ebook img

Security Management 1992: Vol 36 Index PDF

13 Pages·1992·4.5 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security Management 1992: Vol 36 Index

A SUPPLEMENT TO THE DECEMBER 1992 SECURITY MANAGEMENT SecurityManagement. 1992 INDEX ARTICLES IN THE FOLLOWING INDEX TO SECURITY MANAGE- Each current issue: $4.50 ment were published from January 1992 to December 1992. Postage and handling for each order: Copies of individual articles may be obtained by writing 1-3 issues: $5.00 within the US; $10.00 international University Microfilms International, 300 North Zeeb Road, More than 3 issues: $10.00 within the US; $20.00 Dept. PR, Ann Arbor, MI 48106; or by calling 313/761- international 4700 or 800-732-0616. Send checks to the Accounting Department, American Articles may also be obtained from ASIS by purchasing Society for Industrial Security, 1655 North Fort Myer Drive, the full issue in which an article appears. If an issue is out Suite 1200, Arlington, VA 22209. of print, individual article copies can still be purchased from Some Security Management articles are also available in University Microfilms International. reprint series on specific topics. A catalog, also available To purchase any back issue from ASIS, the following from ASIS, describes the reprint series as well as other costs must be prepaid: publications available from the Society. ASIS Access Control ASIS News: A Look at ’93 Keep your fingers to yourself (Spotlight) 92D 10 1993 President Addresses the Membership Reserve Space for Parking Lot Security 92N 5 0 ASIS in Action The Right Look Can Open Doors ................ 920 83 ASIS in Action Physical Education for Campus Security 92O 86 SCANning Words for True Confessions ........... 92 AG 104 The Latest Badge of Courage The Quest for the Universal Exam (Integrating photoimaging and ASIS in Action access control systems) 92 AG 39 ASIS in Action On the Road with IDs ASIS in Action (FMC Wyoming Corporation, ASIS Speaks Out on Electronic Monitoring Green River, WY) ASIS in Action Securing the World’s Seaports ASIS in Action Tracking the Trucking Industry ASIS in Action Eyes that open doors (Spotlight) Rawle Steers ASIS into 1992 The New Image of Corporate Badging ASIS in Action Locking Up Open Systems (Security for open computers) ASIS Annual Seminar Defining the Mission (Information security) 1993 President Addresses the Membership Designing in a New Dimension Fiesta of Fun and Knowledge in San Antonio (Designing a computerized A Guide to the 1992 ASIS Exhibits ............... access control system) 92 JA 26 Preliminary Program Using Smart Cards—A Smart Move 92 JA 32 ASIS in Action Getting the Most Out of Your System 92 JA 37 ASIS in Action Alarm Industry ASIS Foundation Bill puts bells on hold (Spotlight) 92JL 11 Foundation Announces 1992 Research Awards Alarm industry alerts Capitol Hill (Spotlight) 92 JE 12 ASIS in Action The John Manning Fund: Alarm Systems A Model for ASIS Chapters 92 JE 92 Nuisance annihilation (Spotlight) ASIS in Action 92 JE 92 On the Line with Data Transmission ASIS in Action 92 MY 98 Reserve Space for Parking Lot Security Technology Meets the Alarm Industry ASISNET Silencing False Alarms Security Online 92S 163 Hot Contract Tips for Fire, Security Systems Security Online 92 JA 67 The Good, the Bad, and the Future Academic Programs in Security (Integration of security systems) 92 AG 35 Training Tomorrow’s Security Specialist Cashing in on CCTV Technology DECEMBER 1992 SECURITY MANAGEMENT Americans with Disabilities Act Budgets The Perils of Preemployment Screening A Painless Approach to Construction Cost CPP Program Complies with ADA Estimating 92N 18A ADA: The Time for Compliance is Now A Model for Security’s Bottom Line 92S 76 Will ADA Handicap Security? Building Security Amusements and Recreation A Compromising Situation 92N6A Thrill Seekers Find Their Quarry The Violent Crime Gender Gap 920 56 (Fiesta Texas, San Antonio, TX) Crime Prevention Through Environmental Design Making the Cinema Safe at Showtime 92 AG 43 (Book Review) 92 JE 23 Will ADA Handicap Security? 92 MR 37 Architecture/Design A Compromising Situation Burglary What You Say Is What You Get Nuisance annihilation (Spotlight) 92N 11 (Defining security requirements) 92N12A Campus Security A Painless Approach to Construction Physical Education for Campus Security 92 O 86 Cost Estimating 92N 18A A Homecoming to Remember 92S 102 The Big Deal with Barriers 92N27A Big Plan on Campus 92 MR 26 Righting the Wrongs in Retail Security 92 N 33A Universal Security at the University 92 MR 32 Building Blocks for Child Care Security (John Hancock Mutual Life Insurance Company, Careers Boston, MA) Training Tomorrow’s Security Specialist 92D49 Silencing False Alarms Expose Yourself for Career Success .............. 92S 80 A Gallery of Security (Storing and preserving What Do The 90s Hold for Women in Security? valuable archival material) 92S 126 (Viewpoint) 92 AP 108 Crime Prevention Through Environmental Design Cargo Security (Book Review) Securing the World’s Seaports 92 JE 19A The Secure Store: A Clean Well-Lighted Place 92 MR 22A Tracking the Trucking Industry 92 JE 43A Will ADA Handicap Security? 