LEADER 00000cam a2200853 a 4500 001 667286517 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cnu---unuuu 008 100930s2008 ne a obf 000 0 eng d 010 |z 2007034075 019 712992651|a961503967|a962722021|a988408597|a992034648 |a1037922467|a1038585321|a1045502004|a1055393743 |a1064862974|a1081232508|a1114364193|a1153053199 |a1192331100|a1202542543|a1228584327|a1262682462 |a1392124675 020 9780080553993|q(electronic bk.) 020 0080553990|q(electronic bk.) 029 1 AU@|b000051559081 029 1 AU@|b000062336262 029 1 DEBBG|bBV043153181 029 1 DEBSZ|b421687908 029 1 NZ1|b14540665 035 (OCoLC)667286517|z(OCoLC)712992651|z(OCoLC)961503967 |z(OCoLC)962722021|z(OCoLC)988408597|z(OCoLC)992034648 |z(OCoLC)1037922467|z(OCoLC)1038585321|z(OCoLC)1045502004 |z(OCoLC)1055393743|z(OCoLC)1064862974|z(OCoLC)1081232508 |z(OCoLC)1114364193|z(OCoLC)1153053199|z(OCoLC)1192331100 |z(OCoLC)1202542543|z(OCoLC)1228584327|z(OCoLC)1262682462 |z(OCoLC)1392124675 040 N$T|beng|epn|cN$T|dYDXCP|dOCLCQ|dSNK|dE7B|dOCLCQ|dREDDC |dOCLCQ|dOCLCF|dOCLCQ|dNLGGC|dOCLCO|dOCL|dOCLCQ|dCOO|dAZK |dAGLDB|dMOR|dPIFAG|dOCLCQ|dJBG|dOCLCQ|dU3W|dCOCUF|dSTF |dVNS|dWRM|dOCLCQ|dVTS|dCEF|dNRAMU|dVT2|dOCLCQ|dWYU|dM8D |dHS0|dBOL|dUKCRE|dOCLCQ|dOCLCO|dOCLCQ|dINARC|dOCLCO |dOCLCL 049 INap 082 04 363.28/90683 082 04 363.28/90683|222 099 eBook O’Reilly for Public Libraries 245 00 Security supervision and management :|bthe theory and practice of asset protection /|cedited by Sandi J. Davies and Christopher A. Hertig.|h[O'Reilly electronic resource] 250 3rd ed. 260 Amsterdam ;|aBoston :|bButterworth-Heinemann/Elsevier, |c©2008. 300 1 online resource (xli, 537 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 340 |gpolychrome.|2rdacc|0http://rdaregistry.info/termList/ RDAColourContent/1003 347 text file|2rdaft|0http://rdaregistry.info/termList/ fileType/1002 500 Revised edition of: Security supervision. 2nd ed. 504 Includes bibliographical references. 505 0 Front Cover; Security Supervision and Management The Theory and Practice of Asset Protection; Copyright Page; Table of Contents; Introduction; Intro I: Dedication; Intro II: Foreword; Intro III: Acknowledgments; Intro IV: Introduction; Intro V: Protection Officer Code of Ethics; Unit I: Security and Asset Protection Principles; Unit I-1 : Evolving a Discipline of Security; The Value of Security; Policing; The Role of Management -- Responding to Crime; Toward a Body of Knowledge; The Evolving Discipline of Security; Unit I-2: The Future of Security; Security Industry Trends 505 8 Nature of the Security Industry: The FutureConclusion; References; The Future of Security Quiz; Unit I-2: Appendix: The Future of Security Training; Concepts; Minimum Standards; Job Task Analysis; Determining Training Needs; METL Approach; So Where do We Go from Here?; National Response Plan; DHS Course, UNLV Frontline Responder Training Course Terrorism Awareness: Protecting Soft Targets; Public-Private Partnerships; Quiz; Unit I-3: Key Terms and Concepts; Commerce, Supply and Demand, and Stakeholders; Management and Management Methodology; Functions and Functional Departments 505 8 Asset Protection and Asset Protection TheoryQuestions; Unit I-4: Explaining Crime: Contemporary Criminological Theory; The Classical and Neoclassical Schools of Thought; The Positivist School of Thought; Other Explanations of Criminality; Criminological Theories in the Real World; References; Appendix: Quick Reference Theory Matrix; Quiz; Unit II: Human Resource Management; Unit II-1: Recruitment and Retention of Security Personnel: Understanding and Meeting the Challenge; Introduction; Recruitment; Internal Recruitment; External Recruitment; Turnover Costs 505 8 Absenteeism: A Precursor of Turnover?Retention Strategies; Preassignment Phase; The Initial 90 Days; Conclusion; References; Recruitment and Retention of Security Personnel; Unit II-2: Security Personnel Selection; Security Officer Eligibility Requirements; Additional Requirements; The Interview Process; Background Check; Conclusion; Security Personnel Selection; Unit II-3: Supervisory Characteristics and Expectations; What is Expected of a Supervisor; Characteristics of a Good Supervisor; Poor Characteristics of a Supervisor; What Employees Expect from Supervisors; Conclusions; Bibliography 505 8 Personnel: Policies and ProceduresUnit II-4: Evaluation of Uniformed Protection Officers; Introduction; Officer Evaluation; Motivation and Evaluation; Unit II-5: Employee Motivation Theory and Application; Theories of Behavioral Motivation; Herzberg's Two-Factor Theory; Reinforcement Theory; Equity Theory; Practical Tools in Fostering Motivation; Summary; References; Employee Motivation Theory and Application; Unit II-6: Employee Discipline: Policy and Practice; Defining Discipline; The Disciplinary Process; Disciplinary Policy; Determining the Necessity of Disciplinary Action 520 The International Foundation for Protection Officers (IFPO) has for many years provided materials to support its certification programs. The current edition of this book is being used as the core text for the Security Supervision and Management Training/Certified in Security Supervision and Management (CSSM) Program at IFPO. The CSSM was designed in 1988 to meet the needs of the security supervisor or senior protection officer. The book has enjoyed tremendous acceptance and success in the past, and the changes in this third edition, vetted by IFPO, make it still more current and relevant. <b. 588 0 Print version record. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Police, Private|xTraining of|vHandbooks, manuals, etc. 650 0 Police, Private|xManagement|vHandbooks, manuals, etc. 650 0 Private security services|vHandbooks, manuals, etc. 650 0 Private security services|xManagement|vHandbooks, manuals, etc. 650 6 Police privée|xFormation|vGuides, manuels, etc. 650 6 Police privée|xGestion|vGuides, manuels, etc. 650 6 Services privés de sécurité|vGuides, manuels, etc. 650 6 Services privés de sécurité|xGestion|vGuides, manuels, etc. 650 7 Police, Private|xManagement|2fast 650 7 Police, Private|xTraining of|2fast 650 7 Private security services|2fast 650 7 Private security services|xManagement|2fast 655 7 handbooks.|2aat 655 7 manuals (instructional materials)|2aat 655 7 Handbooks and manuals|2fast 655 7 Handbooks and manuals.|2lcgft 655 7 Guides et manuels.|2rvmgf 700 1 Davies, Sandi J. 700 1 Hertig, Christopher A. 730 0 Security supervision. 776 08 |iPrint version:|tSecurity supervision and management. |b3rd ed.|dAmsterdam ; Boston : Butterworth-Heinemann/ Elsevier, ©2008|z9780750684361|w(DLC) 2007034075 |w(OCoLC)165958220 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9780750684361/?ar |zAvailable on O'Reilly for Public Libraries 938 ebrary|bEBRY|nebr10408165 938 EBSCOhost|bEBSC|n334593 938 YBP Library Services|bYANK|n3414200 938 Internet Archive|bINAR|nsecuritysupervis0000unse 994 92|bJFN