語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The Handbook of Security
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
The Handbook of Security/ edited by Martin Gill.
其他作者:
Gill, Martin.
面頁冊數:
XLII, 1029 p. 41 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
International Security Studies. -
電子資源:
https://doi.org/10.1007/978-3-030-91735-7
ISBN:
9783030917357
The Handbook of Security
The Handbook of Security
[electronic resource] /edited by Martin Gill. - 3rd ed. 2022. - XLII, 1029 p. 41 illus.online resource.
1. Introduction, Martin Gill -- PART 1. The Subject Area of Security -- 2. Security: History, Genealogy, Ideology, Dodsworth, F -- 3. Shifting The Boundaries Of Security: Meanings And Applications, Dr Helen Forbes-Mewett -- 4. Explaining The Impact And Implications Of Covid-19 On Crime Rates: A Criminological Perspective , Rob Mawby -- 5. Forensic Intelligence And Traceology In Digitalised Environments: The Detection And Analysis Of Crime Patterns To Inform Practice, Olivier Ribaux Simon Baechler, Quentin Rossy -- 6. Changing Threats And Challenges In International Relations: Debating (In)Securities And Ways To Manage Them, Tochukwu Omenma And Silvia D’amato -- 7 -- PART 2. Offence Types. - Private Security/Private Military: One Phenomenon Or Two?, Adam White -- 8. The Evolution Of The Terrorism And Extremism Landscape In The Age Of Covid-19, Kumar Ramakrishna -- 9. Violence Against Shop Workers: Trends And Triggers In The United Kingdom, Emmeline Taylor -- 10. Burglary Research And Conceptualizing The Community Security Function, A Learning Organization, Jim Calder April -- 11. Meeting The Challenges Of Fraud In A Digital World, Cassandra Cross -- 12. Examining Private Sector Strategies For Preventing Insurance Fraud, Dr. Yuriy Timofeyev And Mike Skidmore -- 13. Economic And Industrial Espionage: Characteristics, Techniques And Response, Mark Button And Susanne Knickmeier -- 14. Combatting Money Laundering: Some Considerations For Security Professionals, Professor Mike Levi -- 15. - PART 3. Crime And Security In Different Domains. - Corruption, Bribery And Corporate Crime: Victims And Perpetrators, Hock, B., Shepherd, D And Button, M -- 16. Securing The Bioeconomy: Exploring The Role Of Cyberbiosecurity, Patrick Walsh -- 17. Border Security: An Essential But Effective Tool In Combating Cross-Border Crime, Prof Anthony Minnaar -- 18. Security In The Chemical Industry: Theory And Practice, Chao Chen And Genserik Reniers -- 19. The Evolution Of College And University Campus Security In The United States: Congressional Legislation, Administrative Directives, And Policing, Bonnie Fisher, Michelle Protas, Logan Lanson And John Sloan -- 20. Addressing The Security Issues Related To Illegal Commercial Fishing, Gohar A. Petrossian And Ron Clarke -- 21. Crime On The Darknet: The Case Of Brand Abuse, Victoria Wang. Jim Gee, Mark Button -- 22. - PART 4. Researching Security. - Representing Security: A Popular Criminology Of Private Policing In Film, Steven Kohm -- 23. Systematic Reviews And Meta-Analysis Of Security, Matthew Manning, Gabriel T.W. Wong, Hien-Thuc Pham -- 24. Realistic Evaluation And The 5is: A Systematic Approach For Evaluating Security Interventions, Andrew Newton -- 25. Script Analysis For Security Professionals: Past, Present And Future, Dr. Harald Haelterman -- 26. Using Mobile Applications And Physiological Sensing To Measure Perception Of Security In Built Environments, Reka Solymosi, Ines Guedes, Laura Vozmediano -- 27.Researching The Relationship Between Tourism And Crime: The Tourism Industry And The Disenfranchised Citizens, Rob I Mawby And Zarina I Vakhitova -- PART 5. Security Products And Services. - 28. Security Officers: The Public Face Of The Security Industry, Mahesh K. Nalla And Alison Wakefield -- 30. Private And Corporate Investigations – Internal Security Governance Within Organisation, Clarissa Meerts -- 31. Training And Education Within The Security Sector: Challenges And Opportunities For Development, Declan Garrett, Glen Kitteringham And Ken Livingstone -- 32. CCTV As A Socio-Technology, Markus Lahtinen And Benjamin Weaver -- 33. Intrusion Detection Systems In The Protection Of Assets, David J Brooks -- PART 6. Towards a Better Security. - 34. Crime And The Consumer Internet Of Things, Shane D Johnson, John M Blythe, Eon Kim And Nissy Sombatruang -- 35. Professional Security In The Fourth Industrial Revolution, Alison Wakefield And Mike Gips -- 36. Security Or Liberty? Human Rights And Protest, Kate Moss -- 37. Facilitating Best Practice In Security: The Role Of Regulation, Tim Prenzler And R Sarre -- 38. Formal And Informal (In)Security In South Africa, G. D. Breetzke -- 39. Facing Up To The Future: The Role Of Horizon-Scanning In Helping Security Keep Up With The Changes To Come, Paul Ekblom -- 40. The Securitization Of Terrestrial Protected Areas, William D. Moreto -- PART 7. The Impacts of Security. - 41. The Carbon Footprint Of Crime And Security,Helen Shoesmith (Nee Skudder), Ian Brunton-Smith, Andromachi Tseloni, Rebecca Thompson, And Angela Druckman -- 42. Security And International Crime Drops, Nick Tilley And Graham Farrell -- 43. The Role Of Crime Prevention Through Environmental Design (Cpted) In Improving Household Security Rachel Armitage, Lisa Tompson.-44. Examining The Use Of Video Technologies In Retailing, Adrian Beck -- 45. Making An Economic Case For Security, Matthew Manning, Christopher M. Fleming, Hien-Thuc Pham -- 46. Business Resilience To Crime: The Harms Of Crime, Business Fragility And The Role Of Security, Matt Hopkins -- 47. Security In Perspective, Martin Gill.