92 MR 37 Public Warehouses Pay Off 92 MY 58 Auditing of Business Records Case Studies in Security Management Accountant’s Guide to Fraud Discovery Pham OF Altace For COPBOees «on 6 cece ciecen ce 92 D 43 and Control (Book Review) 92N 24 The Mirage Concerning Hotel Security Checking Out Cash Register Theft 92N 47 (Mirage Resort Hotel, Las Vegas, NV) 92D 54 Corporations Can Defeat Deceit Fraud Prevention is Tops (Early fraud detection) 92N 72 (Tops Appliance City, Edison, NJ) 92D 72 A Day of Reckoning 92S 90 The Morning After (Hurricane Andrew, FL) 92D 76 Automated Teller Machine (ATM) Security Building Blocks for Child Care Security Tough Trends for ATMs 92 AP 26 (John Hancock Mutual Life Insurance Company, Boston, MA) 92N 42 Automobile Theft Reserve Space for Parking Lot Security 92N 50 The proof is in the picture (Spotlight) 92D 10 Situational Crime Prevention: Keeping up with the criminals (Spotlight) 92 AG 12 Successful Case Studies (Book Review) 920 24 Bureau beats the cheats (Spotlight) 92 AP 10 A Risk Manager’s Success in Small Business Aviation Security (see also Terrorism, Hijacking) (Chips and Technologies Inc., San Jose, CA) 92076 Effective Screening for Airport Checkpoints 920 53 Protecting Disney’s Wonderful World Airport, Aircraft, and Airline Security, 2nd ed. (Walt Disney Studios, Burbank, CA) 920 80 (Book Review) 92 JL 22 Convention crime prevention The Challenge of Screening Passengers (How do you (Democratic National Convention, New York, NY) screen passengers who are temporarily or (Spotlight) 928 12 permanently disabled) 92JE IIA Thrill Seekers Find Their Quarry An Eye on Airline Security Technology 92 JE 22A (Fiesta Texas, San Antonio, TX) 92S 62 One by Land, Two by Air 92 JE31A Legal Safecracking in Kuwait 92 S 126 NII 6.os 5.0 6 sia we cimwee eed mhies 92 MY 26 Reading, Writing, and Intervention View from the Hill (Spotlight)... .. 92 MR 10 (San Antonio Independent School District) 92 AG 26 Four Steps to Success Barriers (Comprehensive security review) 92 AG 53 The Big Deal with Barriers 92N27A Making Criminals Feel Unwanted Behavior (White Hen Pantry Inc., Elmhurst, [L) 92 AG 80 PAN NID civics inet savicevcuceenws 92 MY 26 Company Crooks on the Line A Script for Screening 92 MY 72 (Hotline at Georgia-Pacific Corp., Disgrutled Employees—Ticking Time Bombs? .... . 92 JA 83 Atlanta, GA) 92 JL 36 Out of the Showroom and Into the Biometrics Manufacturing Plant 92 JL 55 The Right Look Can Open Doors 92O 83 On the Road with IDs (FMC Wyoming Corporation, No biometric is an island (Spotlight) 92-JL 12 Green River, WY) 92 JE6A Bombs/Bomb Threats A New Chapter in Hospital Security Taking the Bang Out of Bomb Threats ............ 92 MR 47 (Kapiolani Medical Ctr., Honolulu) 92 JE 34 Don’t Blow It (Implementing an effective bomb Securing America’s New Town Centers threat plan) (Union Station, Washington, DC, et.al) 92 JE 40 DECEMBER 1992 SECURITY MANAGEMENT Safe Shopping at the Mall The Next Generation (CCTV technologies) (Sawgrass Mill Mall, Sunrise, FL) 92 JE 47 Communication Monitoring Retail Losses (Using wireless video A Memorandum of Agreement transmission at Eckerd Drugs) 92 JE 49 The Cooperative Fight Against Violent Crime Communications/Communications Security (Long John Silver, Richmond, VA) 92 JE 56 Toll Fraud and Telabuse (Book Review) Security’s Minding the Mint EDI for Managers and Auditors (Security at the US Mint in Philadelphia) 92 AP 33 (Book Review) Computing a Successful System (Integrated On the Line with Data Transmission computer systems at Apple Computer Inc) 92 AP 58 Disconnecting Phone Fraud Surviving Under Saddam’s Attack (One Saudi Arabian Counterespionage Techniques That Work company’s story on how it survived and operated WT, ke ces vere sess ceset sas eaes successfully during the Gulf War) Phone Fraud: Big Plan on Campus Don’t Let Thieves Do a Number on You! ........ 92 MY 63 Cashing in on CCTV Technology Buttoning Up Communications .................. 92 MY 95 Universal Security at the University The Law of Electronic Commerce: Don’t Blow It EDI, Fax and E-Mail (Book Review) 92 MR 24 (Implementing an effective bomb threat plan) .... 92 MR 52 Computer Crime Satisfying Uncle Sam (Combining security and safety Bolstering Your Computer’s Immune System in the defense industry) (Preventing viruses) 92S 134 Putting Out the Fire of Disaster (Case study on the Computer Security—Technology and the Tablets dos and don’ts of surviving a fire) 92JA51 (Spotlight) 92 AG 13 Casino Security Computer Abuse Investigator (Book Review) 92 AP 24 The Mirage Concerning Hotel Security Cyberpunk (Book Review) 92 JA 15 (Mirage Resort Hotel, Las Vegas, NV) Computer Security Central Stations Hafta nave NAFTA (Spotlight) 92D 11 Choosing the Correct Components The enemy within (Spotlight) 92N 11 (Enclosure design) Punishing software pirates (Spotlight) 92N 13 A Memorandum of Agreement 92N 90 Certification Certificate cultivates caliber of computer security Certificate cultivates caliber of computer security (Spotlight) (Spotlight) 920 14 Is Automated Information a Security Concern? Certified Protection Professional (Viewpoint) 920 112 CPP Program Complies with ADA Liability and litigation—buzzwords for the *90s The Quest for the Universal Exam (Spotlight) 92S 18 ASIS in Action The Dos and Don’ts of DISE PCB’s Member Selection (Distributed information systems environment) ... 92S 131 A Tradition of Excellence Bolstering Your Computer’s Immune System Check Fraud and Bad Checks (Preventing viruses) 92S 1 34 The P’s and Q’s of Protecting Your PCs ........... 