top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Análisis de la seguridad privada / / Diego Torrente
Análisis de la seguridad privada / / Diego Torrente
Autore Torrente Robles Diego
Pubbl/distr/stampa Barcelona : , : Editorial UOC, , [2015]
Descrizione fisica 1 online resource (196 páginas)
Disciplina 363.289
Collana Manuales series
Soggetto topico Private security services
Private security services - Spain
ISBN 84-9064-845-X
84-9064-844-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione spa
Record Nr. UNINA-9910798471603321
Torrente Robles Diego  
Barcelona : , : Editorial UOC, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Análisis de la seguridad privada / / Diego Torrente
Análisis de la seguridad privada / / Diego Torrente
Autore Torrente Robles Diego
Pubbl/distr/stampa Barcelona : , : Editorial UOC, , [2015]
Descrizione fisica 1 online resource (196 páginas)
Disciplina 363.289
Collana Manuales series
Soggetto topico Private security services
Private security services - Spain
ISBN 84-9064-845-X
84-9064-844-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione spa
Record Nr. UNINA-9910808056303321
Torrente Robles Diego  
Barcelona : , : Editorial UOC, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
Autore Baker Paul R. <1958->
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton : , : CRC Press, , 2013
Descrizione fisica 1 online resource (349 p.)
Disciplina 658.4/7
658.47
Altri autori (Persone) BennyDaniel J
Soggetto topico Business enterprises - Security measures
Security systems
Computer security
Private security services
Soggetto genere / forma Electronic books.
ISBN 0-429-13389-8
1-4665-8868-3
1-4200-9964-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Preface; The Authors; The Contributors; Chapter 1 - Physical Security Planning; Chapter 2 - Vulnerability Assessments; Chapter 3 - Security Design and Planning; Chapter 4 - Security Construction Projects; Chapter 5 - Protection in Depth; Chapter 6 - Perimeter Protection; Chapter 7 - Access Control; Chapter 8 - Physical Protection Systems; Chapter 9 - CCTV and IP Video; Chapter 10 - Keys, Locks, and Safes; Chapter 11 - Biometrics; Chapter 12 - Security Guard Force; Chapter 13 - Central Station Design; Chapter 14 - Government Security
Chapter 15 - Financial Institutions and BanksChapter 16 - Data Center Protection; Chapter 17 - Total System Cost; Chapter 18 - Security Master Plan; Chapter 19 - Security Foresight; Chapter 20 - Security Leadership; Back Cover
Record Nr. UNINA-9910462621703321
Baker Paul R. <1958->  
Boca Raton : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
Autore Baker Paul <1958, >
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton : , : CRC Press, , 2013
Descrizione fisica 1 online resource (349 p.)
Disciplina 658.4/7
658.47
Altri autori (Persone) BennyDaniel J
Soggetto topico Business enterprises - Security measures
Security systems
Computer security
Private security services
ISBN 0-429-13389-8
1-4665-8868-3
1-4200-9964-7
Classificazione BUS073000BUS093000LAW041000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Preface; The Authors; The Contributors; Chapter 1 - Physical Security Planning; Chapter 2 - Vulnerability Assessments; Chapter 3 - Security Design and Planning; Chapter 4 - Security Construction Projects; Chapter 5 - Protection in Depth; Chapter 6 - Perimeter Protection; Chapter 7 - Access Control; Chapter 8 - Physical Protection Systems; Chapter 9 - CCTV and IP Video; Chapter 10 - Keys, Locks, and Safes; Chapter 11 - Biometrics; Chapter 12 - Security Guard Force; Chapter 13 - Central Station Design; Chapter 14 - Government Security
Chapter 15 - Financial Institutions and BanksChapter 16 - Data Center Protection; Chapter 17 - Total System Cost; Chapter 18 - Security Master Plan; Chapter 19 - Security Foresight; Chapter 20 - Security Leadership; Back Cover
Record Nr. UNINA-9910786040003321
Baker Paul <1958, >  
Boca Raton : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
The complete guide to physical security / / Paul R. Baker, Daniel J. Benny
Autore Baker Paul <1958, >
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton : , : CRC Press, , 2013
Descrizione fisica 1 online resource (349 p.)
