o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m
Protecting Employees and Assets in Volatile Regions
Port Security Management
Scott Alan Ast
Kenneth Christopher
Security Professional, Olathe, Kansas, USA
Park University, Parkville, Missouri, USA
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI-recognized subject matter expert, this text details the recommended protocol for protecting people and assets in hostile global settings. Scott Alan Ast offers wisdom and insight gleaned from 28 years of hands-on experience in international security management. He supplies the fundamental understanding and advanced tools required to ensure business is conducted safely regardless of the risk level, identifying the various threats that loom in international projects, and walking readers through a logical framework to design and implement a safety and security program.
Focusing on organizational structure, risk and vulnerability analysis, and operations oversight, this book explores security management in the port facility environment. It begins with a historical perspective on maritime and port security and contextualizes the management of risk assessment and the unique vulnerabilities found within the maritime and port sector. Balancing the needs of business and homeland safety, the book addresses the ground-level issues, tasks, and responsibilities that must be handled by the security manager in concert with the port director and law enforcement. It also addresses cargo security, personnel security, guard force management, and the role of technology.
Catalog no. K10256, ISBN: 978-1-4398-0467-4 August 2009, 6-1/8 x 9-1/4, 366 pp. Suggested Price: $79.95 / £49.99
Catalog no. AU6892, ISBN: 978-1-4200-6892-4 March 2009, 7 x 10, 336 pp. Suggested Price: $89.95 / £54.99
Mechanics of User Identification and Authentication Fundamentals of Identity Management
A Practical Guide to Security Assessments
Dobromir Todorov
Sudhanshu Kairab
Consultant, Buckinghamshire, UK
Amper, Politziner, & Mattia, P.C., New Jersey, USA
Effective and fool-proof user identification and authentication are essential to modern security. Providing a hacker perspective, this text introduces the philosophy behind user authentication and access control and presents key concepts for practical applications. It outlines the process of controlled access to resources through authentication, authorization, and accounting and provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is presented with a specific authentication scenario.
Taking a process-focused approach, A Practical Guide to Security Assessments presents a structured methodology for conducting assessments. The key element of the methodology is an understanding of business goals and processes, and how security measures are aligned with business risks. The guide also emphasizes that resulting security recommendations should be cost-effective and commensurate with the security risk. The methodology described serves as a foundation for building and maintaining an information security program. The book includes an appendix with questionnaires that can be modified and used to conduct security assessments.
Catalog no. AU5219, ISBN: 978-1-4200-5219-0 June 2007, 6-1/8 x 9-1/4, 760 pp. Suggested Price: $83.95 / £53.99
Catalog no. AU1706, ISBN: 978-0-8493-1706-4 September 2004, 6-1/8 x 9-1/4, 520 pp. Suggested Price: $83.95 / £53.99
Textbook
Organizational Crisis Management
Private Security and the Investigative Process
The Human Factor
Third Edition
Gerald Lewis
Charles P. Nemeth
COMPASS, Framingham, Massachusetts, USA
California University of Pennsylvania, USA
Organizational Crisis Management: The Human Factor offers a theoretical background and practical strategies for responding to workplace crises. Responding to a paradigm that focuses on the operational aspects of continuity to the detriment of human factors, this volume provides a comprehensive understanding of the unavoidable yet often complex reactions of people to a wide array of organizational disruptions. Based upon the author’s vast experience in the field, this book is a “nuts and bolts” resource that you can immediately apply to a wide range of organizational environments. The book also looks at legal and security aspects of workplace disruption.
Now in its third edition, this highly popular resource covers best-practice techniques and little-known trade secrets that are applicable for use in public law enforcement and private sector and corporate security investigations. It offers insight into the various elements and activities that make up a thorough, professional investigation. This edition has been completely updated to include emerging technology and revised legal and practical considerations regarding interviewing, as well as additional information on case evaluation and an overview of the investigative process. An instructor’s manual with PowerPoint® slides is available with qualifying course adoption.
Catalog no. AU3962, ISBN: 978-0-8493-3962-2 March 2006, 6-1/8 x 9-1/4, 208 pp. Suggested Price: $83.95 / £53.99
Catalog no. AU8569, ISBN: 978-1-4200-8569-3 February 2010, 7 x 10, 272 pp. Suggested Price: $69.95 / £44.99
Security Management
Managing Security Overseas
33