92S 146 Credit Card Fraud and Check Fraud Investigation Keeping computers safe and healthy (Spotlight) 92 AG 10 (Book Reviews) Introduction to Data Security and Controls Child Care/Day Care Centers (Book Review) Building Blocks for Child Care Security Information Security Polices Made Easy (John Hancock Mutual Life Insurance Company, (Book Review) Boston, MA) Virus News and Review may cure computer blues (Spotlight) 92 JE 13 Classified Information (Government) Computer Security Basics (Book Review) Security Circles (Keeping your secrets hidden) 92 AG 46 The Manager’s Guide to Computer Security The Service of Surveys 92 AG 59 (Book Review) 92F 21 Clearance (see also Pentagon Corner) Corporate Computer Security Issues and Strategies A Memorandum of Agreement (Book Review) 92F 2 3 Reporting Adverse Information Locking Up Open Systems A Script for Screening (Security for open computers) 92F 42 Closed-Circuit Television Defining the Mission (Information security) 92F 53 Cyberpunk (Book Review) 92 JA 15 CCTV Applications/Sales Manual (Book Review) . . . Recorder in the Court (CCTV in New York City’s Computer- Assisted Security major courthouse) 92 AG 74 The proof is in the picture (Spotlight) 92D 10 Out of the Showroom and Into the The Mirage Concerning Hotel Security Manufacturing Plant 92 JL 55 (Mirage Resort Hotel, Las Vegas, NV) 92D 54 CCTV Watches the World Go By Card carrying member benefit (Spotlight) 92N 12 (A watchful eye on land transportion facilities, On the Line with Data Transmission 92N 2 2A airports, and seaports) 92 JE 27A Sex, lies, and computer animation (Spotlight) Monitoring Retail Losses Unifying Europe’s Security Standards (Using wireless video transmission Booting Up Security Management Software at Eckerd Drugs) 92 JE 49 The Principle of Timely Detection Cashing in on CCTV Technology 92 MR 26A Data base boosts handwriting analysis use Monitoring the CCTV market (Spotlight) 92 F 13 (Spotlight) DECEMBER 1992 SECURITY MANAGEMENT The Good, the Bad, and the Future Writing the counterfeit blues (Spotlight) (Integration of security systems) 92 AG 35 Court Security The Latest Badge of Courage (Integrating Recorder in the Court (CCTV in New York City’s photoimaging and access control systems) 92 AG 39 Information Security Polices Made Easy major courthouse) (Book Review) 92 JL 23 Credit Card Fraud On the Road with IDs (FMC Wyoming Corporation, Card Fraud: Discover the Possibilities Green River, WY) 92 JE6A Card carrying member benefit (Spotlight) Awareness made easy (Spotlight) 92 AP 13 Credit Card Fraud and Check Fraud Investigation Computing a Successful System (Integrated computer (Book Reviews) systems at Apple Computer Inc) 92 AP 58 Crime Tracking Down the Global Criminal 92 MR 40 It’s Not the Real Thing (Product counterfeiters) The New Image of Corporate Badging 92 MR 54 What’s the Real Story on Crime Statistics? The Next Generation (CCTV technologies) 92 F 56 (Viewpoint) 92 AG 114 Designing in a New Dimension (Designing a Bush gardening (Spotlight) computerized access control system) 92 JA 26 The Hazards of Environmental Crime Using Smart Cards—A Smart Move 92 JA 32 Crime Prevention Consultants Fraud Prevention is Tops The ins and outs of outsourcing (Spotlight) 92 JE 13 (Tops Appliance City, Edison, NJ) How To Be a Successful Security Consultant Dissing the diamond dogs (Spotlight) (Video Review) 92 MY 22 Planning for the Unpredictable The Consultant’s Calling: Bringing Who You Are to (Planning for workplace violence) What You Do (Book Review) 92 MY 23 Righting the Wrongs in Retail Security 92 N 33A Making Consulting Valuable: How Clients and Are Policies Keyed to New Sentencing Guidelines? Consultants Can Gain the Most from Their Work Together (Audiotape Review) 92 MY 23 (Viewpoint) Situational Crime Prevention: Successful Case Studies Guidelines for Garnering a Good Consultant 92 JA 75 (Book Review) 92 0 24 Contract Security Services Battling Workplace Theft 92S 150 Security Industry Trends—1993 and Beyond 92D 26 ADA: The Time for Compliance is Now 92 § 155 The Morning After (Hurricane Andrew, FL) . 92D 76 Bush gardening (Spotlight) 92 JL 13 The Perils of Preemployment Screening 92N 39 Crime Prevention Through Environmental Design Deciphering the Fine Print (Book Review) 92 JE 23 (Guidelines for selecting contract security) 92N 62 Reaping the Rewards of a Reward Line 92 JE 55 Trust But Verify Bureau beats the cheats (Spotlight) 92 AP 10 (Good contract security agreements) 92N 67 The Secure Store: A Clean Well-Lighted Place 92 MR 22A Managing Contract Security Services: Defensive Driving A Business Approach (Book Review) 92 S 36 The new and improved driver’s ed (Spotlight) ...... 92 MY 10 Contract Security Rolls into the Transit Industry .... 92 JL 26 Going Undercover: An Inside or Dept. of Defense Security Programs An Outside Job 92 JE 52 A Memorandum of Agreement An Alternative to Regulation 92 JE 67 The Service of Surveys Award for Outstanding Industrial Achievement Contract vs Proprietary Security (Cogswell Award) 92 JL 129 Security Industry Trends—1993 and Beyond 92D 26 ASIS in Action 92 AP 104 Deciphering the Fine Print Security Illumination for the 1990s ............... 92 MR 81 (Guidelines for selecting contract security) 92 N 62 Locking Up Open Systems Going Undercover: An Inside or An Outside Job .... 92 JE 52 (Security for open computers) Contracts/Contracting Satisfying Uncle Sam (Combining security and The Perils of Preemployment Screening 92N 39 safety in the defense industry) Deciphering the Fine Print Visit Automation 92 JA 101 (Guidelines for selecting contract security) 92N 62 Disaster Management/Emergency Planning Trust But Verify Transforming the Crisis-Prone Organization (Good contract security agreements) 92N 67 (Book Review) 92 D 23 A Memorandum of Agreement 92 N 90 The Morning After (Hurricane Andrew, FL) 92D 76 Guidelines for Garnering a Good Consultant 92 JA 75 Disaster Survival Planning: A Practical Guide Convenience Store Security for Businesses (Book Review) 92 N 23 Making Criminals Feel Unwanted Trial and Error: Learning from L.A.’s Riot 92059 (White Hen Pantry Inc., Elmhurst, IL) 92 AG 80 A Disaster Waiting for a Place to Happen 92 S 87 Cashing in on CCTV Technology A Homecoming to Remember 92S 102 Taking a Pulse on Protection 92 MY 46 Costs Making Recovery a Priority 92 AP 71 It’s Not the Real Thing (Product counterfeiters) Surviving Under Saddam’s Attack (One Saudi Introduction to Data Security and Controls Arabian company’s story on how it survived and (Book Review) 92 AG 23 operated successfully during the Gulf War) 92 AP 75 A Painless Approach to Construction Cost Taking the Bang Out of Bomb Threats 92 MR 47 Estimating 92N 18A Don’t Blow It Counterfeiting (Implementing an effective bomb threat plan) .... 