information, techniques, procedures and source material relative to retail crime and loss prevention which will prove an invaluable reference work for professionals at all levels within the industry. - Tables, current industry figures, and statistics fully articulate the impact of loss prevention and theft in the retail setting - Case examples from the authors' own experience illustrate real-world problems and connect theory to practice - The most complete book available on retail security
Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, at no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption -- which could bring any business to it's knees -- has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in-depth security surveys so businesses will know exactly where security holes are present and where they need improvement to limit their exposure to various threats. The fourth edition of Security Consulting introduces security and law enforcement professionals to the career and business of security consulting. It provides new and potential consultants with the practical guidelines needed to start up and maintain a successful independent practice. Updated and expanded information is included on marketing, fees and expenses, forensic consulting, the use of computers, and the need for professional growth. Useful sample forms have been updated in addition to new promotion opportunities and keys to conducting research on the Web. - The only book of its kind dedicated to beginning a security consulting practice from the ground-up - Proven, practical methods to establish and run a security consulting business - New chapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet - The most up-to-date best practices from the IAPSC
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.