9781934904251-1934904252-Protection of Assets: Security Management

Protection of Assets: Security Management

ISBN-13: 9781934904251
ISBN-10: 1934904252
Edition: First Edition
Author: Michael E. Knoke, CPP, Managing Editor
Publication date: 2012
Publisher: ASIS International
Format: Hardcover 404 pages
FREE US shipping

Book details

ISBN-13: 9781934904251
ISBN-10: 1934904252
Edition: First Edition
Author: Michael E. Knoke, CPP, Managing Editor
Publication date: 2012
Publisher: ASIS International
Format: Hardcover 404 pages

Summary

Protection of Assets: Security Management (ISBN-13: 9781934904251 and ISBN-10: 1934904252), written by authors Michael E. Knoke, CPP, Managing Editor, was published by ASIS International in 2012. With an overall rating of 3.5 stars, it's a notable title among other books. You can easily purchase or rent Protection of Assets: Security Management (Hardcover) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

Security managers are both security specialists and business managers. To serve their organizations effectively, security managers must also understand business principles. With that knowledge, they can organize their efforts in a way that best supports the overall vision and mission of their organization. Security managers who understand business are best positioned to collaborate with top management and to turn their departments into valuable corporate resources that support organizational success. All security managers with an assets protection responsibility will find the information in this book invaluable Protection of Assets: Security Management was written, edited, and updated by veteran security subject matter experts. This comprehensive source covers all aspects of Security Management including Financial Management, Theft and Fraud Prevention in the Workplace, Private Policing, Consultants as a Protection Resource, Cost Effectiveness and Loss Reporting, and much more.Of particular significance are the various forms, matrices, and checklists that help give the reader a practical start toward application of the security theory.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book