92 MR 52 It’s Not the Real Thing (Product counterfeiters) Putting Out the Fire of Disaster (Case study on the Card Fraud: Discover the Possibilities dos and don’ts of surviving a fire) 92JAS5I1 DECEMBER 1992 SECURITY MANAGEMENT Carrying the Torch Employee Theft (A quick course in fire prevention) 92 JA 53 Study shows supermarket employees stealing more (Spotlight) Drug Abuse The enemy within (Spotlight) The thin white line continues (Spotlight) Corporations Can Defeat Deceit Senate questions administration’s drug war strategy (Spotlight) 92 JE 10 (Early fraud detection) Battling Workplace Theft Drug Testing Company Crooks on the Line Shooting down the high (Spotlight) 92 MY 15 (Hotline at Georgia-Pacific Corp., A Dose of Drug Testing 92 MY 48 Atlanta, GA) The Dilemma of Detoxing the Work Force 92 MY 54 Reducing the Threat of Internal Theft Thefts from the Inside: What to Do Drug Trafficking Reaping the Rewards of a Reward Line Stuffed shirts (Spotlight) Up for grabs (Spotlight) Eavesdropping Picking Out the Bad Tomatoes Counterespionage Techniques That Work Cleaning up workplace corruption (Spotlight) Clear the Air with TSCM Mutual Benefits Through Association PN CES aig ive cseisiarse scew am cwireignieaiete Encryption/Cryptography Espionage 101And Much More Buttoning Up Communications Book II—How To Get Anything on Anybody Locking Up Open Systems (Book Review) (Security for open computers) Electronic Article Surveillance Espionage The badge that beckons (Spotlight) Bird’s-eye spy (Spotlight) 920 13 Physical Education for Campus Security Votre Secrets, Monsieur? Busting baby snatchers (Spotlight) (French economic espionage) 920 35 Solving the Patient Protection Problem Foiling the New Corporate Spy 92S 38 Quality EAS Systems Expand Market Use Counterespionage Techniques That Work 92S 44 Out of the Showroom and Into the Clear the Air with TSCM 92S 54 Manufacturing Plant 92 JL 55 Tracking the Trucking Industry 92 JE43A WSN WOME AIOE 5 wtinncdis wren waie aing s 8 dima Were 92$ 59 More news of friendly foes (Spotlight) 92 AG 10 Determining deterrence by studying shrinkage (Spotlight) 92 AP 10 Security Circles (Keeping your secrets hidden) 92 AG 46 What’s in Store with EAS 92 MR 20A Eye on intelligence (Spotlight) 92 JL 12 Espionage 101 And Much More 92 JL 106 Electronic Monitoring of Employees It’s all in your sled (Spotlight) 92 AP 14 Lite monitoring—for the liability conscious A Trained Eye Will See the Spy 92 AP 49 (Spotlight) 92 JL 13 Developing a Counterintelligence Mind-set 92 AP 54 ASIS in Action 92 MR 85 OPSEC: Not for Government Use Only Employee Dismissal (Operations security programs) Lying to get in may put you out (Spotlight) 92 MY 12 Allies or Enemies? (The United States can no longer ignore intelligence Employee Relations threats from friendly governments) 92 JA 78 Motivating to Excellence 92N 20 Ethics Planning for the Unpredictable (Planning for workplace violence) 92 N 33 A Prudent Approach to Municipal Investigations ... . 92S 142 The Downside of Downsizing 92 0 20 What Value Do Ethics Have in the Corporate World? Recognizing the Risks of Employee Reductions ..... 92077 (Viewpoint) Harness the Positive Energy of Conflict 92 AG 20 Computer Security—Technology and the Tablets Nobody’s Perfect (Managing) 92 JL 20 (Spotlight) The Right to Resist the Union Label 92 JE 61 Executive Protection Defusing Emotional Outbursts in the Workplace .... 92 MY 19 On the Road Again Extra Eyes and Ears 92 AP 42 Terrorism: Avoidance and Survival ASIS Speaks Out on Electronic Monitoring 92 AP 93 (Book Review) 92 AG 24 Managing from the Heart Produces Results 92 MR 20 On the Lookout for Suspicious Signals ............ 92 MY 42 ASIS in Action 92 MR 85 Taking a Pulse on Protection Security Managers in the 1990s: Generalist or Protecting a Tempting Target Specialists? (Viewpoint) 92 MR 96 Fences Employee Screening Sensing Your Way to Security 92 JL 50 Planning for the Unpredictable Fiber Optics (Planning for workplace violence) Detecting Intrusion with Fiber Optics 92 JL 46 The Perils of Preemployment Screening Sensing Your Way to Security 92 JL 50 Thefts from the Inside: What to Do A Dose of Drug Testing Financial Institutions Security A Script for Screening The Morning After Hiring: Caveat Employer (Hurricane Andrew, FL) Mutual Benefits Through Association Financial Management And the debate continues (Spotlight) Plan of Attack for Cutbacks Selecting a Test to Get the Best The Proof’s on the Paper (Paper-and-pencil tests) ... 92 JA 61 A Model for Security’s Bottom Line DECEMBER 1992 SECURITY MANAGEMENT Fire Prevention and Protection Insurance Fire Safety and Loss Prevention Trust But Verify (Book Review) (Good contract security agreements) Hot Contract Tips for Fire, Security Systems ....... 