| 000 | 06420cam a2200697Ii 4500 | ||
|---|---|---|---|
| 005 | 20250919085810.0 | ||
| 006 | m o d | ||
| 007 | cr cnu|||unuuu | ||
| 008 | 161221s2015 enk o 001 0 eng d | ||
| 020 |
_a9780128014882 _qelectronic bk. |
||
| 020 |
_a0128014881 _qelectronic bk. |
||
| 020 | _z9780128013465 | ||
| 029 | 1 |
_aCHVBK _b341786047 |
|
| 029 | 1 |
_aCHBIS _b010547801 |
|
| 029 | 1 |
_aDEBSZ _b451525485 |
|
| 029 | 1 |
_aGBVCP _b825926653 |
|
| 029 | 1 |
_aDEBBG _bBV043216341 |
|
| 035 |
_a(OCoLC)907466947 _z(OCoLC)908073267 |
||
| 035 | _a(OCoLC)ocn907466947 | ||
| 039 | 9 |
_y12-21-2016 _zhafiz _wmetacoll.MYUKM.updates.D20160920.T210208.sdallbooks.1 (perolehan)hafizupload21122016.mrc _x138 |
|
| 040 |
_aNST _beng _erda _epn _cNST _dNST _dOPELS _dCDX _dE7B _dIDEBK _dEBLCP _dYDXCP |
||
| 049 | _aMAIN | ||
| 050 | 4 | _aBL65.C7 | |
| 072 | 7 |
_aOCC _x033000 _2bisacsh |
|
| 072 | 7 |
_aREL _x070000 _2bisacsh |
|
| 082 | 0 | 4 |
_a201.7 _223 |
| 100 | 1 |
_aMcLamb, Jennie-Leigh, _eauthor. |
|
| 245 | 1 | 0 |
_aKeeping religious institutions secure / _cJennie-Leigh McLamb. |
| 264 | 1 |
_aOxford UK ; _aWaltham, MA : _bButterworth-Heinemann, an imprint of Elsevier, _c[2015] |
|
| 300 | _a1 online resource | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _aIncludes index. | ||
| 505 | 0 | _aFront Cover; Keeping Religious Institutions Secure; Copyright; Contents; About the Authors; Preface; Acknowledgments; 1 -- Introduction; Incidents in the United States; Incidents Outside the United States; Safety versus Security; Purpose and Scope of this Book; Organization of this Book; Considerations; End Notes; Chapter 2 -- Examining Typical Crimes; General Crime Information; Financial Crimes; Crimes against Property; Crimes against Persons; Hate Crimes; Final Thoughts; End Notes; 3 -- Understanding Basic Security Principles; General Concepts; Disaster/Crisis/Incident Management Cycle. | |
| 505 | 8 | _aPhysical SecurityElectronic Security; Environmental Security; Operational Security; Information Security; Final Thoughts; End Notes; 4 -- Evaluating Risk; Risk; Risk Assessment; Security Survey; Cost-Benefit Analysis; Putting It All Together; Final Thoughts; End Notes; 5 -- Choosing Physical and Electronic Security Countermeasures; Security System Functions; Designing and Implementing a Physical Protection System; Improving an Existing PPS; Systems Integration; Performance Measures for PPS Functions; Building Your Facility; Final Thoughts; End Notes; 6 -- Utilizing the Total Environment. | |
| 505 | 8 | _aBenefits of CPTEDWhat is CPTED?; Behavior Management; Space Assessment 3-D Approach; Putting CPTED Principles to Work; Final Thoughts; End Notes; 7 -- Developing Policies and Procedures; Topics for Policies and Procedures; Emergency Plans for Security Incidents; Recovery Plans; Information Security Policies; Issue-Specific Security Policies; Policy Distribution; Final Thoughts; End Notes; 8 -- Identifying and Handling At-Risk People; Threat Assessment; Signs of a Person Being Under the Influence of Chemical Substances19; Mental Illness; Suspicious Behaviors Indicating Criminal Activity. | |
| 505 | 8 | _aEarly Warning Signs of Potential Workplace ViolenceWarning Signs of Potential/Impending Violence; Domestic Violence; Meeting with a Potentially Violent Person; Confrontation Management and De-Escalation Techniques; Final Thoughts; End Notes; 9 -- Reacting to an Event in Progress; Declaring a Crisis; Bomb Threats; Other Threats; Suspicious Mail or Packages; Suspicious Items; Potential Attacker; Managing Anxiety; Managing Verbal Aggression; Physical Intervention; Final Thoughts; End Notes; 10 -- Responding to an Active Shooter; Factors that Affect Decision-Making; Preparation; Run; Hide. | |
| 505 | 8 | _aInterveneWhat to Do when Law Enforcement Arrives; Final Thoughts; End Notes; 11 -- Recovering from an Incident; Immediate Aftermath; Short Term; Long Term; Summary; End Notes; 12 -- Handling the Media; Introduction; Media Liaison; Other Considerations; Final Thoughts; End Notes; 13 -- Recognizing Intangible Capital and Liability Concerns; Intangible Assets; Intangible Capital; Protecting Your Facility's Reputation; Liability Concerns; Final Thoughts; End Notes; 14 -- Increasing Security Awareness; Factors that Negatively Affect Awareness; Security Awareness Program; Final Thoughts; End Notes. | |
| 505 | 8 | _a15 -- Implementing and Training. | |
| 520 | _aKeeping Religious Institutions Secure explores the unique vulnerabilities that churches, synagogues, and mosques face in regards to security, making them attractive to criminals who see them as easy targets. The text illustrates why all places of worship should think about security and the types of breaches that can drive people away. The book focuses on the most frequent security concerns experienced by houses of worship, including embezzlement, vandalism, assault, hate crime, and in rare cases, an active shooter-and how to help prevent them from occurring. Beginning with an overview of the basic security concepts and principles that can enhance the security of any religious facility, it then delves deeply into the particular security concerns of houses of worship, including the use of volunteers, protecting religious leaders, ensuring safety for children and teens, interacting with local law enforcement, handling the media, and much more. | ||
| 588 | 0 | _aVendor-supplied metadata. | |
| 590 |
_aElsevier _bScienceDirect All Books |
||
| 650 | 0 |
_aReligious institutions _xSafety measures. |
|
| 650 | 0 |
_aReligious institutions _xSecurity measures. |
|
| 650 | 0 |
_aCrime _xReligious aspects. |
|
| 650 | 7 |
_aBODY, MIND & SPIRIT / Gaia & Earth Energies _2bisacsh |
|
| 650 | 7 |
_aRELIGION / Christianity / General _2bisacsh |
|
| 650 | 4 |
_aChurch and state _zUnited States. |
|
| 650 | 4 | _aChurch and state. | |
| 650 | 4 | _aReligion. | |
| 655 | 4 | _aElectronic books. | |
| 776 | 0 | 8 |
_iPrint version: _aMcLamb, Jennie-Leigh. _tKeeping Religious Institutions Secure. _dBurlington : Elsevier Science, ò015 _z9780128013465 |
| 856 | 4 | 0 | _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://www.sciencedirect.com/science/book/9780128013465 |
| 907 |
_a.b16400562 _b2022-11-02 _c2019-11-12 |
||
| 942 | _n0 | ||
| 914 | _avtls003614161 | ||
| 998 |
_ae _b2016-08-12 _cm _dz _feng _genk _y0 _z.b16400562 |
||
| 999 |
_c613442 _d613442 |
||