The substantially revised third edition of The Handbook of Security provides the most comprehensive analysis of scholarly security debates and issues to date. It reflects the developments in security technology, the convergence of the cyber and security worlds, and the fact that security management has become even more business focused. It covers newer topics like terrorism, violence, and cybercrime through various offence types such as commercial robbery and bribery. This handbook comprises mostly brand new chapters and a few thoroughly revised chapters, with discussions of the impact of the pandemic. It includes contributions from some of the world's leading scholars from an even broader geographic scale to critique the way security is provided and managed. It speaks to professionals working in security and students studying security-related courses. Chapter 5 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
ISBN: 9783030917357
Standard No.: 10.1007/978-3-030-91735-7doiSubjects--Topical Terms:
1140687
International Security Studies.
LC Class. No.: HV6001-7220.5
Dewey Class. No.: 364.4
The Handbook of Security
LDR
:07374nam a22003855i 4500
001
1087676
003
DE-He213
005
20220802140318.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783030917357
$9
978-3-030-91735-7
024
7
$a
10.1007/978-3-030-91735-7
$2
doi
035
$a
978-3-030-91735-7
050
4
$a
HV6001-7220.5
072
7
$a
JKV
$2
bicssc
072
7
$a
SOC004000
$2
bisacsh
072
7
$a
JKV
$2
thema
082
0 4
$a
364.4
$2
23
245
1 4
$a
The Handbook of Security
$h
[electronic resource] /
$c
edited by Martin Gill.
250
$a
3rd ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Palgrave Macmillan,
$c
2022.
300
$a
XLII, 1029 p. 41 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
1. Introduction, Martin Gill -- PART 1. The Subject Area of Security -- 2. Security: History, Genealogy, Ideology, Dodsworth, F -- 3. Shifting The Boundaries Of Security: Meanings And Applications, Dr Helen Forbes-Mewett -- 4. Explaining The Impact And Implications Of Covid-19 On Crime Rates: A Criminological Perspective , Rob Mawby -- 5. Forensic Intelligence And Traceology In Digitalised Environments: The Detection And Analysis Of Crime Patterns To Inform Practice, Olivier Ribaux Simon Baechler, Quentin Rossy -- 6. Changing Threats And Challenges In International Relations: Debating (In)Securities And Ways To Manage Them, Tochukwu Omenma And Silvia D’amato -- 7 -- PART 2. Offence Types. - Private Security/Private Military: One Phenomenon Or Two?, Adam White -- 8. The Evolution Of The Terrorism And Extremism Landscape In The Age Of Covid-19, Kumar Ramakrishna -- 9. Violence Against Shop Workers: Trends And Triggers In The United Kingdom, Emmeline Taylor -- 10. Burglary Research And Conceptualizing The Community Security Function, A Learning Organization, Jim Calder April -- 11. Meeting The Challenges Of Fraud In A Digital World, Cassandra Cross -- 12. Examining Private Sector Strategies For Preventing Insurance Fraud, Dr. Yuriy Timofeyev And Mike Skidmore -- 13. Economic And Industrial Espionage: Characteristics, Techniques And Response, Mark Button And Susanne Knickmeier -- 14. Combatting Money Laundering: Some Considerations For Security Professionals, Professor Mike Levi -- 15. - PART 3. Crime And Security In Different Domains. - Corruption, Bribery And Corporate Crime: Victims And Perpetrators, Hock, B., Shepherd, D And Button, M -- 16. Securing The Bioeconomy: Exploring The Role Of Cyberbiosecurity, Patrick Walsh -- 17. Border Security: An Essential But Effective Tool In Combating Cross-Border Crime, Prof Anthony Minnaar -- 18. Security In The Chemical Industry: Theory And Practice, Chao Chen And Genserik Reniers -- 19. The Evolution Of College And University Campus Security In The United States: Congressional Legislation, Administrative Directives, And Policing, Bonnie Fisher, Michelle Protas, Logan Lanson And John Sloan -- 20. Addressing The Security Issues Related To Illegal Commercial Fishing, Gohar A. Petrossian And Ron Clarke -- 21. Crime On The Darknet: The Case Of Brand Abuse, Victoria Wang. Jim Gee, Mark Button -- 22. - PART 4. Researching Security. - Representing Security: A Popular Criminology Of Private Policing In Film, Steven Kohm -- 23. Systematic Reviews And Meta-Analysis Of Security, Matthew Manning, Gabriel T.W. Wong, Hien-Thuc Pham -- 24. Realistic Evaluation And The 5is: A Systematic