LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners and students the underlying scientific perspective based on robust underlying theories, principles, models or frameworks. Demonstrating the relationships and underlying concepts, they present an approach to each core security function within the context of both organizational security and homeland security. The book is unique in its application of the scientific method to the increasingly challenging tasks of preventing crime and foiling terrorist attacks. Incorporating the latest security theories and principles, it considers security from both a national and corporate perspective, applied at a strategic and tactical level. It provides a rational basis for complex decisions and begins the process of defining the emerging discipline of security science.
Students in Security, Homeland Security, and Security Science programs in APAC, UK, Middle East and US; security professionals in government and corporate settings worldwide
Dedication
Acknowledgments
About the Authors
Foreword
Preface
Chapter 1. Concept of Security
Objectives
Introduction
Scientific method in support of security science
Defining the concept of security
Security of individuals
Security of groups
Security of nation-state and international systems
Concept of security matrix
Security science: context defines concept definition
Security science
Conclusion
Further Reading
References
Chapter 2. Security Management
Objectives
Introduction
Security management issues
A systems approach
Security management
Strategic security management frameworks
Organizational resilience
Security management functions
Security management policies and procedures
Security principles
Security ethics
Security decay
Conclusion
Websites
References
Chapter 3. Security Risk Management
Objectives
Introduction
The concept of risk
Defining risk
The concepts of probability to likelihood
Importance of consequence
Source of risk
Risk management
An international approach to risk management
Security risk management
Threat
Criticality
Vulnerability
Threat, criticality, and vulnerability
Risk models and modeling
Gaming risk
Decision-making in risk
Perception and culture
Trust
Gaining consensus
Conclusion
Further Reading
References
Chapter 4. Built Environment
Objectives
Introduction
Built environment
Security and the built environment
Facility management
Who is the facility manager?
Facility management and security
Building management systems
Protecting the facility
Conclusion
Further Reading
References
Chapter 5. Physical Security
Objectives
Introduction
Routine activity theory
Defense-in-depth
Crime prevention through environmental design
Physical barriers
Relationships between DiD functions
Conclusion
Further Reading
References
Chapter 6. Detection Systems
Objectives
Introduction
Theory
Function of security technology
Barrier and open ground detection
Testing systems
Conclusion
Further Reading
References
Chapter 7. Integrated Identification Technology
Objectives
Introduction
Background
Access control systems
Cards
Biometrics
Intelligent CCTV
Conclusion
Further Reading
References
Chapter 8. Knowledge Management
Objectives
Introduction
Knowledge
Intelligence
Intelligence in security management
Vetting
Predictive profiling
Conclusion
Further Reading
References
Chapter 9. Business Continuity Management
Objectives
Introduction
Crisis
Four phases of a crisis
Business continuity management
Essential elements of business continuity management
BCM Framework
Business impact forecasting
Learning from a crisis
Common elements of BCM
Security and BCM
Conclusion
Further Reading
References
Chapter 10. The Future of Security
Objectives
Introduction
Background
Security in the future
Future of intelligence
Professionalism
Management
Conclusion
Further Reading
References
Index
CS
Engineering, Edith Cowan University, Perth, Western Australia. He developed their Security
Science programs (BS, MS, and PhD) beginning in the 1980s, and helped establish their
Security Science Research and Test Laboratory. He continues to conduct research in ballistics
imaging, security knowledge and understanding, biometric imaging, and security education.
Professor Smith has consulted in Australia, Southeast Asia, UK and India on security training
programs, physical security audits, CCTV and infrared surveillance techniques, security lighting
evaluation, and perimeter technology testing.
DB
Australia, teaching and researching Security Science. Dr. Brooks specializes in security
knowledge structure, security risk management and security technology. Past positions include
the Australian Defence Force West Australian Infrastructure Plant Contract Manager, Senior
Security Consultant with AMLEC House consulting group and others, and military service in the
Royal Air Force, Air Defence group. Current research involves developing the theory of entropic
security decay, defeat testing of security technology, use of resilience as an aid to National
Security Vetting and Building Management System vulnerabilities.