92S 121 Risk Management for Smail Business A Fire Hat for Security 92 JL 43 A Risk Manager’s Success in Small Business Putting Out the Fire of Disaster (Case study on the (Chips and Technologies Inc., dos and don’ts of surviving a fire) 92 JA 51 San Jose, CA) Carrying the Torch ASIS in Action 92 AP 104 (A quick course in fire prevention) 92 JA 53 Insurance Fraud Food Services Security The proof is in the picture (Spotlight) The Cooperative Fight Against Violent Crime Thefts from the Inside: What to Do (Long John Silver, Richmond, VA) 92 JE 56 Bureau beats the cheats (Spotlight) 92 AP 10 Accident Prevention for Hotels, Motels, and Intelligence Restaurants (Book Review) 92 MR 23 More news of friendly foes (Spotlight) 92 AG 10 Fraud (see also Insurance Fraud) Security Circles (Keeping your Fraud Prevention is Tops secrets hidden) 92 AG 46 (Tops Appliance City, Eye on intelligence (Spotlight) 92 JL 12 Edison, NJ) 92 D72 OPSEC: Not for Government Use Only The enemy within (Spotlight) 92N 11 (Operations security programs) Management Accountant’s Guide to Fraud Discovery A Practical Guide to Photographic Intelligence and Control (Book Review) 92N 24 (Book Review) 92 JA 15 Corporations Can Defeat Deceit Allies or Enemies? (Early fraud detection) 92N 72 (The United States can no longer ignore intelligence Are Policies Keyed to New Sentencing Guidelines? threats from friendly governments) 92 JA 78 (Viewpoint) 92N 98 International Security Disconnecting Phone Fraud 920 26 Unifying Europe’s Security Standards 92O 32 Phone Fraud: Votre Secrets, Monsieur? Don’t Let Thieves Do a Number on You! ........ 92 MY 63 (French economic espionage) 920 35 Crying wolf (Spotlight) 92 MR 11 Security Goes Underwater (Eurotunnel) 920 39 Tracking Down the Global Criminal 92 MR 40 The Art of Customs Clearance... . 920 42 Government (State and Federal) Frustration, inflation, and the proliferation of security Senate questions administration’s drug war strategy (Spotlight) 92S 14 (Spotlight) 92 JE 10 Trends for Terrorism in the Nineties .............. 92 JE 26 Nothing personal, this is business he a, EEE PEC CTE 92 MY 26 (OSAC, The U.S. Government, and the private Surviving Under Saddam’s Attack (One Saudi Arabian sector) (Spotlight) 92 MR 10 company’s story on how it survived and operated successfully during the Gulf War) Government Facility Security Artful Protection Down Under Security’s Minding the Mint (Security at the US Mint in Philadelphia) 92 AP 33 Interrogation What Inquiring Minds Need to Know (How, when, Handwriting Analysis and why to launch an investigation) Data base boosts handwriting analysis use Criminal Interrogation Techniques on Trial (Spotlight) 92 AG 11 Interviewing and Interrogations: the Reid Techniques A Script for Screening (Video Review) Hazardous Substances SCANning Words for True Confessions Can You Handle Hazardous Waste? .............. 92 JL 104 A Script for Screening The Hazards of Environmental Crime Interviewing Health Care Facilities What Inquiring Minds Need to Know (How, when, Busting baby snatchers (Spotlight) 928 13 and why to launch an investigation) Solving the Patient Protection Problem 92S 148 Interviewing and Interrogations: the Reid Techniques A New Chapter in Hospital Security (Video Review) (Kapiolani Medical Ctr., Honolulu) 92 JE 34 SCANning Words for True Confessions A Tonic for Hospital Security 92 F 68 Getting a Handle on a Hostile Interview Hotline How to Conduct an Effective Interview Company Crooks on the Line Intrusion Detection (Hotline at Georgia-Pacific Corp., On the Line with Data Transmission Atlanta, GA) 92 JL 36 Physical Education for Campus Security Reaping the Rewards of a Reward Line 92 JE 55 The Principle of Timely Detection Identification Detecting Intrusion with Fiber Optics Keep your fingers to yourself (Spotlight) 92D 10 Securing the World’s Seaports Busting baby snatchers (Spotlight) 92S 13 One by Land, Two by Air The Latest Badge of Courage (Integrating Investigations (Civil or Criminal) photoimaging and access control systems) 92 AG 39 What Inquiring Minds Need to Know (How, when, On the Road with IDs (FMC Wyoming Corporation, and why to launch an investigation) Green River, WY) 92 JE6A Corporations Can Defeat Deceit The New Image of Corporate Badging (Early fraud detection) Using Smart Cards—A Smart Move Sex, lies, and computer animation (Spotlight) DECEMBER 1992 SECURITY MANAGEMENT A Prudent Approach to Municipal Investigations ... . 92S 142 Library Security Book II—How To Get Anything on Anybody Kicking sand back in the face of book crooks (Book Review) 92 JE 22 (Spotlight) Private Investigation Methods and Materials A Gallery of Security (Storing and preserving (Book Review) 92 JE 22 valuable archival material) Going Undercover: An Inside or An Outside Job .... 92 JE 52 Lighting The Bug in the Mariini Olive, and Other True Cases Shedding Light on Security Problems from the Files of Hal Lipset, Private Eye (Book Review) 92 MY 22 Locks and Key Control A Script for Screening Unlock the Secret to Key Control Computer Abuse Investigator (Book Review) Physical Education for Campus Security Crying wolf (Spotlight) 92 MR 11 The Key to Meeting Government Specs Credit Card Fraud and Check Fraud Investigation (Lock makers’ methods to meet the government’s (Book Reviews) 92 MR 23 challenges) 92 MY 34 Tracking Down the Global Criminal Lodging Security The Hazards of Environmental Crime Overnight sensation (Spotlight) 92D 13 Judicial Decisions A Safe Solution for Hotel Rooms (In-room safes) ... 92D51 Are Policies Keyed to New Sentencing Guidelines? The Mirage Concerning Hotel Security (Viewpoint) (Mirage Resort Hotel, Las Vegas, NV) 92D 54 The New Kid on the Training Block Unlock the Secret to Key Control 92N 59 (Awareness training) 92 AG 65 The Violent Crime Gender Gap 920 56 Lying to get in may put you out (Spotlight) 92 MY 12 Accident Prevention for Hotels, Motels, and A Dose of Drug Testing 92 MY 48 Restaurants (Book Review) 92 MR 23 Kidnapping/H«-‘age-Taking Loss Prevention Trends for Terrorism in the Nineties 92 JE 26 Are Policies Keyed to New Sentencing Guidelines? 