Approach For Evaluating Security Interventions, Andrew Newton -- 25. Script Analysis For Security Professionals: Past, Present And Future, Dr. Harald Haelterman -- 26. Using Mobile Applications And Physiological Sensing To Measure Perception Of Security In Built Environments, Reka Solymosi, Ines Guedes, Laura Vozmediano -- 27.Researching The Relationship Between Tourism And Crime: The Tourism Industry And The Disenfranchised Citizens, Rob I Mawby And Zarina I Vakhitova -- PART 5. Security Products And Services. - 28. Security Officers: The Public Face Of The Security Industry, Mahesh K. Nalla And Alison Wakefield -- 30. Private And Corporate Investigations – Internal Security Governance Within Organisation, Clarissa Meerts -- 31. Training And Education Within The Security Sector: Challenges And Opportunities For Development, Declan Garrett, Glen Kitteringham And Ken Livingstone -- 32. CCTV As A Socio-Technology, Markus Lahtinen And Benjamin Weaver -- 33. Intrusion Detection Systems In The Protection Of Assets, David J Brooks -- PART 6. Towards a Better Security. - 34. Crime And The Consumer Internet Of Things, Shane D Johnson, John M Blythe, Eon Kim And Nissy Sombatruang -- 35. Professional Security In The Fourth Industrial Revolution, Alison Wakefield And Mike Gips -- 36. Security Or Liberty? Human Rights And Protest, Kate Moss -- 37. Facilitating Best Practice In Security: The Role Of Regulation, Tim Prenzler And R Sarre -- 38. Formal And Informal (In)Security In South Africa, G. D. Breetzke -- 39. Facing Up To The Future: The Role Of Horizon-Scanning In Helping Security Keep Up With The Changes To Come, Paul Ekblom -- 40. The Securitization Of Terrestrial Protected Areas, William D. Moreto -- PART 7. The Impacts of Security. - 41. The Carbon Footprint Of Crime And Security,Helen Shoesmith (Nee Skudder), Ian Brunton-Smith, Andromachi Tseloni, Rebecca Thompson, And Angela Druckman -- 42. Security And International Crime Drops, Nick Tilley And Graham Farrell -- 43. The Role Of Crime Prevention Through Environmental Design (Cpted) In Improving Household Security Rachel Armitage, Lisa Tompson.-44. Examining The Use Of Video Technologies In Retailing, Adrian Beck -- 45. Making An Economic Case For Security, Matthew Manning, Christopher M. Fleming, Hien-Thuc Pham -- 46. Business Resilience To Crime: The Harms Of Crime, Business Fragility And The Role Of Security, Matt Hopkins -- 47. Security In Perspective, Martin Gill.
520
$a
The substantially revised third edition of The Handbook of Security provides the most comprehensive analysis of scholarly security debates and issues to date. It reflects the developments in security technology, the convergence of the cyber and security worlds, and the fact that security management has become even more business focused. It covers newer topics like terrorism, violence, and cybercrime through various offence types such as commercial robbery and bribery. This handbook comprises mostly brand new chapters and a few thoroughly revised chapters, with discussions of the impact of the pandemic. It includes contributions from some of the world's leading scholars from an even broader geographic scale to critique the way security is provided and managed. It speaks to professionals working in security and students studying security-related courses. Chapter 5 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
650
2 4
$a
International Security Studies.
$3
1140687
650
2 4
$a
Corporate Governance.
$2
swd
$3
836019
650
2 4
$a
Business and Management.
$2
eflch
$3
934826
650
2 4
$a
Military and Defence Studies.
$3
1104902
650
2 4
$a
Organized Crime.
$3
1105401
650
1 4
$a
Crime Control and Security.
$3
1172058
650
0
$a
Security, International.
$3
555096
650
0
$a
Corporate governance.
$3
560247
650
0
$a
Management science.
$3
719678
650
0
$a
Business.
$3
558617
650
0
$a
Politics and war.
$3
649113
650
0
$a
Organized crime.
$3
661864
650
0
$a
Criminology.
$3
563146
700
1
$a
Gill, Martin.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1394733
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030917340
776
0 8
$i
Printed edition:
$z
9783030917364
856
4 0
$u
https://doi.org/10.1007/978-3-030-91735-7
912
$a
ZDB-2-LCR
912
$a
ZDB-2-SXLC
950
$a
Law and Criminology (SpringerNature-41177)
950
$a
Law and Criminology (R0) (SpringerNature-43727)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入