Contemporary security management /:
Contemporary Security Management serves as an indispensable working tool for students and security professionals at all levels of experience. It is designed to provide the hard facts on modern practices to efficiently and effectively run a security department and covers such vital topics as: leaders...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
Elsevier/Butterworth-Heinemann,
©2006.
|
Ausgabe: | 2nd ed. |
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | Contemporary Security Management serves as an indispensable working tool for students and security professionals at all levels of experience. It is designed to provide the hard facts on modern practices to efficiently and effectively run a security department and covers such vital topics as: leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence and emergency management. New topics covered include terrorism and the new government mandate to perform standard vulnerability. |
Beschreibung: | 1 online resource (xiv, 523 pages :) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780080476827 0080476821 9780750679282 075067928X 1281052531 9781281052537 9786611052539 6611052534 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn179603660 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 071029s2006 ne a ob 001 0 eng d | ||
010 | |z 2006274653 | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d IDEBK |d E7B |d OCLCQ |d TEFOD |d OCLCQ |d OCLCF |d NLGGC |d OCLCQ |d A8C |d CGU |d TEFOD |d OCLCQ |d AZK |d LOA |d JBG |d AGLDB |d MOR |d PIFAG |d OCLCQ |d U3W |d COCUF |d STF |d VNS |d WRM |d OCLCQ |d VTS |d VT2 |d OCLCQ |d WYU |d M8D |d HS0 |d UKCRE |d BOL |d VLY |d INARC |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d AU@ |d OCLCO |d OCLCL |d EZC |d OCLCL | ||
019 | |a 171131250 |a 648300236 |a 826456449 |a 961641962 |a 962622081 |a 966203347 |a 988470222 |a 991975181 |a 1034919457 |a 1037713938 |a 1038702281 |a 1055339543 |a 1062902680 |a 1081272853 |a 1114390277 |a 1153528269 |a 1162218668 |a 1228615475 |a 1241853731 |a 1255739278 |a 1290091917 |a 1300678073 |a 1354630210 | ||
020 | |a 9780080476827 |q (electronic bk.) | ||
020 | |a 0080476821 |q (electronic bk.) | ||
020 | |a 9780750679282 | ||
020 | |a 075067928X | ||
020 | |a 1281052531 | ||
020 | |a 9781281052537 | ||
020 | |a 9786611052539 | ||
020 | |a 6611052534 | ||
020 | |z 075067928X |q (alk. paper) | ||
035 | |a (OCoLC)179603660 |z (OCoLC)171131250 |z (OCoLC)648300236 |z (OCoLC)826456449 |z (OCoLC)961641962 |z (OCoLC)962622081 |z (OCoLC)966203347 |z (OCoLC)988470222 |z (OCoLC)991975181 |z (OCoLC)1034919457 |z (OCoLC)1037713938 |z (OCoLC)1038702281 |z (OCoLC)1055339543 |z (OCoLC)1062902680 |z (OCoLC)1081272853 |z (OCoLC)1114390277 |z (OCoLC)1153528269 |z (OCoLC)1162218668 |z (OCoLC)1228615475 |z (OCoLC)1241853731 |z (OCoLC)1255739278 |z (OCoLC)1290091917 |z (OCoLC)1300678073 |z (OCoLC)1354630210 | ||
037 | |a CF50F826-6EF2-4A7B-A7A7-4A83562B3904 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a HV8290 |b .F39 2006eb | |
072 | 7 | |a BUS |x 097000 |2 bisacsh | |
072 | 7 | |a BUS |x 104000 |2 bisacsh | |
072 | 7 | |a BUS |x 071000 |2 bisacsh | |
072 | 7 | |a BUS |x 103000 |2 bisacsh | |
082 | 7 | |a 658.4/7 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Fay, John, |d 1934- |1 https://id.oclc.org/worldcat/entity/E39PCjBQv6wqfDM34x4KddtWQq |0 http://id.loc.gov/authorities/names/n79087832 | |
245 | 1 | 0 | |a Contemporary security management / |c John J. Fay. |
250 | |a 2nd ed. | ||
260 | |a Amsterdam ; |a Boston : |b Elsevier/Butterworth-Heinemann, |c ©2006. | ||
300 | |a 1 online resource (xiv, 523 pages :) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
340 | |g polychrome. |2 rdacc |0 http://rdaregistry.info/termList/RDAColourContent/1003 | ||
347 | |a text file |2 rdaft |0 http://rdaregistry.info/termList/fileType/1002 | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Cover; Title page; Copyright page; Table of contents; 1. Historical Roots; INTRODUCTION; INDUSTRIAL REVOLUTION; Fertile Ground; Growth of Factories; Mass Production; SCIENTIFIC MANAGEMENT; HUMAN RELATIONS; OPERATIONS RESEARCH; AGE OF TECHNOLOGY; BUSINESS TODAY; SECURITY INDUSTRY; English Roots; Law Enforcement and Security; Terrorism; Security Marketplace; Guard Services; Professionalism; Technology; The Future; NOTES; 2. Strategy; BUSINESS STRATEGY; CORE AND SUPPORT ACTIVITIES; OUTSOURCING; OUTSOURCING AND THE SECURITY GROUP; Protecting Assets Under Altered Circumstances; Due Diligence | |
