Skip to main content

Books in Security

    • Security: A Guide to Security System Design and Equipment Selection and Installation

      • 2nd Edition
      • January 15, 1994
      • Neil Cumming
      • English
      • Paperback
        9 7 8 0 7 5 0 6 9 6 2 4 1
      • eBook
        9 7 8 0 0 8 0 5 1 6 8 4 4
      Security: A Guide to Security System Design and Equipment Selection and Installation, second edition is the first comprehensive reference for electronic security systems. In eight chapters, it guides the reader through selection, installation, testing, and maintenance of security equipment in 35 categories, from interior and exterior sensors to security systems, The uninformed purchaser, the security-conscious manager, and the novice security practitioner will find that this book demystifies the "black art" of security systems design via clear descriptions of operation principles and extensive practical advice. The more knowledgeable reader will find a unique reference and compendium of information usually found in many separate sources. Each device explained in this book is broken down into sections covering its principles of operation, uses, applications, equipment types, and advantages and disadvantages. This important reference outlines the data objectively, enabling the reader to independently make informed judgments about competing bids or proposals, compile a brief, and design or maintain a security system. Neil Cumming is a partner at Dodd, Cumming, and Love, Consulting Engineers in Plymouth, England. As Projects Manager for all security projects, he is directly responsible for the design of all security systems from inception to completion for a variety of clients. In this role, Mr. Cumming has designed and supervised the installation of security systems on private and military sites throughout Britain and the Middle East. Starting working life as an apprentice electrician, Mr. Cumming later studies at the City University, London, earning a degree in Building Services and Environmental Engineering.
    • Security Officer's Handbook

      • 1st Edition
      • April 12, 1994
      • Edward Kehoe
      • English
      • Paperback
        9 7 8 0 7 5 0 6 9 4 7 4 2
      • eBook
        9 7 8 0 0 8 0 5 7 1 5 7 7
      The Security Officer's Handbook fulfills the distinct need for a single methodof setting up the field operations needed to provide adequate protection to the client, firm or individual. The Standard Operating Procedure System asks all the questions required to survey any protection objective. In addition, the system provides all the basic information needed to answer those questions and leads to the implementation of the tactical or mission standard operating procedure. The Standard Operating Procedure System may be applied to any type of security or protection operation and may be modified, expanded or contracted, without needing to rewrite or redesign an existing security program.
    • Private Security Law

      • 1st Edition
      • November 9, 1992
      • David Maxwell
      • English
      • Paperback
        9 7 8 0 1 2 3 9 5 4 5 9 6
      • Hardback
        9 7 8 0 7 5 0 6 9 0 3 4 8
      • eBook
        9 7 8 0 0 8 0 5 7 1 3 7 9
      Private Security Law: Case Studies is uniquely designed for the special needs of private security practitioners, students, and instructors. Part One of the book encompasses negligence, intentional torts, agency contracts, alarms, and damages. Part Two covers authority of the private citizen, deprivation of rights, and entrapment.The factual cases presented in this book touch on the everyday duties of persons associated with the private security industry. Private Security Law: Case Studies provides a basic orientation to problems capable of inciting litigation. The information presented through case laws comes from cases chosen for their factual, realistic, and practical connection to the private security industry. This focused approach addresses specific problem areas of the industry and provides information necessary to a security manager to avert future loss.
    • Confidential Information Sources

      • 2nd Edition
      • July 31, 1991
      • John M. Carroll
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 7 6 4 7
      • Hardback
        9 7 8 0 7 5 0 6 9 0 1 8 8
      • eBook
        9 7 8 0 0 8 0 9 4 3 6 4 0
      This edition includes the effects of massive computerization on the collection, storage, and reporting of personal data. For investigations and back-ground checks of any type, this outstanding volume tells how to hire reliable employees, sell to solvent customers, and purchase from reliable vendors. Carroll also examines troubling issues of ethics, accuracy, and privacy in our age of electronic information transfer.