Private Security An Introduction to Principles and Practice
There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry. Private Security: An Introduction to Principles and Practice takes a new approach to the subject of private sector security that will be welc...
Saved in:
Main Author | |
---|---|
Format | eBook Book |
Language | English |
Published |
Boca Raton
CRC Press
2018
Taylor and Francis Taylor & Francis Group |
Edition | 1 |
Subjects | |
Online Access | Get full text |
ISBN | 9781498723343 1498723349 1032096179 9781032096179 |
DOI | 10.4324/9781315157191 |
Cover
Loading…
Abstract | There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry. Private Security: An Introduction to Principles and Practice takes a new approach to the subject of private sector security that will be welcome addition to the field.
The book focuses on the recent history of the industry and the growing dynamic between private sector security and public safety and law enforcement. Coverage will include history and security theory, but emphasis is on current practice, reflecting the technology-driven, fast-paced, global security environment. Such topics covered include a history of the security industry, security law, risk management, physical security, Human Resources and personnel, investigations, institutional and industry-specific security, crisis and emergency planning, critical infrastructure protection, IT and computer security, and more.
Rather than being reduced to single chapter coverage, homeland security and terrorism concepts are referenced throughout the book, as appropriate. Currently, it vital that private security entities work with public sector authorities seamlessly—at the state and federal levels—to share information and understand emerging risks and threats. This modern era of security requires an ongoing, holistic focus on the impact and implications of global terror incidents; as such, the book’s coverage of topics consciously takes this approach throughout.
Highlights include:
Details the myriad changes in security principles, and the practice of private security, particularly since 9/11
Focuses on both foundational theory but also examines current best practices—providing sample forms, documents, job descriptions, and functions—that security professionals must understand to perform and succeed
Outlines the distinct, but growing, roles of private sector security companies versus the expansion of federal and state law enforcement security responsibilities
Includes key terms, learning objectives, end of chapter questions, Web exercises, and numerous references—throughout the book—to enhance student learning
Presents the full range of career options available for those looking entering the field of private security
Includes nearly 400 full-color figures, illustrations, and photographs.
Private Security: An Introduction to Principles and Practice provides the most comprehensive, up-to-date coverage of modern security issues and practices on the market. Professors will appreciate the new, fresh approach, while students get the most "bang for their buck," insofar as the real-world knowledge and tools needed to tackle their career in the ever-growing field of private industry security.
An instructor’s manual with Exam questions, lesson plans, and chapter PowerPoint® slides are available upon qualified course adoption.
1. Security Origins and Development
2. Concept, Context, and Definition: Security
3. Private Security, Public Policing, and Occupational Roles
4. Private Security Industry, Organizational Structure, and Definition
5. Private Security and the Law
6. Risk Management
7. Physical Security
8. Security: Human Resources and Personnel
9. Investigations and Investigative Reporting for the Security Professional
10. Crisis Planning and Prevention from Accidents, Emergencies & Disasters
11. Critical Infrastructure Security
12. Private Security and Art and Cultural, Educational, Religious and Medical Institutions
13. Private Security: Hospitality, Gaming, Event, and Mall Property
14. Information, IT, and Computer Security
15. The Future of the Private Security Industry: A Philosophical Outlook
Appendix A. Alabama State Security Company License Application
Appendix B. Workplace Emergency Action Plan
Appendix C. Campus/Building Emergency Action Plan
Appendix D. Hotel Security and Safety Assessment Form University Campus
Appendix E. Excerpt from Burdeau v. McDowell
Appendix F. Physical Security Survey Checklist
"This weighty book merits its size. The author describes and analyzes the full scope of activities associated with private security. It is an encyclopedic work that effectively covers the often complex and broad scope of private security … a rich exposition of the field that will be valuable to students and faculty and enrich the library of the practitioner." —Security Management, November 2018
Charles P. Nemeth is a recognized expert in homeland security and a leader in the private security industry, private sector justice, and homeland security education. He is currently Chair of the Department of Security, Fire, and Emergency Management at John Jay College in New York City, USA. |
---|---|
AbstractList | There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry. Private Security: An Introduction to Principles and Practice takes a new approach to the subject of private sector security that will be welcome addition to the field.