505 | 8 | |a Ambiguous SpecificationsEFFECT OF STRATEGY ON SECURITY MANAGEMENT; Anticipate; Exposures; Magnitude; Complexity; TECHNICAL KNOWLEDGE; Access; Quality; Teamwork; STRATEGY AND RISK; Predict; Quantify; IMPERATIVES; Improve on Quality; Forge Close Links with Customers; Establish Close Relationships with Suppliers; Make Effective Use of Technology; Operate with Minimum Layers of Management; Continuously Improve the Security Staff; STRATEGIC PLANNING; Policy and Planning; The CSO and Strategic Planning; Business Is Like War; No Absolutes in Strategic Planning; Strategy and Change; NOTES; 3. Leading | |
505 | 8 | |a INTRODUCTIONBuild a Vision; Enlist Followers; LEADERSHIP DEFINITIONS VARY; Complex and Subtle; Manager Versus Leader; Peter Principle; COMPETENCIES; Gain Attention; Set a Goal; Communicate the Message; Cultivate Trust; Develop Oneself; EMPOWERMENT; Contributing; Sharing Accomplishments; Energizing and Motivating; Conflicting Values; Quantity Versus Quality; Love of Work; FOLLOWERS; Taking Directions; Telling the Truth; Providing Feedback; LEADERS ADD VALUE; COMPETITION AMONG LEADERS; Ambition; Loyalty; PRICE OF LEADERSHIP; LEADING IN THE TWENTY-FIRST CENTURY; Build and Manage | |
505 | 8 | |a Know the LandscapeExpect the Best; Do Not Micromanage; Be Accessible; Focus on What Is Important; Point the Way; CONCLUSIONS; NOTES; 4. Organizing; STAFFING; Justify the Position; Identify Relevant Skills and Knowledge; Search for Qualified Candidates; Compare Candidates Against Job Requirements; Identify the Apparent Best Candidate; Conduct a Background Inquiry; Test the Apparent Best Candidate; Offer the Job; The Independent Contractor; ORGANIZING ACTIVITIES; ESTABLISHING OBJECTIVES; Group Objectives; Individual Objectives; ORGANIZING CONSISTENT WITH POLICIES; Obtaining Resources | |
505 | 8 | |a The People ResourceORGANIZING BEYOND BOUNDARIES; Assigning Tasks; Monitoring Performance; TERMINATING AN EMPLOYEE; Stunned Reaction; Psychological Trauma; Sorrow; Belligerence; Managing the Termination Interview; ORGANIZATIONAL STRUCTURES; Vertical Model; Network Model; Security Group Fit; NOTES; 5. Managing People; WORKING THROUGH PEOPLE; MASLOW'S THEORY; Physiological; Survival; Love; Self-esteem; Self-fulfillment; Curiosity; Key Tenets; Maslow in the Security Environment; PEOPLE DEVELOPMENT; Encourage; Expect Excellence; APPRAISING PERFORMANCE; Setting Targets; Target Qualities | |
520 | |a Contemporary Security Management serves as an indispensable working tool for students and security professionals at all levels of experience. It is designed to provide the hard facts on modern practices to efficiently and effectively run a security department and covers such vital topics as: leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence and emergency management. New topics covered include terrorism and the new government mandate to perform standard vulnerability. | ||
546 | |a English. | ||
650 | 0 | |a Private security services. |0 http://id.loc.gov/authorities/subjects/sh86004146 | |
650 | 0 | |a Industries |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh85065971 | |
650 | 0 | |a Personnel management. |0 http://id.loc.gov/authorities/subjects/sh85100143 | |
650 | 6 | |a Services privés de sécurité. | |
650 | 6 | |a Industrie |x Sécurité |x Mesures. | |
650 | 6 | |a Personnel |x Direction. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Workplace Culture. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Corporate Governance. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Leadership. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Development. |2 bisacsh | |
650 | 7 | |a Industries |x Security measures |2 fast | |
650 | 7 | |a Personnel management |2 fast | |
650 | 7 | |a Private security services |2 fast | |
655 | 7 | |a dissertations. |2 aat | |
655 | 7 | |a Academic theses |2 fast | |
655 | 7 | |a Academic theses. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026039 | |
655 | 7 | |a Thèses et écrits académiques. |2 rvmgf | |
