Limit this search to....

Security Program Design and Management: A Guide for Security-Conscious Managers
Contributor(s): Tweedy, Donald B. (Author)
ISBN: 0899304249     ISBN-13: 9780899304243
Publisher: Praeger
OUR PRICE:   $94.05  
Product Type: Hardcover
Published: August 1989
Qty:
Additional Information
BISAC Categories:
- Computers | Hardware - Personal Computers - General
- Business & Economics | Leadership
- Computers | Enterprise Applications - General
Dewey: 658.473
LCCN: 88-38102
Physical Information: 0.75" H x 6.14" W x 9.21" (1.38 lbs) 309 pages
 
Descriptions, Reviews, Etc.
Publisher Description:

A unique how-to guide for managers with asset-protection responsibilities, this book offers the reader both a clear picture of security program needs and some practical suggestions for meeting these needs. In addition to providing detailed information on security program management, the guide also emphasizes the importance of the relationship between security program management and other administrative services. Tweedy covers proven strategies and techniques to combat everyday security problems like burglary as well as sophisticated thefts of vital information and threats of terrorism. Numerous illustrations, diagrams, checklists, job descriptions, and model forms are included for ready reference.

Tweedy begins with an overview of security program development and operation. Several chapters follow devoted to the composition and utilization of a security guard force, elements of security program management, and control processes in security program management. Tweedy advocates employee participation in loss prevention and a new focus on managerial, rather than strictly task-oriented thinking. Separate chapters address issues such as personnel selection and performance evaluation, EDP system protection, and crime in the United States. The final four chapters provide a summary of steps to achieve a higher degree of protection against terrorism through crisis planning, protection of personnel, safeguarding facilities and other assets, and the protection of records. Two appendices provide details and relevant examples of actual security-related activities.