The book focuses on the recent history of the industry and the growing dynamic between private sector security and public safety and law enforcement. Coverage will include history and security theory, but emphasis is on current practice, reflecting the technology-driven, fast-paced, global security environment. Such topics covered include a history of the security industry, security law, risk management, physical security, Human Resources and personnel, investigations, institutional and industry-specific security, crisis and emergency planning, critical infrastructure protection, IT and computer security, and more.
Rather than being reduced to single chapter coverage, homeland security and terrorism concepts are referenced throughout the book, as appropriate. Currently, it vital that private security entities work with public sector authorities seamlessly—at the state and federal levels—to share information and understand emerging risks and threats. This modern era of security requires an ongoing, holistic focus on the impact and implications of global terror incidents; as such, the book’s coverage of topics consciously takes this approach throughout.
Highlights include:
Details the myriad changes in security principles, and the practice of private security, particularly since 9/11
Focuses on both foundational theory but also examines current best practices—providing sample forms, documents, job descriptions, and functions—that security professionals must understand to perform and succeed
Outlines the distinct, but growing, roles of private sector security companies versus the expansion of federal and state law enforcement security responsibilities
Includes key terms, learning objectives, end of chapter questions, Web exercises, and numerous references—throughout the book—to enhance student learning
Presents the full range of career options available for those looking entering the field of private security
Includes nearly 400 full-color figures, illustrations, and photographs.
Private Security: An Introduction to Principles and Practice provides the most comprehensive, up-to-date coverage of modern security issues and practices on the market. Professors will appreciate the new, fresh approach, while students get the most "bang for their buck," insofar as the real-world knowledge and tools needed to tackle their career in the ever-growing field of private industry security.
An instructor’s manual with Exam questions, lesson plans, and chapter PowerPoint® slides are available upon qualified course adoption.
1. Security Origins and Development
2. Concept, Context, and Definition: Security
3. Private Security, Public Policing, and Occupational Roles
4. Private Security Industry, Organizational Structure, and Definition
5. Private Security and the Law
6. Risk Management
7. Physical Security
8. Security: Human Resources and Personnel
9. Investigations and Investigative Reporting for the Security Professional
10. Crisis Planning and Prevention from Accidents, Emergencies & Disasters
11. Critical Infrastructure Security
12. Private Security and Art and Cultural, Educational, Religious and Medical Institutions
13. Private Security: Hospitality, Gaming, Event, and Mall Property
14. Information, IT, and Computer Security
15. The Future of the Private Security Industry: A Philosophical Outlook
Appendix A. Alabama State Security Company License Application
Appendix B. Workplace Emergency Action Plan
Appendix C. Campus/Building Emergency Action Plan
Appendix D. Hotel Security and Safety Assessment Form University Campus
Appendix E. Excerpt from Burdeau v. McDowell
Appendix F. Physical Security Survey Checklist