758 | |i has work: |a Contemporary security management (Work) |1 https://id.oclc.org/worldcat/entity/E39PCGWGjKr9TctX4p8Pfm73ry |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Fay, John, 1934- |t Contemporary security management. |b 2nd ed. |d Amsterdam ; Boston : Elsevier/Butterworth-Heinemann, ©2006 |z 075067928X |z 9780750679282 |w (DLC) 2006274653 |w (OCoLC)69672120 |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196419 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196419 |3 Volltext |
938 | |a ebrary |b EBRY |n ebr10186007 | ||
938 | |a EBSCOhost |b EBSC |n 196419 | ||
938 | |a Internet Archive |b INAR |n contemporarysecu0000fayj_u0h1 | ||
938 | |a YBP Library Services |b YANK |n 2613212 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn179603660 |
---|---|
_version_ | 1826941578741022720 |
adam_text | |
any_adam_object | |
author | Fay, John, 1934- |
author_GND | http://id.loc.gov/authorities/names/n79087832 |
author_facet | Fay, John, 1934- |
author_role | |
author_sort | Fay, John, 1934- |
author_variant | j f jf |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV8290 |
callnumber-raw | HV8290 .F39 2006eb |
callnumber-search | HV8290 .F39 2006eb |
callnumber-sort | HV 48290 F39 42006EB |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Cover; Title page; Copyright page; Table of contents; 1. Historical Roots; INTRODUCTION; INDUSTRIAL REVOLUTION; Fertile Ground; Growth of Factories; Mass Production; SCIENTIFIC MANAGEMENT; HUMAN RELATIONS; OPERATIONS RESEARCH; AGE OF TECHNOLOGY; BUSINESS TODAY; SECURITY INDUSTRY; English Roots; Law Enforcement and Security; Terrorism; Security Marketplace; Guard Services; Professionalism; Technology; The Future; NOTES; 2. Strategy; BUSINESS STRATEGY; CORE AND SUPPORT ACTIVITIES; OUTSOURCING; OUTSOURCING AND THE SECURITY GROUP; Protecting Assets Under Altered Circumstances; Due Diligence Ambiguous SpecificationsEFFECT OF STRATEGY ON SECURITY MANAGEMENT; Anticipate; Exposures; Magnitude; Complexity; TECHNICAL KNOWLEDGE; Access; Quality; Teamwork; STRATEGY AND RISK; Predict; Quantify; IMPERATIVES; Improve on Quality; Forge Close Links with Customers; Establish Close Relationships with Suppliers; Make Effective Use of Technology; Operate with Minimum Layers of Management; Continuously Improve the Security Staff; STRATEGIC PLANNING; Policy and Planning; The CSO and Strategic Planning; Business Is Like War; No Absolutes in Strategic Planning; Strategy and Change; NOTES; 3. Leading INTRODUCTIONBuild a Vision; Enlist Followers; LEADERSHIP DEFINITIONS VARY; Complex and Subtle; Manager Versus Leader; Peter Principle; COMPETENCIES; Gain Attention; Set a Goal; Communicate the Message; Cultivate Trust; Develop Oneself; EMPOWERMENT; Contributing; Sharing Accomplishments; Energizing and Motivating; Conflicting Values; Quantity Versus Quality; Love of Work; FOLLOWERS; Taking Directions; Telling the Truth; Providing Feedback; LEADERS ADD VALUE; COMPETITION AMONG LEADERS; Ambition; Loyalty; PRICE OF LEADERSHIP; LEADING IN THE TWENTY-FIRST CENTURY; Build and Manage Know the LandscapeExpect the Best; Do Not Micromanage; Be Accessible; Focus on What Is Important; Point the Way; CONCLUSIONS; NOTES; 4. Organizing; STAFFING; Justify the Position; Identify Relevant Skills and Knowledge; Search for Qualified Candidates; Compare Candidates Against Job Requirements; Identify the Apparent Best Candidate; Conduct a Background Inquiry; Test the Apparent Best Candidate; Offer the Job; The Independent Contractor; ORGANIZING ACTIVITIES; ESTABLISHING OBJECTIVES; Group Objectives; Individual Objectives; ORGANIZING CONSISTENT WITH POLICIES; Obtaining Resources The People ResourceORGANIZING BEYOND BOUNDARIES; Assigning Tasks; Monitoring Performance; TERMINATING AN EMPLOYEE; Stunned Reaction; Psychological Trauma; Sorrow; Belligerence; Managing the Termination Interview; ORGANIZATIONAL STRUCTURES; Vertical Model; Network Model; Security Group Fit; NOTES; 5. Managing People; WORKING THROUGH PEOPLE; MASLOW'S THEORY; Physiological; Survival; Love; Self-esteem; Self-fulfillment; Curiosity; Key Tenets; Maslow in the Security Environment; PEOPLE DEVELOPMENT; Encourage; Expect Excellence; APPRAISING PERFORMANCE; Setting Targets; Target Qualities |
ctrlnum | (OCoLC)179603660 |
dewey-full | 658.4/7 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/7 |
dewey-search | 658.4/7 |