92AP 11 (Viewpoint) Is Automated Information a Security Concern? Labor Relations (Viewpoint) 920112 Planning for the Unpredictable A Model for Security’s Bottom Line (Planning for workplace violence) 92 N 33 A Gallery of Security (Storing and preserving Recognizing the Risks of Employee Reductions 92077 A System for Safe Strikes 92S 158 valuable archival material) 92S 126 Manufacturing a Secure Partnership 92 AG 50 The Right to Resist the Union Label 92 JE 61 Eye on intelligence (Spotlight) 92 JL 12 Laws/Legislation Answering the Question—What is Security? ....... 92 JL 59 Are American Seaports and Vessels Secure? Keeping the Mob at Bay 92 JE 31 (Viewpoint) 92 D 102 How Can We Add to the Bottom Line? (Viewpoint) . 92 JE 98 Punishing software pirates (Spotlight) 92N 13 Management Are Policies Keyed to New Sentencing Guidelines? Plan of Attack for Cutbacks 92 D 43 (Viewpoint) 92N 98 Protecting Disney’s Wonderful World ADA: The Time for Compliance is Now 92S 155 (Walt Disney Studios, Burbank, CA) 92 0 80 Update from the Hill (Spotlight) 92 AG 10 The Plain English Approach to Business Writing Bill puts bells on hold (Spotlight) 92 JL 11 Alarm industry alerts Capitol Hill (Spotlight) 92 JE 12 (Book Review) 92S 35 The ABCs of Developing TQM Tough Trends for ATMs 92 AP 26 (Total quality management) 92S 82 View from the Hill (Spotlight) 92 MR 10 Booting Up Security Management Software 92S 94 The Law of Electronic Commerce: EDI, Fax and The Right to Resist the Union Label 92 JE 61 E-Mail (Book Review) 92 MR 24 Security Management (Book Review) 92 AP 22 The Civil Recovery Side of Shoplifting The New Spelling of Success Will ADA Handicap Security? (Active supervision) 92 AP 62 And the debate continues (Spotlight) Security Managers in the 1990s: Who Should Set the Standards? (Viewpoint) 92 JA 106 Generalist or Specialists? (Viewpoint) 92 MR 96 Liability Management of Personnel The Power of PPCT Motivating to Excellence (Pressure point control tactics) 92D 39 Leadership in a Team Environment Unlock the Secret to Key Control 92N 5 9 The ABCs of Developing TQM Trust But Verify (Total quality management) (Good contract security agreements) 92N 67 An Alternative to Regulation Are Policies Keyed to New Sentencing Guidelines? (Viewpoint) 92N 98 Management’s View of Security Retail Security Policy Manual (Book Review) 920 23 A Model for Security’s Bottom Line The Violent Crime Gender Gap 920 56 Manufacturing a Secure Partnership Liability and litigation-—buzzwords for the ’90s Answering the Question—What is Security? ....... 92 JL 59 (Spotlight) 92S 18 How Can We Add to the Bottom Line? Making the Cinema Safe at Showtime 92 AG 43 (Viewpoint) 92 JE 98 The New Kid on the Training Block Can We Keep Up with the Changing Times? (Awareness training) 92 AG 65 (Viewpoint) 92 MY 104 Using Force Wisely Security Managers in the 1990s: Generalist or The Hazards of Environmental Crime Specialists? (Viewpoint) 92 MR 96 DECEMBER 1992 SECURITY MANAGEMENT Managing (column) CCTV Watches the World Go By Management Heads Into the Next Decade (A watchful eye on land transportion facilities, Motivating to Excellence airports, and seaports) 92 JE 27A The Downside of Downsizing One by Land, Two by Air 92 JE31A Leadership in a Team Environment Personal Security Harness the Positive Energy of Conflict Taking a Pulse on Protection 92 MY 46 Nobody’s Perfect (Managing) To Thine Own Self Be True Photography Defusing Emotional Outbursts in the Workplace .... Bird’s-eye spy (Spotlight) 92O 13 How to Conduct an Effective Interview A Practical Guide to Photographic Intelligence Managing from the Heart Produces Results (Book Review) 92 JA 15 Setting and Achieving Professional Goals Physical Security (see Access Control, Alarm (Performance Appraisals) Systems, Architecture/Design, Barriers, Achieving Peak Performance Biometrics, Building Security, Closed-Circuit Manuals Television, Intrusion Detection, Lighting, Locks Protection Officer Training Manual Sth ed. and Key Control, Perimeter Protection, Systems (Book Review) Approach to Security, and Technology) Retail Security Policy Manual (Book Review) Planning Manufacturing What You Say Is What You Get Manufacturing a Secure Partnership (Defining security requirements) 92N 12A Planning for the Unpredictable Maritime Security (Planning for workplace violence) 92N 3 3 Are American Seaports and Vessels Secure? On the Road Again 920 46 (Viewpoint) 92 D 102 Recognizing the Risks of Employee Reductions .... . 92077 Making Security a Port of Call 92 JE 14A ADA: The Time for Compliance is Now 92S 155 Securing the World’s Seaports 92 JE 19A Answering the Question—What is Security? ....... 92 JL 59 Metal Detection/Detectors A New Chapter in Hospital Security The Challenge of Screening Passengers (Kapiolani Medical Ctr., Honolulu) 92 JE 34 (How do you screen passengers who are Making Recovery a Priority 92 AP 71 temporarily or permanently disabled) 92JE IIA Taking the Bang Out of Bomb Threats ............ 92 MR 47 Making Security a Port of Call Don’t Blow It Security’s Minding the Mint (Implementing an effective bomb threat plan) .... 92 MR 52 (Security at the US Mint in Philadelphia) 92 AP 33 Privacy Seeing Your Way with X-ray Screening Selling Secrets (Spotlight) 92 JE 10 Metals ASIS Speaks Out on Electronic Monitoring 92 AP 93 Security’s Minding the Mint Private Security (Security at the US Mint in Philadelphia) 92 AP 33 Security Industry Trends—1993 and Beyond 92D 26 Mining Frustration, inflation, and the proliferation of security On the Road with IDs (FMC Wyoming Corporation, (Spotlight) 928 14 Green River, WY) 92 JE6A Nothing personal, this is business (OSAC, The U.S. Government, and the private Museum/Art Security sector) (Spotlight) 92 MR 10 Artful Protection Down Under Who Should Set the Standards? (Viewpoint) 92 JA 106 Occupational Safety and Health Act of 1970 Professionalism Can You Handie Hazardous Waste? .............. 