"This weighty book merits its size. The author describes and analyzes the full scope of activities associated with private security. It is an encyclopedic work that effectively covers the often complex and broad scope of private security … a rich exposition of the field that will be valuable to students and faculty and enrich the library of the practitioner." —Security Management, November 2018
Charles P. Nemeth is a recognized expert in homeland security and a leader in the private security industry, private sector justice, and homeland security education. He is currently Chair of the Department of Security, Fire, and Emergency Management at John Jay College in New York City, USA. There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry. Private Security: An Introduction to Principles and Practice takes a new approach to the subject of private sector security that will be welcome addition to the field. The book focuses on the recent history of the industry and the growing dynamic between private sector security and public safety and law enforcement. Coverage will include history and security theory, but emphasis is on current practice, reflecting the technology-driven, fast-paced, global security environment. Such topics covered include a history of the security industry, security law, risk management, physical security, Human Resources and personnel, investigations, institutional and industry-specific security, crisis and emergency planning, critical infrastructure protection, IT and computer security, and more.Rather than being reduced to single chapter coverage, homeland security and terrorism concepts are referenced throughout the book, as appropriate. Currently, it vital that private security entities work with public sector authorities seamlessly-at the state and federal levels-to share information and understand emerging risks and threats. This modern era of security requires an ongoing, holistic focus on the impact and implications of global terror incidents; as such, the book's coverage of topics consciously takes this approach throughout. Highlights include: Details the myriad changes in security principles, and the practice of private security, particularly since 9/11Focuses on both foundational theory but also examines current best practices-providing sample forms, documents, job descriptions, and functions-that security professionals must understand to perform and succeedOutlines the distinct, but growing, roles of private sector security companies versus the expansion of federal and state law enforcement security responsibilitiesIncludes key terms, learning objectives, end of chapter questions, Web exercises, and numerous references-throughout the book-to enhance student learningPresents the full range of career options available for those looking entering the field of private securityIncludes nearly 400 full-color figures, illustrations, and photographs. Private Security: An Introduction to Principles and Practice provides the most comprehensive, up-to-date coverage of modern security issues and practices on the market. Professors will appreciate the new, fresh approach, while students get the most "bang for their buck," insofar as the real-world knowledge and tools needed to tackle their career in the ever-growing field of private industry security.An instructor's manual with Exam questions, lesson plans, and chapter PowerPoint® slides are available upon qualified course adoption. Introduces students to the private security industry by looking at modern best practices. It covers history in order to orient the reader but emphasizes recent trends and the dynamics between private sector security, public safety, and law enforcement. It brings a fresh new approach by covering all relevant elements of living in a fast-paced technology-based global security environment, including foundational security concepts as well as the latest trends and emerging threats and challenges to the industry. |