dewey-sort | 3658.4 17 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08156cam a2200877 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn179603660</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">071029s2006 ne a ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2006274653</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A8C</subfield><subfield code="d">CGU</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">COCUF</subfield><subfield code="d">STF</subfield><subfield code="d">VNS</subfield><subfield code="d">WRM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">M8D</subfield><subfield code="d">HS0</subfield><subfield code="d">UKCRE</subfield><subfield code="d">BOL</subfield><subfield code="d">VLY</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">EZC</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">171131250</subfield><subfield code="a">648300236</subfield><subfield code="a">826456449</subfield><subfield code="a">961641962</subfield><subfield code="a">962622081</subfield><subfield code="a">966203347</subfield><subfield code="a">988470222</subfield><subfield code="a">991975181</subfield><subfield code="a">1034919457</subfield><subfield code="a">1037713938</subfield><subfield code="a">1038702281</subfield><subfield code="a">1055339543</subfield><subfield code="a">1062902680</subfield><subfield code="a">1081272853</subfield><subfield code="a">1114390277</subfield><subfield code="a">1153528269</subfield><subfield code="a">1162218668</subfield><subfield code="a">1228615475</subfield><subfield code="a">1241853731</subfield><subfield code="a">1255739278</subfield><subfield code="a">1290091917</subfield><subfield code="a">1300678073</subfield><subfield code="a">1354630210</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080476827</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080476821</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780750679282</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">075067928X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281052531</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281052537</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611052539</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611052534</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">075067928X</subfield><subfield code="q">(alk. paper)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)179603660</subfield><subfield code="z">(OCoLC)171131250</subfield><subfield code="z">(OCoLC)648300236</subfield><subfield code="z">(OCoLC)826456449</subfield><subfield code="z">(OCoLC)961641962</subfield><subfield code="z">(OCoLC)962622081</subfield><subfield code="z">(OCoLC)966203347</subfield><subfield code="z">(OCoLC)988470222</subfield><subfield code="z">(OCoLC)991975181</subfield><subfield code="z">(OCoLC)1034919457</subfield><subfield code="z">(OCoLC)1037713938</subfield><subfield code="z">(OCoLC)1038702281</subfield><subfield code="z">(OCoLC)1055339543</subfield><subfield code="z">(OCoLC)1062902680</subfield><subfield code="z">(OCoLC)1081272853</subfield><subfield code="z">(OCoLC)1114390277</subfield><subfield code="z">(OCoLC)1153528269</subfield><subfield code="z">(OCoLC)1162218668</subfield><subfield code="z">(OCoLC)1228615475</subfield><subfield code="z">(OCoLC)1241853731</subfield><subfield code="z">(OCoLC)1255739278</subfield><subfield code="z">(OCoLC)1290091917</subfield><subfield code="z">(OCoLC)1300678073</subfield><subfield code="z">(OCoLC)1354630210</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CF50F826-6EF2-4A7B-A7A7-4A83562B3904</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV8290</subfield><subfield code="b">.F39 2006eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">097000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">104000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">071000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">103000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/7</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fay, John,</subfield><subfield code="d">1934-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjBQv6wqfDM34x4KddtWQq</subfield><subfield code="0">http://id.loc.gov/authorities/names/n79087832</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Contemporary security management /</subfield><subfield code="c">John J. Fay.