Disciplina 658.4/7
658.47
Altri autori (Persone) BennyDaniel J
Soggetto topico Business enterprises - Security measures
Security systems
Computer security
Private security services
ISBN 0-429-13389-8
1-4665-8868-3
1-4200-9964-7
Classificazione BUS073000BUS093000LAW041000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Preface; The Authors; The Contributors; Chapter 1 - Physical Security Planning; Chapter 2 - Vulnerability Assessments; Chapter 3 - Security Design and Planning; Chapter 4 - Security Construction Projects; Chapter 5 - Protection in Depth; Chapter 6 - Perimeter Protection; Chapter 7 - Access Control; Chapter 8 - Physical Protection Systems; Chapter 9 - CCTV and IP Video; Chapter 10 - Keys, Locks, and Safes; Chapter 11 - Biometrics; Chapter 12 - Security Guard Force; Chapter 13 - Central Station Design; Chapter 14 - Government Security
Chapter 15 - Financial Institutions and BanksChapter 16 - Data Center Protection; Chapter 17 - Total System Cost; Chapter 18 - Security Master Plan; Chapter 19 - Security Foresight; Chapter 20 - Security Leadership; Back Cover
Record Nr. UNINA-9910828313103321
Baker Paul <1958, >  
Boca Raton : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Contemporary Security Management / / John Fay, David Patterson
Contemporary Security Management / / John Fay, David Patterson
Autore Fay John
Edizione [Fourth edition.]
Pubbl/distr/stampa Oxford, England ; ; Cambridge, Massachusetts : , : Butterworth-Heinemann, , [2018]
Descrizione fisica 1 online resource (531 pages) : illustrations
Disciplina 658.47
Soggetto topico Industries - Security measures
Private security services
Personnel management
ISBN 0-12-809278-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910583372403321
Fay John  
Oxford, England ; ; Cambridge, Massachusetts : , : Butterworth-Heinemann, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Contemporary security management [[electronic resource] /] / John J. Fay
Contemporary security management [[electronic resource] /] / John J. Fay
Autore Fay John <1934->
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2006
Descrizione fisica 1 online resource (538 p.)
Disciplina 005.8
Soggetto topico Private security services
Industries - Security measures
Personnel management
Soggetto genere / forma Electronic books.
ISBN 1-281-05253-1
9786611052539
0-08-047682-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title page; Copyright page; Table of contents; 1. Historical Roots; INTRODUCTION; INDUSTRIAL REVOLUTION; Fertile Ground; Growth of Factories; Mass Production; SCIENTIFIC MANAGEMENT; HUMAN RELATIONS; OPERATIONS RESEARCH; AGE OF TECHNOLOGY; BUSINESS TODAY; SECURITY INDUSTRY; English Roots; Law Enforcement and Security; Terrorism; Security Marketplace; Guard Services; Professionalism; Technology; The Future; NOTES; 2. Strategy; BUSINESS STRATEGY; CORE AND SUPPORT ACTIVITIES; OUTSOURCING; OUTSOURCING AND THE SECURITY GROUP; Protecting Assets Under Altered Circumstances; Due Diligence
Ambiguous SpecificationsEFFECT OF STRATEGY ON SECURITY MANAGEMENT; Anticipate; Exposures; Magnitude; Complexity; TECHNICAL KNOWLEDGE; Access; Quality; Teamwork; STRATEGY AND RISK; Predict; Quantify; IMPERATIVES; Improve on Quality; Forge Close Links with Customers; Establish Close Relationships with Suppliers; Make Effective Use of Technology; Operate with Minimum Layers of Management; Continuously Improve the Security Staff; STRATEGIC PLANNING; Policy and Planning; The CSO and Strategic Planning; Business Is Like War; No Absolutes in Strategic Planning; Strategy and Change; NOTES; 3. Leading
