You are previewing Security Science.
O'Reilly logo
Security Science

Book Description

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners and students the underlying scientific perspective based on robust underlying theories, principles, models or frameworks. Demonstrating the relationships and underlying concepts, they present an approach to each core security function within the context of both organizational security and homeland security. The book is unique in its application of the scientific method to the increasingly challenging tasks of preventing crime and foiling terrorist attacks. Incorporating the latest security theories and principles, it considers security from both a national and corporate perspective, applied at a strategic and tactical level. It provides a rational basis for complex decisions and begins the process of defining the emerging discipline of security science.



  • A fresh and provocative approach to the key facets of security
  • Presentation of theories and models for a reasoned approach to decision making
  • Strategic and tactical support for corporate leaders handling security challenges
  • Methodologies for protecting national assets in government and private sectors
  • Exploration of security‚Äôs emerging body of knowledge across domains

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. Acknowledgments
  7. About the Authors
  8. Foreword
  9. Preface
  10. Chapter 1. Concept of Security
    1. Objectives
    2. Introduction
    3. Scientific method in support of security science
    4. Defining the concept of security
    5. Security of individuals
    6. Security of groups
    7. Security of nation-state and international systems
    8. Concept of security matrix
    9. Security science: context defines concept definition
    10. Security science
    11. Conclusion
    12. Further Reading
    13. References
  11. Chapter 2. Security Management
    1. Objectives
    2. Introduction
    3. Security management issues
    4. A systems approach
    5. Security management
    6. Strategic security management frameworks
    7. Organizational resilience
    8. Security management functions
    9. Security management policies and procedures
    10. Security principles
    11. Security ethics
    12. Security decay
    13. Conclusion
    14. Websites
    15. References
  12. Chapter 3. Security Risk Management
    1. Objectives
    2. Introduction
    3. The concept of risk
    4. Defining risk
    5. The concepts of probability to likelihood
    6. Importance of consequence
    7. Source of risk
    8. Risk management
    9. An international approach to risk management
    10. Security risk management
    11. Threat
    12. Criticality
    13. Vulnerability
    14. Threat, criticality, and vulnerability
    15. Risk models and modeling
    16. Gaming risk
    17. Decision-making in risk
    18. Perception and culture
    19. Trust
    20. Gaining consensus
    21. Conclusion
    22. Further Reading
    23. References
  13. Chapter 4. Built Environment
    1. Objectives
    2. Introduction
    3. Built environment
    4. Security and the built environment
    5. Facility management
    6. Who is the facility manager?
    7. Facility management and security
    8. Building management systems
    9. Protecting the facility
    10. Conclusion
    11. Further Reading
    12. References
  14. Chapter 5. Physical Security
    1. Objectives
    2. Introduction
    3. Routine activity theory
    4. Defense-in-depth
    5. Crime prevention through environmental design
    6. Physical barriers
    7. Relationships between DiD functions
    8. Conclusion
    9. Further Reading
    10. References
  15. Chapter 6. Detection Systems
    1. Objectives
    2. Introduction
    3. Theory
    4. Function of security technology
    5. Barrier and open ground detection
    6. Testing systems
    7. Conclusion
    8. Further Reading
    9. References
  16. Chapter 7. Integrated Identification Technology
    1. Objectives
    2. Introduction
    3. Background
    4. Access control systems
    5. Cards
    6. Biometrics
    7. Intelligent CCTV
    8. Conclusion
    9. Further Reading
    10. References
  17. Chapter 8. Knowledge Management
    1. Objectives
    2. Introduction
    3. Knowledge
    4. Intelligence
    5. Intelligence in security management
    6. Vetting
    7. Predictive profiling
    8. Conclusion
    9. Further Reading
    10. References
  18. Chapter 9. Business Continuity Management
    1. Objectives
    2. Introduction
    3. Crisis
    4. Four phases of a crisis
    5. Business continuity management
    6. Essential elements of business continuity management
    7. BCM Framework
    8. Business impact forecasting
    9. Learning from a crisis
    10. Common elements of BCM
    11. Security and BCM
    12. Conclusion
    13. Further Reading
    14. References
  19. Chapter 10. The Future of Security
    1. Objectives
    2. Introduction
    3. Background
    4. Security in the future
    5. Future of intelligence
    6. Professionalism
    7. Management
    8. Conclusion
    9. Further Reading
    10. References
  20. Index