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Elsevier/Butterworth-Heinemann,</subfield><subfield code="c">©2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiv, 523 pages :)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="340" ind1=" " ind2=" "><subfield code="g">polychrome.</subfield><subfield code="2">rdacc</subfield><subfield code="0">http://rdaregistry.info/termList/RDAColourContent/1003</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="2">rdaft</subfield><subfield code="0">http://rdaregistry.info/termList/fileType/1002</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title page; Copyright page; Table of contents; 1. Historical Roots; INTRODUCTION; INDUSTRIAL REVOLUTION; Fertile Ground; Growth of Factories; Mass Production; SCIENTIFIC MANAGEMENT; HUMAN RELATIONS; OPERATIONS RESEARCH; AGE OF TECHNOLOGY; BUSINESS TODAY; SECURITY INDUSTRY; English Roots; Law Enforcement and Security; Terrorism; Security Marketplace; Guard Services; Professionalism; Technology; The Future; NOTES; 2. Strategy; BUSINESS STRATEGY; CORE AND SUPPORT ACTIVITIES; OUTSOURCING; OUTSOURCING AND THE SECURITY GROUP; Protecting Assets Under Altered Circumstances; Due Diligence</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Ambiguous SpecificationsEFFECT OF STRATEGY ON SECURITY MANAGEMENT; Anticipate; Exposures; Magnitude; Complexity; TECHNICAL KNOWLEDGE; Access; Quality; Teamwork; STRATEGY AND RISK; Predict; Quantify; IMPERATIVES; Improve on Quality; Forge Close Links with Customers; Establish Close Relationships with Suppliers; Make Effective Use of Technology; Operate with Minimum Layers of Management; Continuously Improve the Security Staff; STRATEGIC PLANNING; Policy and Planning; The CSO and Strategic Planning; Business Is Like War; No Absolutes in Strategic Planning; Strategy and Change; NOTES; 3. Leading</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">INTRODUCTIONBuild a Vision; Enlist Followers; LEADERSHIP DEFINITIONS VARY; Complex and Subtle; Manager Versus Leader; Peter Principle; COMPETENCIES; Gain Attention; Set a Goal; Communicate the Message; Cultivate Trust; Develop Oneself; EMPOWERMENT; Contributing; Sharing Accomplishments; Energizing and Motivating; Conflicting Values; Quantity Versus Quality; Love of Work; FOLLOWERS; Taking Directions; Telling the Truth; Providing Feedback; LEADERS ADD VALUE; COMPETITION AMONG LEADERS; Ambition; Loyalty; PRICE OF LEADERSHIP; LEADING IN THE TWENTY-FIRST CENTURY; Build and Manage</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Know the LandscapeExpect the Best; Do Not Micromanage; Be Accessible; Focus on What Is Important; Point the Way; CONCLUSIONS; NOTES; 4. Organizing; STAFFING; Justify the Position; Identify Relevant Skills and Knowledge; Search for Qualified Candidates; Compare Candidates Against Job Requirements; Identify the Apparent Best Candidate; Conduct a Background Inquiry; Test the Apparent Best Candidate; Offer the Job; The Independent Contractor; ORGANIZING ACTIVITIES; ESTABLISHING OBJECTIVES; Group Objectives; Individual Objectives; ORGANIZING CONSISTENT WITH POLICIES; Obtaining Resources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The People ResourceORGANIZING BEYOND BOUNDARIES; Assigning Tasks; Monitoring Performance; TERMINATING AN EMPLOYEE; Stunned Reaction; Psychological Trauma; Sorrow; Belligerence; Managing the Termination Interview; ORGANIZATIONAL STRUCTURES; Vertical Model; Network Model; Security Group Fit; NOTES; 5. Managing People; WORKING THROUGH PEOPLE; MASLOW'S THEORY; Physiological; Survival; Love; Self-esteem; Self-fulfillment; Curiosity; Key Tenets; Maslow in the Security Environment; PEOPLE DEVELOPMENT; Encourage; Expect Excellence; APPRAISING PERFORMANCE; Setting Targets; Target Qualities</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Contemporary Security Management serves as an indispensable working tool for students and security professionals at all levels of experience. It is designed to provide the hard facts on modern practices to efficiently and effectively run a security department and covers such vital topics as: leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence and emergency management. New topics covered include terrorism and the new government mandate to perform standard vulnerability.