Security ConsultingButterworth-Heinemann, 31/12/2012 - 264 páginas Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, at no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption -- which could bring any business to it's knees -- has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in-depth security surveys so businesses will know exactly where security holes are present and where they need improvement to limit their exposure to various threats. The fourth edition of Security Consulting introduces security and law enforcement professionals to the career and business of security consulting. It provides new and potential consultants with the practical guidelines needed to start up and maintain a successful independent practice. Updated and expanded information is included on marketing, fees and expenses, forensic consulting, the use of computers, and the need for professional growth. Useful sample forms have been updated in addition to new promotion opportunities and keys to conducting research on the Web.
|
Índice
1 | |
9 | |
17 | |
23 | |
31 | |
43 | |
51 | |
8 The Proposal and Contract | 73 |
16 The Need for Professional Growth | 183 |
17 Ethics in Consulting | 193 |
A Consulting Contract | 201 |
B Professional Services Agreement | 205 |
C Confidential Information Agreement | 209 |
D Security Survey Work Sheets | 211 |
Detaining Shoplifting Suspects | 225 |
Forensic Methodology | 231 |
9 The Survey | 93 |
10 The Consultants Report | 103 |
11 Fees and Expenses | 115 |
12 Technical Security Consulting | 127 |
13 Information Security Consulting | 145 |
14 Forensic Consulting | 157 |
15 Liability and Insurance Considerations | 175 |
Use of Force by Security Personnel | 237 |
H A Timeless Message | 241 |
I Outline of the IAPSCs Successful Security Consulting Program | 243 |
Bibliography | 249 |
Index
| 250 |
Outras edições - Ver tudo
Palavras e frases frequentes
2013 Elsevier Inc agreement areas assets Association of Professional attorney best practices blog Building information modeling certification certified management consultant certified protection professional Cleveland company’s conduct consultant’s consulting assignment contract contractor cost devices documents e-mail employees example executive expenses expert witness Facebook facility Figure Forensic Consultant hospital IAPSC identify installation intentionally left blank Intruders invoice liability LinkedIn located loss prevention management consultant marketing ofthe one’s operations organization organization’s owner parking lots perform perimeter personal computer physical security professional PRISM Security pro bono problems procedures Professional Security Consultants proposal prospective client recommendations retained rights reserved risk scope security industry security management security officers security personnel Security persons security program security survey Sennewald shoplifting social networking specific suspect threat tion typically vulnerabilities