Book description
Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system.
The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework.
Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.
Table of contents
- Front Cover
- Contents (1/2)
- Contents (2/2)
- Preface
- The Authors
- Chapter 1: Introduction to Security Management (1/2)
- Chapter 1: Introduction to Security Management (2/2)
- Chapter 2: Security Management and Critical Thinking (1/2)
- Chapter 2: Security Management and Critical Thinking (2/2)
- Chapter 3: Core Competencies (1/2)
- Chapter 3: Core Competencies (2/2)
- Chapter 4: Developing a Security Management System (1/3)
- Chapter 4: Developing a Security Management System (2/3)
- Chapter 4: Developing a Security Management System (3/3)
- Chapter 5: Policies and Procedures (1/2)
- Chapter 5: Policies and Procedures (2/2)
- Chapter 6: Staffing the Response Force (1/2)
- Chapter 6: Staffing the Response Force (2/2)
- Chapter 7: Physical Controls (1/2)
- Chapter 7: Physical Controls (2/2)
- Chapter 8: Leadership (1/2)
- Chapter 8: Leadership (2/2)
- Chapter 9: Risk Assessment for the Security Manager (1/2)
- Chapter 9: Risk Assessment for the Security Manager (2/2)
- Chapter 10: Computer and Information Security (1/3)
- Chapter 10: Computer and Information Security (2/3)
- Chapter 10: Computer and Information Security (3/3)
- Chapter 11: Cybersecurity (1/2)
- Chapter 11: Cybersecurity (2/2)
- Chapter 12: Security Investigations (1/2)
- Chapter 12: Security Investigations (2/2)
- Chapter 13: Security Management for Chemicals and the Chemical Facility Antiterrorism Standards (1/2)
- Chapter 13: Security Management for Chemicals and the Chemical Facility Antiterrorism Standards (2/2)
- Chapter 14: Energy Sector: Security Management (1/2)
- Chapter 14: Energy Sector: Security Management (2/2)
- Chapter 15: Post 9/11 Security (1/2)
- Chapter 15: Post 9/11 Security (2/2)
- Appendix A (1/2)
- Appendix A (2/2)
- Appendix B (1/5)
- Appendix B (2/5)
- Appendix B (3/5)
- Appendix B (4/5)
- Appendix B (5/5)
- Appendix C (1/4)
- Appendix C (2/4)
- Appendix C (3/4)
- Appendix C (4/4)
- Appendix D (1/2)
- Appendix D (2/2)
- Back Cover
Product information
- Title: Security Management
- Author(s):
- Release date: December 2013
- Publisher(s): CRC Press
- ISBN: 9781466561786
You might also like
book
Executive's Guide to Personal Security, 2nd Edition
The proven safety tips and techniques for corporate executives, revised and updated The revised and updated …
book
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment
Use the guidance in this comprehensive field guide to gain the support of your top executives …
book
Information Security Management Handbook, Volume 7, 6th Edition
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and …
book
Security Risk Assessment
Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a …