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Private security services.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh86004146</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Industries</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85065971</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Personnel management.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85100143</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Services privés de sécurité.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Industrie</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Personnel</subfield><subfield code="x">Direction.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Workplace Culture.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Corporate Governance.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Leadership.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Organizational Development.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Industries</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Personnel management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Private security services</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">dissertations.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026039</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Thèses et écrits académiques.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Contemporary security management (Work)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGWGjKr9TctX4p8Pfm73ry</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Fay, John, 1934-</subfield><subfield code="t">Contemporary security management.</subfield><subfield code="b">2nd ed.</subfield><subfield code="d">Amsterdam ; Boston : Elsevier/Butterworth-Heinemann, ©2006</subfield><subfield code="z">075067928X</subfield><subfield code="z">9780750679282</subfield><subfield code="w">(DLC) 2006274653</subfield><subfield code="w">(OCoLC)69672120</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196419</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196419</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10186007</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">196419</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">contemporarysecu0000fayj_u0h1</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2613212</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf |
genre_facet | dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
id | ZDB-4-EBA-ocn179603660 |
illustrated | Illustrated |
indexdate | 2025-03-18T14:14:21Z |
institution | BVB |
isbn | 9780080476827 0080476821 9780750679282 075067928X 1281052531 9781281052537 9786611052539 6611052534 |
language | English |
oclc_num | 179603660 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (xiv, 523 pages :) |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Elsevier/Butterworth-Heinemann, |
record_format | marc |
spelling | Fay, John, 1934- https://id.oclc.org/worldcat/entity/E39PCjBQv6wqfDM34x4KddtWQq http://id.loc.gov/authorities/names/n79087832 Contemporary security management / John J. Fay. 2nd ed. Amsterdam ; Boston : Elsevier/Butterworth-Heinemann, ©2006. 1 online resource (xiv, 523 pages :) text txt rdacontent computer c rdamedia online resource cr rdacarrier polychrome. rdacc http://rdaregistry.info/termList/RDAColourContent/1003 text file rdaft http://rdaregistry.info/termList/fileType/1002 Includes bibliographical references and index. Print version record. Cover; Title page; Copyright page; Table of contents; 1. Historical Roots; INTRODUCTION; INDUSTRIAL REVOLUTION; Fertile Ground; Growth of Factories; Mass Production; SCIENTIFIC MANAGEMENT; HUMAN RELATIONS; OPERATIONS RESEARCH; AGE OF TECHNOLOGY; BUSINESS TODAY; SECURITY INDUSTRY; English Roots; Law Enforcement and Security; Terrorism; Security Marketplace; Guard Services; Professionalism; Technology; The Future; NOTES; 2. Strategy; BUSINESS STRATEGY; CORE AND SUPPORT ACTIVITIES; OUTSOURCING; OUTSOURCING AND THE SECURITY GROUP; Protecting Assets Under Altered Circumstances; Due Diligence Ambiguous SpecificationsEFFECT OF STRATEGY ON SECURITY MANAGEMENT; Anticipate; Exposures; Magnitude; Complexity; TECHNICAL KNOWLEDGE; Access; Quality; Teamwork; STRATEGY AND RISK; Predict; Quantify; IMPERATIVES; Improve on Quality; Forge Close Links with Customers; Establish Close Relationships with Suppliers; Make Effective Use of Technology; Operate with Minimum Layers of Management; Continuously Improve the Security Staff; STRATEGIC PLANNING; Policy and Planning; The CSO and Strategic Planning; Business Is Like War; No Absolutes in Strategic Planning; Strategy and Change; NOTES; 3. Leading INTRODUCTIONBuild a Vision; Enlist Followers; LEADERSHIP DEFINITIONS VARY; Complex and Subtle; Manager Versus Leader; Peter Principle; COMPETENCIES; Gain Attention; Set a Goal; Communicate the Message; Cultivate Trust; Develop Oneself; EMPOWERMENT; Contributing; Sharing Accomplishments; Energizing and Motivating; Conflicting Values; Quantity Versus Quality; Love of Work; FOLLOWERS; Taking Directions; Telling the Truth; Providing Feedback; LEADERS ADD VALUE; COMPETITION AMONG LEADERS; Ambition; Loyalty; PRICE OF LEADERSHIP; LEADING IN THE TWENTY-FIRST CENTURY; Build and Manage Know the LandscapeExpect the Best; Do Not Micromanage; Be Accessible; Focus on What Is Important; Point the Way; CONCLUSIONS; NOTES; 4. Organizing; STAFFING; Justify the Position; Identify Relevant Skills and Knowledge; Search for Qualified Candidates; Compare Candidates Against Job Requirements; Identify the Apparent Best Candidate; Conduct a Background Inquiry; Test the Apparent Best Candidate; Offer the Job; The Independent Contractor; ORGANIZING ACTIVITIES; ESTABLISHING OBJECTIVES; Group Objectives; Individual Objectives; ORGANIZING CONSISTENT WITH POLICIES; Obtaining Resources The People ResourceORGANIZING BEYOND BOUNDARIES; Assigning Tasks; Monitoring Performance; TERMINATING AN EMPLOYEE; Stunned Reaction; Psychological Trauma; Sorrow; Belligerence; Managing the Termination Interview; ORGANIZATIONAL STRUCTURES; Vertical Model; Network Model; Security Group Fit; NOTES; 5. Managing People; WORKING THROUGH PEOPLE; MASLOW'S THEORY; Physiological; Survival; Love; Self-esteem; Self-fulfillment; Curiosity; Key Tenets; Maslow in the Security Environment; PEOPLE DEVELOPMENT; Encourage; Expect Excellence; APPRAISING PERFORMANCE; Setting Targets; Target Qualities Contemporary Security Management serves as an indispensable working tool for students and security professionals at all levels of experience. It is designed to provide the hard facts on modern practices to efficiently and effectively run a security department and covers such vital topics as: leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence and emergency management. New topics covered include terrorism and the new government mandate to perform standard vulnerability. English. Private security services. http://id.loc.gov/authorities/subjects/sh86004146 Industries Security measures. http://id.loc.gov/authorities/subjects/sh85065971 Personnel management. http://id.loc.gov/authorities/subjects/sh85100143 Services privés de sécurité. Industrie Sécurité Mesures. Personnel Direction. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Industries Security measures fast Personnel management fast Private security services fast dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf has work: Contemporary security management (Work) https://id.oclc.org/worldcat/entity/E39PCGWGjKr9TctX4p8Pfm73ry https://id.oclc.org/worldcat/ontology/hasWork Print version: Fay, John, 1934- Contemporary security management. 2nd ed. Amsterdam ; Boston : Elsevier/Butterworth-Heinemann, ©2006 075067928X 9780750679282 (DLC) 2006274653 (OCoLC)69672120 |
spellingShingle | Fay, John, 1934- Contemporary security management / Cover; Title page; Copyright page; Table of contents; 1. Historical Roots; INTRODUCTION; INDUSTRIAL REVOLUTION; Fertile Ground; Growth of Factories; Mass Production; SCIENTIFIC MANAGEMENT; HUMAN RELATIONS; OPERATIONS RESEARCH; AGE OF TECHNOLOGY; BUSINESS TODAY; SECURITY INDUSTRY; English Roots; Law Enforcement and Security; Terrorism; Security Marketplace; Guard Services; Professionalism; Technology; The Future; NOTES; 2. Strategy; BUSINESS STRATEGY; CORE AND SUPPORT ACTIVITIES; OUTSOURCING; OUTSOURCING AND THE SECURITY GROUP; Protecting Assets Under Altered Circumstances; Due Diligence Ambiguous SpecificationsEFFECT OF STRATEGY ON SECURITY MANAGEMENT; Anticipate; Exposures; Magnitude; Complexity; TECHNICAL KNOWLEDGE; Access; Quality; Teamwork; STRATEGY