November 2004
Security: Solutions for Enterprise Security Leaders;Nov2004, Vol. 41 Issue 11, p91
Trade Publication
The article presents a list of companies providing end user services. Some of the services are management training security, publications related to security and safety, technical training on security and safety, investigative services, and online purchasing. Some of the companies and firms providing these services are Amercas' Security Exposition, International Loss Prevention Systems, World Institute for Security Enhancement, Acta Investigations Inc., PRC Security investigations, Diamond Detective Agency Inc., and Jack L Hayes International Inc.


Related Articles

  • Translating CPTED into Crime Preventive Action: A Critical Examination of CPTED as a Tool for Active Guardianship. Reynald, Danielle M. // European Journal on Criminal Policy & Research;2011, Vol. 17 Issue 1, p69 

    This paper will argue that the effectiveness of CPTED ought to be judged in terms of the extent to which it is successful in facilitating opportunities for active guardianship of places. With this premise in mind, the CPTED component of surveillance will provide the focal point of investigation....

  • What Do Your Workers Really Think About Safety? Pirtle, Bobby // EHS Today;May2009, Vol. 2 Issue 5, p22 

    The article discusses topics related to the safety perception survey in the U.S. It offers a definition of the survey, which is a research tool that provides an honest appraisal of the attitude of the workers about the safety and safety culture of the company. Further tips and guidance in...

  • Standards needs to be set to ensure quality of coaching. Downey, Myles // Personnel Today;5/21/2002, p16 

    Focuses on the proliferation of agencies offering coaching services to executives. Role of executives in the workplace; Increase of productivity; Backgrounds of people offering executive coaching.

  • BAJA STEPS UP SECURITY FOR 500.  // DIRTSports;Jun2008, Issue 42, p14 

    The article reports on the move of the State of Baja California, Mexico, to overhaul its security measures. According to the author, the initiative aims to address and eliminate theft, robbery and extortion incidents as well as protect the welfare of its tourists and visitors. In addition, the...

  • First Responders Want Better Communications.  // Security: Solutions for Enterprise Security Leaders;Mar2008, Vol. 45 Issue 3, p98 

    The article offers information about a survey concerning how public safety organizations in the U.S. use current communications technology, as well as what future capabilities they would deploy. It is stated that the survey reveals a strong demand for technology solutions that provide advanced...

  • Hard lessons. David, Stephen // India Today;8/10/2009, p9 

    The article reports on the clearance received by the Bangalore, India Police to conduct high-tech security checks for people accompanying politicians to the Vidhana Soudha. The unit will be using high-tech equipment like pop-up tyre deflaters, automatic boom barricades and vehicle scanner...

  • It happened. Now investigate the accident. Berke, Lanny // Machine Design;7/24/2008, Vol. 80 Issue 14, p52 

    The article presents various ways that need to be considered in conducting accident investigation in the workplace. These include ensuring that injured people in the incident are given emergency care, identifying the people involved in the incident as well as witnesses, and keeping right records...

  • Summary.  // URVIO - Revista Latinoamericana de Seguridad Ciudadana;ene2009, Issue 6, p15 

    This section presents abstracts of various studies related to safety and crime including the governance of safety in Europe, local government and crime prevention in Argentina, and the local governance of public security in France.

  • Bridging the Security Knowledge Gap. Cipra, Cory // Transmission & Distribution World;Mar2004 Supplement, Vol. 56, p36 

    The article presents information on security measures taken by organizations to ensure the safety of their critical assets. Securing infrastructure requires leadership and a well integrated approach. The challenge is finding a cooperative way in which to build a security program that encompasses...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics