Handbook of Loss Prevention and Crime Prevention

Editor/Author Fennelly, Lawrence
Publication Year: 2012
Publisher: Elsevier Science & Technology

Single-User Purchase Price: $112.74
Unlimited-User Purchase Price: $169.11
ISBN: 978-0-12-385246-5
Category: Social Sciences - Criminology & Law
Image Count: 147
Book Status: Available
Table of Contents

The Handbook of Loss Prevention and Crime Prevention, 5e, is a trusted resource for physical security professionals, students, and candidates for the coveted Certified Protection Professional (CPP) certification administered by ASIS International. The U.S. government recently announced that employees will have to obtain CPP certification to advance in their careers.

Share this

Table of Contents

  • Preface
  • Introduction
  • PART I APPROACHES TO CRIME PREVENTION & LOSS PREVENTION
  • Introduction and Approaches
  • 1. Introduction to Vulnerability Assessment Mary Lynn Garcia
  • 2. Vulnerability Assessment Process Inputs Establish Protection Objectives Mary Lynn Garcia
  • 3. Designing Security and Working with Architects Lawrence J. Fennelly
  • 4. Designing Crime Risk Management Systems Marianna Perry
  • 5. Approaches to Physical Security Richard Gigliotti and Ronald Jason
  • 6. Security Surveys and the Audit Lawrence J. Fennelly
  • Appendix 6.A: Site Survey and Risk Assessment
  • Appendix 6.B: Physical Security Survey
  • Appendix 6.C: Plant Security Checklist
  • Appendix 6.D: Security Officers Checklist
  • Appendix 6.E: Office Security Checklist
  • Appendix 6.F: Home Security Checklist
  • Appendix 6.G: Fire Safety Inspection
  • Appendix 6.H: Bullet-Resistant Glazing for a Secure Workplace
  • Appendix 6.I: Window Film
  • SECTION A CPTED, NEIGHBORHOOD WATCH & SITUATIONAL CRIME & OPPORTUNITY BLOCKING
  • 7. CPTED in the Twenty-First Century Timothy Crowe and Severin Sorensen
  • 8. Environmental Criminology and Crime Control Glen Kitteringham
  • 9. Problem Solving Community Policing Marianna Perry
  • 10. Neighborhood Watch Guidelines for the Twenty-First Century Marianna Perry
  • 11. Situational Crime Prevention and Opportunity Blocking Severin L. Sorensen
  • SECTION B PLANNING AND EVALUATION
  • 12. Design and Evaluation of Physical Protection Systems Mary Lynn Garcia
  • 13. Planning, Management, and Evaluation Charles M. Girard
  • 14. Crime Analysis Lawrence J. Fennelly
  • 15. Standards, Regulations and Guidelines: Compliance and Your Security Program, Including Global Resources Roderick Draper
  • PART II SECURITY OPERATIONS, TOOLS, AND TECHNOLOGY: Detection
  • SECTION C DETECTION
  • 16. Access Control, Access Badges, and Biometrics Characteristics Joseph Nelson
  • 17. Alarms: Intrusion Detection Systems Stephen McKinnon
  • Appendix 17.A: Smoke Detectors
  • Appendix 17.B: Alarm Certificate Services Glossary of Terms Certificate Types
  • Appendix 17.C: Fire Classifications
  • 18. Video Technology Overview Herman Kruegle
  • 19. Security Lighting Philip P. Purpura, Lawrence J. Fennelly, Gerard Honey, and James F. Broder
  • Appendix 19. A: Lighting Description
  • SECTION D TECHNOLOGY
  • 20. Information Technology Systems Infrastructure Thomas Norman
  • 21. Information Security Dr. Gerald L. Kovacich and Edward P. Halibozek
  • SECTION E DELAY
  • 22. Protective Barriers Lawrence J. Fennelly
  • 23. Physical Barriers Richard Gigliotti and Ronald Jason
  • 24. Fence Standards Chain Link Fence
  • 25. The Use of Locks in Physical Crime Prevention James M. Edgar and William D. McInerney
  • Appendix 26.A: Rating Files, Safes, and Vaults
  • SECTION F RESPONSE
  • 27. Guard Service in the Twenty-First Century Scott Fishman
  • SECTION G SPECIFIC THREAT PROCEDURES
  • 28. Internal Theft Controls Robert Fischer, Edward l. Halibozek, and Gion Green
  • 29. Bomb Threats and Physical Security Planning ATF Material, Secret Service
  • 30. Perspectives on Safe School Administration G. Edward Richards
  • 31. Campus Security and Crime Prevention Bronson S. Bias
  • 32. Domestic Violence: Stopping the Violence Inge Sebyan Black
  • 33. Proprietary Information John J. Fay
  • 34. Identity Theft Donald DiNardo
  • 35. Retail Security-Employee Theft Daniel Adam Smith
  • 36. High-Rise Security Geoff Craighead
  • 37. Multi-Residential Security Norman R. Bottom
  • 38. Lodging Hospitality Security H. Skip Bryant
  • 39. Computer and Transportation Systems Security Peter V. Radatti
  • 40. The Security Professional, Terrorism, Bioterrorism, and the Next Level Karl J. Leger
  • 41. Contingency Planning Dr. Gerald L. Kovacich and Edward P. Halibozek
  • 42. Emergency Preparedness Planning and Management Russell Colling and Tony W. York
  • 43. Broadband Industry Fraud: A Case Study from a Cable Provider Mark D. Farrell and Michael L. Bates
  • 44. Cargo Security Louis A. Tyska
  • Appendix 44.A: Cargo Security Checklist
  • Appendix 44.B: Personnel Security Checklist
  • Appendix 44.C: Physical Security Checklist
  • Appendix 44.D: Inspection Report Forms
  • Appendix 44.E: Documentation
  • Appendix 44.F: The Role of Private Security
  • SECTION H CORPORATE POLICY & PROCEDURES
  • 45. Corporate Policy and Procedures Mark Beaudry