Author | Nemeth, Charles P. |
Author_xml | – sequence: 1 givenname: Charles P. surname: Nemeth fullname: Nemeth, Charles P. |
BackLink | https://cir.nii.ac.jp/crid/1130000795992635136$$DView record in CiNii |
BookMark | eNqNkctLw0AQxld8oK0FL949COKhOvvKZo5a6gMKCorXZbPZYGzM6m7a0v_e1IjaWy8zfPD7hpn5emSn9rUj5JjCheBMXKJKKaeSSkWRbpHBmt7utMBUMc4F3yM9CiAQU8bFPhnE-AYANFXAuDogR4-hnJvGnTw5Owtlszwku4Wpohv89D55uRk_j-6Gk4fb-9HVZGgoJAyGKLK8sM5l1uROOusYIAJaAGNAFlJYYxFRAubAi1xRnmWZsGlinHEr2Sfn3WATp24RX33VRD2vXOb9NOp_NyRqc1ZCy5517EfwnzMXG_2NWVc3wVR6fD2SIBOBrCVPO7IuS23LVaWUt98BhRKRJVxSnrSY6LCyLnx4Nwsfqlw3Zln5UART2zL-7fGbQ2sbb2ajoFexrtv13IVY-prxL9y-kOs |
ContentType | eBook Book |
Copyright | 2018 by Taylor & Francis Group, LLC |
Copyright_xml | – notice: 2018 by Taylor & Francis Group, LLC |
DBID | RYH |
DEWEY | 363.28/9 |
DOI | 10.4324/9781315157191 |
DatabaseName | CiNii Complete |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Social Welfare & Social Work |
EISBN | 9781315157191 1315157195 9781498723350 1498723357 1498723365 9781498723367 |
Edition | 1 1st |
ExternalDocumentID | 9781498723367 9781498723350 EBC5056492 BB25362443 9781315157191 10_4324_9781315157191_version2 |
GroupedDBID | 20A 5~G AABBV ABEQL AFWCW AIX ALMA_UNASSIGNED_HOLDINGS AZZ BBABE CZZ JG1 JJU JTX MYL RYH AXTGW |
ID | FETCH-LOGICAL-a10620-94bdfceebcade5ece209909c00aa05f54cac999509d03fd713bbb4c86aeaed713 |
ISBN | 9781498723343 1498723349 1032096179 9781032096179 |
IngestDate | Thu Dec 12 06:31:20 EST 2024 Fri Nov 08 05:50:08 EST 2024 Fri May 30 23:12:34 EDT 2025 Thu Jun 26 22:26:46 EDT 2025 Mon Apr 21 07:54:29 EDT 2025 Mon Apr 14 05:49:25 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Keywords | School Resource Officers Epsilon Toxin Public Law Enforcement Public Policing Executive Protection Private Security Operatives Public Mentality Web Exercise Security Industry IoT Device Career Profile Private Security Industry Domestic Nuclear Detection ASIS International Private Security Officer Top Secret Private Sector Justice Contract Service Model USA Patriot Act Private Security NIST Cybersecurity Framework Contract Security Firm Real Id De Veil Private Security Personnel |
LCCallNum_Ident | HV8290.N464 2018 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-a10620-94bdfceebcade5ece209909c00aa05f54cac999509d03fd713bbb4c86aeaed713 |
Notes | Includes index |
OCLC | 1004998234 |
PQID | EBC5056492 |
PageCount | 796 816 20 |
ParticipantIDs | askewsholts_vlebooks_9781498723367 askewsholts_vlebooks_9781498723350 proquest_ebookcentral_EBC5056492 nii_cinii_1130000795992635136 informaworld_taylorfrancisbooks_9781315157191 informaworld_taylorfrancisbooks_10_4324_9781315157191_version2 |
PublicationCentury | 2000 |
PublicationDate | 2018 20170922 c2018 2017 2017-12-01 2017-09-22 |
PublicationDateYYYYMMDD | 2018-01-01 2017-09-22 2017-01-01 2017-12-01 |
PublicationDate_xml | – year: 2018 text: 2018 |
PublicationDecade | 2010 |
PublicationPlace | Boca Raton |
PublicationPlace_xml | – name: Boca Raton |
PublicationYear | 2018 2017 |
Publisher | CRC Press Taylor and Francis Taylor & Francis Group |
Publisher_xml | – sequence: 0 name: CRC Press – name: CRC Press – name: Taylor and Francis – name: Taylor & Francis Group |
SSID | ssj0001870237 ssib034312702 ssib047120334 ssib045682529 |
Score | 2.059596 |
Snippet | There are few textbooks available that outline the foundation of security principles while reflecting the modern practices of private security as an industry.... Introduces students to the private security industry by looking at modern best practices. It covers history in order to orient the reader but emphasizes recent... |