INTRODUCTIONBuild a Vision; Enlist Followers; LEADERSHIP DEFINITIONS VARY; Complex and Subtle; Manager Versus Leader; Peter Principle; COMPETENCIES; Gain Attention; Set a Goal; Communicate the Message; Cultivate Trust; Develop Oneself; EMPOWERMENT; Contributing; Sharing Accomplishments; Energizing and Motivating; Conflicting Values; Quantity Versus Quality; Love of Work; FOLLOWERS; Taking Directions; Telling the Truth; Providing Feedback; LEADERS ADD VALUE; COMPETITION AMONG LEADERS; Ambition; Loyalty; PRICE OF LEADERSHIP; LEADING IN THE TWENTY-FIRST CENTURY; Build and Manage
Know the LandscapeExpect the Best; Do Not Micromanage; Be Accessible; Focus on What Is Important; Point the Way; CONCLUSIONS; NOTES; 4. Organizing; STAFFING; Justify the Position; Identify Relevant Skills and Knowledge; Search for Qualified Candidates; Compare Candidates Against Job Requirements; Identify the Apparent Best Candidate; Conduct a Background Inquiry; Test the Apparent Best Candidate; Offer the Job; The Independent Contractor; ORGANIZING ACTIVITIES; ESTABLISHING OBJECTIVES; Group Objectives; Individual Objectives; ORGANIZING CONSISTENT WITH POLICIES; Obtaining Resources
The People ResourceORGANIZING BEYOND BOUNDARIES; Assigning Tasks; Monitoring Performance; TERMINATING AN EMPLOYEE; Stunned Reaction; Psychological Trauma; Sorrow; Belligerence; Managing the Termination Interview; ORGANIZATIONAL STRUCTURES; Vertical Model; Network Model; Security Group Fit; NOTES; 5. Managing People; WORKING THROUGH PEOPLE; MASLOW'S THEORY; Physiological; Survival; Love; Self-esteem; Self-fulfillment; Curiosity; Key Tenets; Maslow in the Security Environment; PEOPLE DEVELOPMENT; Encourage; Expect Excellence; APPRAISING PERFORMANCE; Setting Targets; Target Qualities
Focus on Action Steps
Record Nr. UNINA-9910457321003321
Fay John <1934->  
Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Contemporary security management [[electronic resource] /] / John J. Fay
Contemporary security management [[electronic resource] /] / John J. Fay
Autore Fay John <1934->
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2006
Descrizione fisica 1 online resource (538 p.)
Disciplina 005.8
Soggetto topico Private security services
Industries - Security measures
Personnel management
ISBN 1-281-05253-1
9786611052539
0-08-047682-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title page; Copyright page; Table of contents; 1. Historical Roots; INTRODUCTION; INDUSTRIAL REVOLUTION; Fertile Ground; Growth of Factories; Mass Production; SCIENTIFIC MANAGEMENT; HUMAN RELATIONS; OPERATIONS RESEARCH; AGE OF TECHNOLOGY; BUSINESS TODAY; SECURITY INDUSTRY; English Roots; Law Enforcement and Security; Terrorism; Security Marketplace; Guard Services; Professionalism; Technology; The Future; NOTES; 2. Strategy; BUSINESS STRATEGY; CORE AND SUPPORT ACTIVITIES; OUTSOURCING; OUTSOURCING AND THE SECURITY GROUP; Protecting Assets Under Altered Circumstances; Due Diligence
Ambiguous SpecificationsEFFECT OF STRATEGY ON SECURITY MANAGEMENT; Anticipate; Exposures; Magnitude; Complexity; TECHNICAL KNOWLEDGE; Access; Quality; Teamwork; STRATEGY AND RISK; Predict; Quantify; IMPERATIVES; Improve on Quality; Forge Close Links with Customers; Establish Close Relationships with Suppliers; Make Effective Use of Technology; Operate with Minimum Layers of Management; Continuously Improve the Security Staff; STRATEGIC PLANNING; Policy and Planning; The CSO and Strategic Planning; Business Is Like War; No Absolutes in Strategic Planning; Strategy and Change; NOTES; 3. Leading
INTRODUCTIONBuild a Vision; Enlist Followers; LEADERSHIP DEFINITIONS VARY; Complex and Subtle; Manager Versus Leader; Peter Principle; COMPETENCIES; Gain Attention; Set a Goal; Communicate the Message; Cultivate Trust; Develop Oneself; EMPOWERMENT; Contributing; Sharing Accomplishments; Energizing and Motivating; Conflicting Values; Quantity Versus Quality; Love of Work; FOLLOWERS; Taking Directions; Telling the Truth; Providing Feedback; LEADERS ADD VALUE; COMPETITION AMONG LEADERS; Ambition; Loyalty; PRICE OF LEADERSHIP; LEADING IN THE TWENTY-FIRST CENTURY; Build and Manage
Know the LandscapeExpect the Best; Do Not Micromanage; Be Accessible; Focus on What Is Important; Point the Way; CONCLUSIONS; NOTES; 4. Organizing; STAFFING; Justify the Position; Identify Relevant Skills and Knowledge; Search for Qualified Candidates; Compare Candidates Against Job Requirements; Identify the Apparent Best Candidate; Conduct a Background Inquiry; Test the Apparent Best Candidate; Offer the Job; The Independent Contractor; ORGANIZING ACTIVITIES; ESTABLISHING OBJECTIVES; Group Objectives; Individual Objectives; ORGANIZING CONSISTENT WITH POLICIES; Obtaining Resources
The People ResourceORGANIZING BEYOND BOUNDARIES; Assigning Tasks; Monitoring Performance; TERMINATING AN EMPLOYEE; Stunned Reaction; Psychological Trauma; Sorrow; Belligerence; Managing the Termination Interview; ORGANIZATIONAL STRUCTURES; Vertical Model; Network Model; Security Group Fit; NOTES; 5. Managing People; WORKING THROUGH PEOPLE; MASLOW'S THEORY; Physiological; Survival; Love; Self-esteem; Self-fulfillment; Curiosity; Key Tenets; Maslow in the Security Environment; PEOPLE DEVELOPMENT; Encourage; Expect Excellence; APPRAISING PERFORMANCE; Setting Targets; Target Qualities
Focus on Action Steps
Record Nr. UNINA-9910784364803321
Fay John <1934->  
Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Contemporary security management [[electronic resource] /] / John J. Fay
Contemporary security management [[electronic resource] /] / John J. Fay
Autore Fay John <1934->
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2006
Descrizione fisica 1 online resource (538 p.)
Disciplina 005.8
Soggetto topico Private security services
Industries - Security measures
Personnel management
ISBN 1-281-05253-1
9786611052539
0-08-047682-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title page; Copyright page; Table of contents; 1. Historical Roots; INTRODUCTION; INDUSTRIAL REVOLUTION; Fertile Ground; Growth of Factories; Mass Production; SCIENTIFIC MANAGEMENT; HUMAN RELATIONS; OPERATIONS RESEARCH; AGE OF TECHNOLOGY; BUSINESS TODAY; SECURITY INDUSTRY; English Roots; Law Enforcement and Security; Terrorism; Security Marketplace; Guard Services; Professionalism; Technology; The Future; NOTES; 2. Strategy; BUSINESS STRATEGY; CORE AND SUPPORT ACTIVITIES; OUTSOURCING; OUTSOURCING AND THE SECURITY GROUP; Protecting Assets Under Altered Circumstances; Due Diligence
Ambiguous SpecificationsEFFECT OF STRATEGY ON SECURITY MANAGEMENT; Anticipate; Exposures; Magnitude; Complexity; TECHNICAL KNOWLEDGE; Access; Quality; Teamwork; STRATEGY AND RISK; Predict; Quantify; IMPERATIVES; Improve on Quality; Forge Close Links with Customers; Establish Close Relationships with Suppliers; Make Effective Use of Technology; Operate with Minimum Layers of Management; Continuously Improve the Security Staff; STRATEGIC PLANNING; Policy and Planning; The CSO and Strategic Planning; Business Is Like War; No Absolutes in Strategic Planning; Strategy and Change; NOTES; 3. Leading