AND RISK; Predict; Quantify; IMPERATIVES; Improve on Quality; Forge Close Links with Customers; Establish Close Relationships with Suppliers; Make Effective Use of Technology; Operate with Minimum Layers of Management; Continuously Improve the Security Staff; STRATEGIC PLANNING; Policy and Planning; The CSO and Strategic Planning; Business Is Like War; No Absolutes in Strategic Planning; Strategy and Change; NOTES; 3. Leading INTRODUCTIONBuild a Vision; Enlist Followers; LEADERSHIP DEFINITIONS VARY; Complex and Subtle; Manager Versus Leader; Peter Principle; COMPETENCIES; Gain Attention; Set a Goal; Communicate the Message; Cultivate Trust; Develop Oneself; EMPOWERMENT; Contributing; Sharing Accomplishments; Energizing and Motivating; Conflicting Values; Quantity Versus Quality; Love of Work; FOLLOWERS; Taking Directions; Telling the Truth; Providing Feedback; LEADERS ADD VALUE; COMPETITION AMONG LEADERS; Ambition; Loyalty; PRICE OF LEADERSHIP; LEADING IN THE TWENTY-FIRST CENTURY; Build and Manage Know the LandscapeExpect the Best; Do Not Micromanage; Be Accessible; Focus on What Is Important; Point the Way; CONCLUSIONS; NOTES; 4. Organizing; STAFFING; Justify the Position; Identify Relevant Skills and Knowledge; Search for Qualified Candidates; Compare Candidates Against Job Requirements; Identify the Apparent Best Candidate; Conduct a Background Inquiry; Test the Apparent Best Candidate; Offer the Job; The Independent Contractor; ORGANIZING ACTIVITIES; ESTABLISHING OBJECTIVES; Group Objectives; Individual Objectives; ORGANIZING CONSISTENT WITH POLICIES; Obtaining Resources The People ResourceORGANIZING BEYOND BOUNDARIES; Assigning Tasks; Monitoring Performance; TERMINATING AN EMPLOYEE; Stunned Reaction; Psychological Trauma; Sorrow; Belligerence; Managing the Termination Interview; ORGANIZATIONAL STRUCTURES; Vertical Model; Network Model; Security Group Fit; NOTES; 5. Managing People; WORKING THROUGH PEOPLE; MASLOW'S THEORY; Physiological; Survival; Love; Self-esteem; Self-fulfillment; Curiosity; Key Tenets; Maslow in the Security Environment; PEOPLE DEVELOPMENT; Encourage; Expect Excellence; APPRAISING PERFORMANCE; Setting Targets; Target Qualities Private security services. http://id.loc.gov/authorities/subjects/sh86004146 Industries Security measures. http://id.loc.gov/authorities/subjects/sh85065971 Personnel management. http://id.loc.gov/authorities/subjects/sh85100143 Services privés de sécurité. Industrie Sécurité Mesures. Personnel Direction. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Industries Security measures fast Personnel management fast Private security services fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh86004146 http://id.loc.gov/authorities/subjects/sh85065971 http://id.loc.gov/authorities/subjects/sh85100143 http://id.loc.gov/authorities/genreForms/gf2014026039 |
title | Contemporary security management / |
title_auth | Contemporary security management / |
title_exact_search | Contemporary security management / |
title_full | Contemporary security management / John J. Fay. |
title_fullStr | Contemporary security management / John J. Fay. |
title_full_unstemmed | Contemporary security management / John J. Fay. |
title_short | Contemporary security management / |
title_sort | contemporary security management |
topic | Private security services. http://id.loc.gov/authorities/subjects/sh86004146 Industries Security measures. http://id.loc.gov/authorities/subjects/sh85065971 Personnel management. http://id.loc.gov/authorities/subjects/sh85100143 Services privés de sécurité. Industrie Sécurité Mesures. Personnel Direction. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Industries Security measures fast Personnel management fast Private security services fast |
topic_facet | Private security services. Industries Security measures. Personnel management. Services privés de sécurité. Industrie Sécurité Mesures. Personnel Direction. BUSINESS & ECONOMICS Workplace Culture. BUSINESS & ECONOMICS Corporate Governance. BUSINESS & ECONOMICS Leadership. BUSINESS & ECONOMICS Organizational Development. Industries Security measures Personnel management Private security services dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
work_keys_str_mv | AT fayjohn contemporarysecuritymanagement |