SourceID | askewsholts proquest nii informaworld |
SourceType | Aggregation Database Publisher |
SubjectTerms | cctv Crime Prevention FORENSICnetBASE HOMELANDSECURITYnetBASE investigation Investigations LawENFORCEMENTnetBASE physical security Private security services SCI-TECHnetBASE security industry STMnetBASE Terrorism |
Subtitle | An Introduction to Principles and Practice |
TableOfContents | 4. Private security industry, organizational structure, and definition -- 4.1 Introduction -- 4.2 Individualized services in private security -- 4.3 Contract security services -- 4.4 Proprietary security services -- 4.5 Corporate security services and settings -- 4.5.1 Structure and hierarchy in the corporate security office -- 4.5.2 Professional role and duties of the CSO -- 4.6 Conclusion -- Keywords -- Discussion questions -- 5. Private security and the law -- 5.1 Introduction: Industry growth and the legal implications -- 5.2 Civil liability and the private security industry -- 5.2.1 Intentional torts -- 5.2.2 Negligence -- 5.2.2.1 Nature of duty -- 5.2.2.2 Duty and foreseeability -- 5.2.3 Negligence, personnel, and the security manager/director -- 5.2.3.1 Negligent retention -- 5.2.3.2 Negligent assignment and entrustment -- 5.2.3.3 Negligent supervision -- 5.2.3.4 Negligent training -- 5.2.4 Strict liability torts -- 5.2.4.1 Negligence and vicarious liability -- 5.3 Criminal liability and the private security industry -- 5.3.1 Criminal liability under the federal civil rights acts -- 5.3.2 Criminal liability and the regulatory process -- 5.3.3 Criminal acts: Felonies and misdemeanors by security professionals -- 5.3.3.1 Assault -- 5.3.3.2 Arson -- 5.3.3.3 Burglary -- 5.3.3.4 Robbery -- 5.3.3.5 Theft or larceny -- 5.3.3.6 Theft by deception/false pretenses -- 5.3.3.7 Theft by extortion -- 5.3.3.8 Theft of property lost, mislaid, or delivered by mistake -- 5.3.3.9 Receiving stolen property -- 5.3.3.10 Theft of services -- 5.3.3.11 Retail theft -- 5.3.3.12 Related property offenses: Fraudulent behavior -- 5.3.3.13 Forgery -- 5.3.3.14 Simulating objects of antiquity or rarity -- 5.3.3.15 Fraudulent destruction, removal, or concealment of recordable instruments or their tampering -- 5.3.3.16 Bad check and credit card violations 5.3.4 Defenses to criminal acts: Protection of self, third parties, and property -- 5.3.4.1 Personal self-defense and the proportionate use of force -- 5.3.4.2 Protection of other persons -- 5.3.4.3 Defense of property -- 5.4 Legal challenges to private security safe harbor -- 5.4.1 Platinum platter doctrine -- 5.4.2 Private action as state action -- 5.4.3 Public function of private security -- 5.4.4 Color of state law: A legislative remedy -- 5.4.5 Private security and Miranda warnings -- 5.4.6 The law of citizen's arrest: The private security standard -- 5.4.6.1 Time of the arrest -- 5.4.6.2 Presence and commission -- 5.5 Conclusion -- Keywords -- Discussion questions -- 6. Risk management -- 6.1 Introduction -- 6.2 Risk management -- 6.2.1 Nature of risk -- 6.2.2 Risk assessment -- 6.3 Various risk assessment tools -- 6.3.1 CARVER + Shock assessment tool -- 6.3.2 Threat assessment -- 6.3.2.1 Preincident indicators: A tool for threat assessment -- 6.4 Threats and hazards -- 6.4.1 Evolutionary concept of threat and hazard -- 6.4.2 Weapons of mass destruction -- 6.4.2.1 Nuclear -- 6.4.2.2 Radiological -- 6.4.2.3 Biological -- 6.4.2.4 Chemical -- 6.4.2.5 Improvised explosive devices -- 6.5 Computer security and risks to the information infrastructure -- 6.6 Conclusion -- Keywords -- Discussion questions -- 7. Physical security -- 7.1 Introduction: The physical nature of security -- 7.2 Physical security: Exterior applications -- 7.2.1 Perimeter security measures -- 7.2.2 Perimeter design and planning -- 7.2.2.1 Bollards -- 7.2.2.2 Fencing -- 7.3 Physical security: Interior applications -- 7.3.1 Doors -- 7.3.2 Access control -- 7.3.2.1 Keys -- 7.3.2.2 Keypad entry -- 7.3.2.3 Access control by alternative keyless systems -- 7.3.2.4 Access control by sensor detection -- 7.4 Video surveillance -- 7.4.1 What are the steps of surveillance? 