INTRODUCTIONBuild a Vision; Enlist Followers; LEADERSHIP DEFINITIONS VARY; Complex and Subtle; Manager Versus Leader; Peter Principle; COMPETENCIES; Gain Attention; Set a Goal; Communicate the Message; Cultivate Trust; Develop Oneself; EMPOWERMENT; Contributing; Sharing Accomplishments; Energizing and Motivating; Conflicting Values; Quantity Versus Quality; Love of Work; FOLLOWERS; Taking Directions; Telling the Truth; Providing Feedback; LEADERS ADD VALUE; COMPETITION AMONG LEADERS; Ambition; Loyalty; PRICE OF LEADERSHIP; LEADING IN THE TWENTY-FIRST CENTURY; Build and Manage
Know the LandscapeExpect the Best; Do Not Micromanage; Be Accessible; Focus on What Is Important; Point the Way; CONCLUSIONS; NOTES; 4. Organizing; STAFFING; Justify the Position; Identify Relevant Skills and Knowledge; Search for Qualified Candidates; Compare Candidates Against Job Requirements; Identify the Apparent Best Candidate; Conduct a Background Inquiry; Test the Apparent Best Candidate; Offer the Job; The Independent Contractor; ORGANIZING ACTIVITIES; ESTABLISHING OBJECTIVES; Group Objectives; Individual Objectives; ORGANIZING CONSISTENT WITH POLICIES; Obtaining Resources
The People ResourceORGANIZING BEYOND BOUNDARIES; Assigning Tasks; Monitoring Performance; TERMINATING AN EMPLOYEE; Stunned Reaction; Psychological Trauma; Sorrow; Belligerence; Managing the Termination Interview; ORGANIZATIONAL STRUCTURES; Vertical Model; Network Model; Security Group Fit; NOTES; 5. Managing People; WORKING THROUGH PEOPLE; MASLOW'S THEORY; Physiological; Survival; Love; Self-esteem; Self-fulfillment; Curiosity; Key Tenets; Maslow in the Security Environment; PEOPLE DEVELOPMENT; Encourage; Expect Excellence; APPRAISING PERFORMANCE; Setting Targets; Target Qualities
Focus on Action Steps
Record Nr. UNINA-9910811284403321
Fay John <1934->  
Amsterdam ; ; Boston, : Elsevier/Butterworth-Heinemann, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of loss prevention and crime prevention [[electronic resource] /] / Lawrence J. Fennelly, [editor]
Handbook of loss prevention and crime prevention [[electronic resource] /] / Lawrence J. Fennelly, [editor]
Edizione [5th ed.]
Pubbl/distr/stampa Waltham, Mass., : Elsevier, 2012
Descrizione fisica 1 online resource (626 p.)
Disciplina 364.4
Altri autori (Persone) FennellyLawrence J. <1940->
Soggetto topico Private security services
Security systems
Industries - Security measures
Crime prevention and architectural design
Burglary protection
Soggetto genere / forma Electronic books.
ISBN 1-78402-460-0
1-283-44791-6
9786613447913
0-12-385249-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Approaches to crime prevention & loss prevention -- Risk assessment / Mary Lynn Garcia -- Threats definition / Mary Lynn Garcia -- Designing security and working with architects / Lawrence J. Fennelly -- Designing crime risk management systems / Marianna Perry MS -- Approaches to physical security / Richard Gigliotti and Ronald Jason -- The security survey & the security audit / Lawrence J. Fennelly -- Crime prevention through environmental design in the twenty first century / Timothy Crowe -- Environment crime control / Glen Kitteringham -- Community policing/problem solving policing / Marianna Perry -- Neighborhood watch guidelines for the 21 st century / Marianna Perry -- Situational crime prevention and opportunity blocking / Severin L. Sorenson -- Design and evaluation / Mary Lynn Garcia -- Planning, management, and evaluation / Charles M. Girard -- Crime analysis and data collection / Lawrence J. Fennelly -- Standards, regulations & guidelines : compliance and your security program, including global resources / Rick Draper -- Security operations, tools, and technology -- Access control, access badges & biometrics characteristic / Joseph Nelson.
Record Nr. UNINA-9910457191303321
Waltham, Mass., : Elsevier, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui