<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>     cam a22     7  4500</leader>
  <controlfield tag="001">528889192</controlfield>
  <controlfield tag="003">CHVBK</controlfield>
  <controlfield tag="005">20200927091755.0</controlfield>
  <controlfield tag="006">m        d        </controlfield>
  <controlfield tag="007">cr |n ||||||||</controlfield>
  <controlfield tag="008">160901t20172017maua    s     001 0 eng d</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
   <subfield code="a">  2016952949</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">978-0-12-804462-9</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">0-12-804462-4</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(SERSOL)ssj0001777401</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(WaSeSS)ssj0001777401</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">AU@</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">AU@</subfield>
   <subfield code="d">OCLCO</subfield>
   <subfield code="d">NUI</subfield>
   <subfield code="d">OCLCF</subfield>
   <subfield code="d">CDN</subfield>
   <subfield code="d">LTSCA</subfield>
   <subfield code="d">DLC</subfield>
   <subfield code="d">WaSeSS</subfield>
  </datafield>
  <datafield tag="050" ind1="0" ind2="0">
   <subfield code="a">TH9705</subfield>
   <subfield code="b">.E34 2017</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="4">
   <subfield code="a">658.4/7</subfield>
   <subfield code="2">23</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
   <subfield code="a">Effective physical security</subfield>
   <subfield code="h">[Elektronische Daten]</subfield>
   <subfield code="c">Lawrence J. Fennelly</subfield>
  </datafield>
  <datafield tag="250" ind1=" " ind2=" ">
   <subfield code="a">Fifth edition.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">Cambridge, MA</subfield>
   <subfield code="b">Elsevier</subfield>
   <subfield code="c">[2017]</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="4">
   <subfield code="c">©2017</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xi, 446 pages)</subfield>
   <subfield code="b">illustrations</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
   <subfield code="a">text</subfield>
   <subfield code="b">txt</subfield>
   <subfield code="2">rdacontent/eng</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
   <subfield code="a">computer</subfield>
   <subfield code="b">c</subfield>
   <subfield code="2">rdamedia/eng</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
   <subfield code="a">online resource</subfield>
   <subfield code="b">cr</subfield>
   <subfield code="2">rdacarrier/eng</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">&quot;This new edition contains updated and new sections...from...Handbook of Loss Prevention and Crime Prevention, Fifth edition.&quot;</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes index.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">1.Encompassing Effective CPTED Solutions in 2017 and Beyond: Concepts and Strategies / Marianna A. Perry -- 2.Introduction to Vulnerability Assessment / Mary Lynn Garcia -- 3.Influence of Physical Design / Marianna A. Perry -- 4.Approaches to Physical Security / Ronald Jason -- 5.Security Lighting / James F. Broder -- 6.Electronics Elements: A Detailed Discussion / Thomas L. Norman -- 7.Use of Locks in Physical Crime Prevention / John E. Hunter -- 8.Internal Threats and Countermeasures / Philip P. Purpura -- 9.External Threats and Countermeasures / Philip P. Purpura -- 10.Biometrics in the Criminal Justice System and Society Today / Dr. Thomas J. Rzemyk -- 11.Access Control Systems and Identification Badges / Dr. Joshua Sinai -- 12.Chain-Link Fence Standards / Chain-Link Fence Manufacturers Institute -- 13.Doors, Door Frames, and Signage / Marianna A. Perry -- 14.Glass and Windows / Marianna A. Perry --</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Note continued: 15.The Legalization of Marijuana and the Security Industry / Lawrence J. Fennelly -- 16.Designing Security and Working With Architects / Ron Hurley -- 17.Standards, Regulations, and Guidelines Compliance and Your Security Program, Including Global Resources / Roderick Draper -- 18.Information Technology Systems Infrastructure / Thomas Norman -- 19.Security Officers and Equipment Monitoring / Craig Mcquate -- 20.Video Technology Overview / Herman Kruegle -- 21.Understanding Layers of Protection Analysis / Mark Beaudry -- 22.Fire Development and Behavior / Inge Sebyan Black -- 23.Alarms Intrusion Detection Systems / Frank Davies.</subfield>
  </datafield>
  <datafield tag="506" ind1=" " ind2=" ">
   <subfield code="a">Lizenzbedingungen können den Zugang einschränken. License restrictions may limit access.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">Designed for easy reference, the Fourth Edition contains important coverage of environmental design, security surveys, locks, lighting, and CCTV as well as new chapters covering the latest in the ISO standards for Risk Assessment &amp; Risk Management, physical security planning, network systems infrastructure, and environmental design. This new edition continues to serve as a valuable reference for experienced security practitioners as well as students in undergraduate and graduate security programs&quot;--</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Burglary protection</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Crime prevention and architectural design</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Crime prevention</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="7">
   <subfield code="a">Burglary protection</subfield>
   <subfield code="0">(OCoLC)fst00841740</subfield>
   <subfield code="2">fast</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="7">
   <subfield code="a">Crime prevention</subfield>
   <subfield code="0">(OCoLC)fst00883055</subfield>
   <subfield code="2">fast</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="7">
   <subfield code="a">Crime prevention and architectural design</subfield>
   <subfield code="0">(OCoLC)fst00883091</subfield>
   <subfield code="2">fast</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Fennelly</subfield>
   <subfield code="D">Lawrence J.</subfield>
   <subfield code="d">1940-</subfield>
   <subfield code="e">compiler</subfield>
  </datafield>
  <datafield tag="730" ind1="0" ind2=" ">
   <subfield code="a">Handbook of loss prevention and crime prevention.</subfield>
   <subfield code="k">Selections.</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="u">https://www.sciencedirect.com/science/book/9780128044629</subfield>
   <subfield code="z">Uni Bern: Volltext</subfield>
  </datafield>
  <datafield tag="898" ind1=" " ind2=" ">
   <subfield code="a">BK020053</subfield>
   <subfield code="b">XK020053</subfield>
   <subfield code="c">XK020000</subfield>
  </datafield>
  <datafield tag="909" ind1=" " ind2="4">
   <subfield code="f">ScienceDirect eBooks</subfield>
  </datafield>
  <datafield tag="909" ind1=" " ind2="4">
   <subfield code="a">E-Books von 360MarcUpdates</subfield>
  </datafield>
  <datafield tag="949" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="F">B405</subfield>
   <subfield code="b">B405</subfield>
   <subfield code="c">405VT</subfield>
   <subfield code="x">NELB4051809</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="P">700</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Fennelly</subfield>
   <subfield code="D">Lawrence J.</subfield>
   <subfield code="d">1940-</subfield>
   <subfield code="e">compiler</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="P">730</subfield>
   <subfield code="E">--</subfield>
   <subfield code="a">Handbook of loss prevention and crime prevention</subfield>
   <subfield code="k">Selections</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">IDSBB</subfield>
   <subfield code="P">856</subfield>
   <subfield code="E">40</subfield>
   <subfield code="u">https://www.sciencedirect.com/science/book/9780128044629</subfield>
   <subfield code="z">Uni Bern: Volltext</subfield>
  </datafield>
  <datafield tag="986" ind1=" " ind2=" ">
   <subfield code="a">SWISSBIB</subfield>
   <subfield code="b">185506372</subfield>
  </datafield>
 </record>
</collection>