9.3 Private police investigative practice as compared to public police Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface: Introduction to Security -- Acknowledgments -- About the Author -- 1. Security origins and development -- 1.1 Introduction -- 1.2 Security from ancient times -- 1.3 Private security in England -- 1.3.1 Middle ages -- 1.3.2 Eighteenth-century England and the rise of formal policing -- 1.3.3 Nineteenth-century England and the Peelian revolution -- 1.4 Private security in the United States -- 1.4.1 Railroads, commerce, and the railroad police -- 1.4.2 Industrialization, the labor movement, and Pinkertons -- 1.4.3 Private security and the expansion of the American West -- 1.4.4 Private security and World War II -- 1.5 The contemporary state of private security -- 1.6 Classifications and functions of the private security industry -- 1.6.1 Unarmed officers -- 1.6.2 Alarm companies -- 1.6.3 Private investigators -- 1.6.4 Campus law enforcement and educational institutions -- 1.6.5 Retail/industrial -- 1.7 Ethical issues endemic to the security industry -- 1.8 Conclusion -- Keywords -- Discussion questions -- 2. Concept, context, and definition: Security -- 2.1 Security in concept and definition -- 2.2 Security, terror, and homeland defense -- 2.3 Security: The balance of rightful demonstration and threat -- 2.3.1 Security: The challenge of domestic terrorism-Pre-9/11 -- 2.3.2 Security: The challenge of international terrorism-Pre-9/11 -- 2.4 Security: The challenge of 9/11 and homeland defense -- 2.5 Formalizing security in the homeland: Law, legislation, and executive decree -- 2.5.1 Executive Order 13228: The origin of DHS -- 2.5.2 Executive Order 12231: Protection of infrastructure -- 2.5.3 Executive Order 13493 of January 22, 2009 -- 2.5.4 Executive Order 13567 of March 7, 2011 2.5.5 Executive Order 13691 of February 13, 2015: Promoting private sector cybersecurity information sharing -- 2.5.6 Homeland Security Act of 2002 -- 2.5.6.1 The Homeland Security Act and Posse Comitatus -- 2.5.7 USA Patriot Act -- 2.5.8 Specialized laws -- 2.5.8.1 The REAL ID program -- 2.5.8.2 Office of Biometric Identity Management -- 2.5.8.3 Chemical facilities -- 2.5.8.4 The SAFETY Act -- 2.6 Academic and training programs in homeland security -- 2.6.1 Office of Grants and Training -- 2.6.2 Center for Domestic Preparedness -- 2.6.3 Emergency Management Institute -- 2.6.4 The academic discipline of security management, security studies, and homeland security -- 2.7 The private sector and homeland security -- 2.8 Conclusion -- Keywords -- Discussion questions -- 3. Private security, public policing, and occupational roles -- 3.1 Introduction -- 3.2 Private versus public policing: A comparative analysis -- 3.3 Defining private security by career role and occupations -- 3.3.1 Guard companies/security agency and security firm -- 3.3.2 Guards and private patrol officers -- 3.3.3 Private investigators and detectives -- 3.3.4 Alarm services: Business and residential -- 3.3.5 Armed couriers -- 3.3.6 Loss prevention specialist -- 3.3.7 College/university and school security -- 3.3.8 Federal law enforcement and security -- 3.3.9 Moonlighting and merger: The public/private connection -- 3.4 Security education, training, certification, and regulations -- 3.4.1 Education and training standards -- 3.4.1.1 Minimum training standards for armed security officers -- 3.4.2 Licensing, regulatory, and hiring standards -- 3.4.2.1 Unarmed security officer training requirements -- 3.4.2.2 Armed security officer training requirements -- 3.4.3 Educational certifications and the private security industry -- 3.5 Conclusion -- Keywords -- Discussion questions 7.4.2 What is the exact objective of surveillance? -- 7.4.3 Where is the location of surveillance? -- 7.4.4 When will surveillance occur? -- 7.4.5 Who or what will be surveilled? -- 7.4.6 Surveillance equipment -- 7.4.6.1 CCTV equipment -- 7.4.6.2 Photographic/video equipment -- 7.5 Physical security and CPTED -- 7.6 Conclusion -- Keywords -- Discussion questions -- 8. Security: Human resources and personnel -- 8.1 Private security industry: Protection of people -- 8.2 Preemployment screening and background checks -- 8.2.1 General recommendations on background and employment investigations -- 8.2.2 Background issues -- 8.2.2.1 Establishing identity -- 8.2.2.2 Employment history -- 8.2.2.3 Credit history -- 8.2.3 Additional methods of background investigation -- 8.2.3.1 References for character, competency, and reputation -- 8.2.3.2 Testing and consultative services -- 8.2.3.3 Polygraph and lie detector technology -- 8.3 Executive protection -- 8.4 Special security problems in the workplace environment -- 8.4.1 Harassment in its various forms -- 8.4.2 Stalking -- 8.4.3 Protection from abuse/domestic/spousal abuse -- 8.4.4 Hate crimes and the workplace -- 8.4.5 Terroristic threats -- 8.4.6 Assault: From simple to aggravated -- 8.4.6.1 Assault -- 8.4.6.2 Simple assault -- 8.4.6.3 Aggravated assault -- 8.4.6.4 Mayhem -- 8.5 Active shooter programs for the private security industry -- 8.6 Conclusion -- Keywords -- Discussion questions -- 9. Investigations and investigative reporting for the security professional -- 9.1 Introduction -- 9.2 Essential investigative characteristics for the security professional -- 9.2.1 Objectivity and investigative practice -- 9.2.2 Logic and investigative practice -- 9.2.3 Perseverance, diligence, and investigative practice -- 9.2.4 Human relations skills and investigative practice |
Title | Private Security |
URI | https://www.taylorfrancis.com/books/9781315157191 https://www.taylorfrancis.com/books/9781498723367 https://cir.nii.ac.jp/crid/1130000795992635136 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5056492 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781498723350&uid=none https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781498723367 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Na9wwEBXN9tKckn5Qp0kRofQSnNqW_KEcCl2TEAotoaTd3IwkS7AkeMvayaG_vjOWHXvdQtpcxFrrlRY9W3oz0psh5B1TYMniJmuUlZHPI176MjXa50xrJlgYmQTFyV--Juff-eer-GrIUNWqSxp1rH_9VVfyGFShDnBFlex_IHvfKFTAZ8AXSkAYygn5vb904F6sMSmZOaq77HOtYS_x0GLjIrgiqMAqf_au9LoLCOAkUYMHGBNIj3bdjy6Ox26AMJu4AfJv-cahDWcfgvmTpRFjLhLSdLbEYHzugETIkNekoUucNQlAPZ9HMSxznLMtspWmMHU8_XS2yBeDKwve-YilrWyu60_00bT6_l14U-zxw0Z_22Rb1tcwn8Nc39STeLGw3lfL5R-rZLv0X-6QGcpBdskTUz0n-07NTBfmxsq1oe9pX7FaX78gPS60x4WeUFnRMSq0WdEBFfi2pD0qL8mPs9PL_Nzv8lP4EgxpMLsFV6UFlqFQyhAbbVCHHAgdBFIGsY25lhoIOHCyMmC2TEOmlOI6S6SRBi9fkVm1qsxrQhmTwioD9mtqObBSaYFLZ1LJ0kp45K1HDkfjVNzdtHvpdTEa5Dj4h5uS1CMfx2NcNK1nyLo0Lu5-MAwRqWIDqeLOOXAjj_gPNbDxQ48cAIqFXmIZ4vYp8FIRC4FxkEKWeIT2-BbtH-6OJRen8xz5ORfR3gNNvCHPhndin8ya9a05ALLYqLfdw_obUzlgXA |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Private+security+%3A+an+introduction+to+principles+and+practice&rft.au=Nemeth%2C+Charles+P.&rft.date=2018-01-01&rft.pub=CRC+Press&rft.isbn=9781498723343&rft_id=info:doi/10.4324%2F9781315157191&rft.externalDocID=BB25362443 |
thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97814987%2F9781498723350.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97814987%2F9781498723367.jpg |