92 JL 104 Expose Yourself for Career Success .............. 92S 80 Organized Crime What Value Do Ethics Have in the Corporate World? Keeping the Mob at Bay 92 JE 31 (Viewpoint) 92 S 226 Manufacturing a Secure Partnership 92 AG 50 Parking Lot Security Can We Keep Up with the Changing Times? Shedding Light on Security Problems ............. 92D63 (Viewpoint) 92 MY 104 Reserve Space for Parking Lot Security What Do The ’90s Hold for Women in Security? The Violent Crime Gender Gap (Viewpoint) 92 AP 108 Keeping up with the criminals (Spotlight) An Ironclad Case for Professionalism Pentagon Corner (Security education and guard force turnover) .... 92F 70 A Memorandum of Agreement What Image Should We Project? (Viewpoint) Reporting Adverse Information 92§$2 15 Proprietary Information (see also Intelligence) Award for Outstanding Industrial Achievement Hafta have NAFTA (Spotlight) (Cogswell Award) 92 JL 129 EDI for Managers and Auditors (Book Review) Buttoning Up Communications .................. 92 MY 95 Punishing software pirates (Spotlight) Security Illumination for the 1990s ............... 92 MR 81 Is Automated Information a Security Concern? Visit Automation 92 JA 101 (Viewpoint) 920112 Perimeter Protection Liability and litigation—buzzwords for the ’90s A Compromising Situation (Spotlight) 92S 18 Detecting Intrusion with Fiber Optics ............. Foiling the New Corporate Spy 92S 38 Sensing Your Way to Security Counterespionage Techniques That Work 92S 44 Securing the World’s Seaports Clear the Air with TSCM 92S 54 DECEMBER 1992 SECURITY MANAGEMENT WO DOO GET oino s kiice ese secingweweecwes 92S 59 Survey of Shoplifters The Dos and Don’t s of DISE Mutual Benefits Through Association (Distributed information systems environment) .. . 92S 131 What’s in Store with EAS The P’s and Q’s of Protecting Your PCs .......... 92S 146 The Secure Store: A Clean Well-Lighted Place Security Circles (Keeping your secrets hidden) Cashing in on CCTV Technology The Service of Surveys The Civil Recovery Side of Shoplifting Espionage 101 And Much More Reviews Selling Secrets (Spotlight) Toll Fraud and Telabuse (Book Review) 92D 22 How to handle an information heist (Spotlight) Transforming the Crisis-Prone Organization It’s all in your sled (Spotlight) (Book Review) 92D 23 A Trained Eye Will See the Spy EDI for Managers and Auditors Developing a Counterintelligence Mind-set 92 AP 54 (Book Review) 92D 23 The Law of Electronic Commerce: EDI, Fax and Protection Officer Training Manual Sth ed. E-Mail (Book Review) 92 MR 24 (Book Review) 92N 2 3 Locking Up Open Systems Disaster Survival Planning: A Practical Guide (Security for open computers) 92F 42 for Businesses (Book Review) 92N 2 3 OPSEC: Not for Government Use Only Management Accountant’s Guide to Fraud Discovery (Operations security programs) 92 F 48 and Control (Book Review) 92N 24 Defining the Mission (Information security) 92 F 53 Fire Safety and Loss Prevention Public Relations (Book Review) 920 23 Overnight sensation (Spotlight) 92D 13 Retail Security Policy Manual (Book Review) 920 23 Plan of Attack for Cutbacks 92D 43 Situational Crime Prevention: Successful Case Studies Expose Yourself for Career Success 92S 80 (Book Review) 920 24 A System for Safe Strikes 92S 158 The Plain English Approach to Business Writing The right to know (Spotlight) 92 MY 10 (Book Review) 92S 35 Can We Keep Up with the Changing Times? CCTV Applications/Sales Manual (Viewpoint) 92 MY 104 (Book Review) 92S 36 What Image Should We Project? (Viewpoint) 92F 106 Managing Contract Security Services: To Write or Not To Write? 92JA71 A Business Approach (Book Review) 92 S 36 Interviewing and Interrogations: the Reid Techniques Public Utilities (Video Review) 92 AG 22 The Morning After (Hurricane Andrew, FL) Introduction to Data Security and Controls Regulation of Security (Book Review) 92 AG 23 View from the Hill (Spotlight) Terrorism: Avoidance and Survival (Book Review) 92 AG 24 Report Writing Airport, Aircraft, and Airline Security, 2nd ed. What Inquiring Minds Need to Know (How, when, (Book Review) 92 JL 22 and why to launch an investigation) ATA Security Survey: a Guide to Analysis of The Plain English Approach to Business Writing Criticality and Vulnerability Factors of Security (Book Review) Programs (Book Review) 92 JL 22 Writing it Right 92 MY 70 Information Security Polices Made Easy Report Writing for Security Personnel (Book Review) 92 JL 23 (Book Review) Book II—How To Get Anything on Anybody Effective Report Writing for the Security Office (Book Review) 92 JE 22 (Book Review) 92 JA 16 Private Investigation Methods and Materials Research/Information on Security (Book Review) 92 JE 22 What’s the Real Story on Crime Statistics? Crime Prevention Through Environmental Design (Viewpoint) 92 AG 114 (Book Review) 92 JE 23 Up for grabs (Spotlight) 92 AP 12 How To Be a Successful Security Consultant (Video Review) 92 MY 22 Retail Security The Bug in the Martini Olive, and Other True Cases Card Fraud: Discover the Possibilities from the Files of Hal Lipset, Private Eye Dissing the diamond dogs (Spotlight) (Book Review) 92 MY 22 Righting the Wrongs in Retail Security The Consultant’s Calling: Bringing Who You Are Checking Out Cash Register Theft to What You Do (Book Review) 92 MY 23 Retail Security Policy Manual Making Consulting Valuable: How Clients and (Book Review) Consultants Can Gain the Most from Their Work Battling Workplace Theft 92S 150 Together (Audiotape Review) Making Criminals Feel Unwanted Computer Security Basics (Book Review) (White Hen Pantry Inc., Elmhurst, IL) 92 AG 80 Security Management (Book Review) Securing America’s New Town Centers The Mind of the Political Terrorist (Union Station, Washington, DC, et.al) 92 JE 40 (Book Review) 92 AP 22 Safe Shopping at the Mall Computer Abuse Investigator (Book Review) 92 AP 24 (Sawgrass Mill Mall, Sunrise, FL) 92 JE 47 Accident Prevention for Hotels, Motels, and Restaurants Monitoring Retail Losses (Book Review) (Using wireless video transmission Credit Card Fraud and Check Fraud Investigation at Eckerd Drugs) 92 JE 49 (Book Reviews) The Pros of Your POS 92 JE 50 The Law of Electronic Commerce: EDI, Fax and E-Mail A Dose of Drug Testing 92 MY 48 (Book Review) 92 MR 24 Picking Out the Bad Tomatoes 92 MR 6A DECEMBER 1992 SECURITY MANAGEMENT The Manager’s Guide to Computer Security Security Surveys/Audits (Book Review) What You Say Is What You Get Corporate Computer Security Issues and Strategies (Defining security requirements) 92.N 12A (Book Review) . Reserve Space for Parking Lot Security 92N 50 Report Writing for Security Personne! Counterespionage Techniques That Work 92S 44 (Book Review) Clear the Air with TSCM 928 54 A Practical Guide to Photographic Intelligence A Disaster Waiting for a Place to Happen 92S 87 (Book Review) 92 JA 15 A Day of Reckoning 92S 90 Cyberpunk (Book Review) Silencing False Alarms 92S 116 Effective Report Writing for the Security Officer Hot Contract Tips for Fire, Security Systems ....... 92S 121 (Book Review) 92 JA 16 A Gallery of Security (Storing and preserving valuable archival material) 92S 126 Riots and Riot Prevention Trial and Error: Learning from L.A.’s Riot Four Steps to Success L.A. violence invades newsroom (Spotlight) 92 JL 10 (Comprehensive security review) 92 AG 53 ATA Security Survey: a Guide to Analysis Risk Management/Risk Analysis of Criticality and Vulnerability Factors of 92074 Security Programs (Book Review) 92 JL 22 A Risk Manager’s Success in Small Business Answering the Question—What is Security? ....... 92 JL 59 (Chips and Technologies Inc., San Jose, CA) 920 76 Taking the Bang Out of Bomb Threats ............ 92 MR 47 A Model for Security’s Bottom Line 92S 76 A Gallery of Security (Storing and preserving Security/Police Relationships valuable archival material) 92S 126 Nuisance annihilation (Spotlight) Introduction to Data Security and Controls Security Goes Underwater (Eurotunnel) (Book Review) 92 AG 23 Physical Education for Campus Security Four Steps to Success Reading, Writing, and Intervention (Comprehensive security review) 92 AG 53 (San Antonio Independent School District) 92 AG 26 Answering the Question—What is Security? ....... Contract Security Rolls into the Transit Industry .... 92 JL 26 An Eye on Airline Security Technology The Cooperative Fight Against Violent Crime (Long John Silver, Richmond, VA) 92 JE 56 Robbery Cleaning up workplace corruption (Spotlight) 92 MR 10 The Cooperative Fight Against Violent Crime (Long John Silver, Richmond, VA) 92 JE 56 Sensors On the Line with Data Transmission 92N 2 2A Safety Technology Meets the Alarm Industry 92S 113 Fire Safety and Loss Prevention (Book Review) .... 920 23 Detecting Intrusion with Fiber Optics ............. 92 JL 46 ADA: The Time for Compliance is Now 92S 155 Sensing Your Way to Security Accident Prevention for Hotels, Motels, and Out of the Showroom and Into the Restaurants (Book Review) Manufacturing Plant 92 JL 55 Satisfying Uncle Sam (Combining security and safety One by Land, Two by Air in the defense industry) Shoplifting Salaries III cs. 6 cing ananasevsipea ceot e 92 MR IIA Rees AGU BANGS ..... 6. oe cweecscssesicces The Civil Recovery Side of Shoplifting 92 MR 30A It pays to know (Spotlight) Shopping Center Security School Security Securing America’s New Town Centers Reading, Writing, and Intervention (Union Station, Washington, DC, et.al) 92 JE 40 (San Antoriio Independent School District) Safe Shopping at the Mall Security Equipment Industry (Sawgrass Mill Mall, Sunrise, FL) 92 JE 47 Security Industry Trends—1993 and Beyond Lost and found (Spotlight) 92F 10 Unifying Europe’s Security Standards Special Event Security The Right Look Can Open Doors The Mirage Concerning Hotel Security Eyes that open doors (Spotlight) (Mirage Resort Hotel, Las Vegas, NV) 92D 54 Checking out "92’s security and card technology Convention crime prevention (Spotlight) (Democratic National Convention, New York, NY) Happy birthday (Spotlight) (Spotlight) 92$ 12 Monitoring the CCTV market (Spotlight) A Homecoming to Remember 92S 102 Security Industry Market Festival Seating Security Industry Trends—1993 and Beyond Standards Security Officers EDI for Managers and Auditors (Book Review) Deciphering the Fine Print Unifying Europe’s Security Siandards (Guidelines for selecting contract security) The Right Look Can Open Doors An Aliernative to Regulation Technology Meets the Alarm Industry Using Force Wisely The Key to Meeting Government Specs A Tonic for Hospital Security (Lock makers’ methods to meet the government’s An Ironclad Case for Professionalism challenges) 92 MY 34 (Security education and guard force turnover) .... Sound Advice for Safe Storage 92 MY 37 What Image Should We Project? (Viewpoint) I oo ences asics eresedes 92 AP 26 And the debate continues (Spotlight) And the debate continues (Spotlight) Selecting a Test to Get the Best Who Should Set the Standards? (Viewpoint) DECEMBER 1992 SECURITY MANAGEMENT

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.