Skip to main content
Skip header

Theory and technology of the company

Summary

The student is acquainted with security technologies of typing and profiling of potential offenders, including identification and verification of persons (biometrics, RFID and others). The course also includes the possibilities and technologies of detection of CBRNE substances in the organization with a focus on civil aviation and the application of forensic science (forensic technology, methodology and tactics) in the protection of the organization.

Literature

FAY, J., PATERSON, D. Contemporary Security Management. Oxford, 2018. ISBN 978-0-12-809281-1 
PALMITE, A. R.: Securities Regulation: Examples & Explanations, Aspen Publ, 2017, ISBN13 (EAN): 978-14-5488-130-8.
KLOPFER, F.; Nelleke, A. (Eds): Private Security in Practice, DCAF, Geneva 2016.
BHUSHAM, N. I., KANWAL, R. Strategic Decision Making: Applying the Analytic Heirarchy Process. Londýn: Springer – Verlag, 2004. 200 s. ISBN 1-8523375-6-7 
SENNEWALD, Ch., BAILLIE, C. Effective Security Management. Oxford: 2016. ISBN 978-0-12-802774-5 .

Advised literature

Security Consulting, Fourth Edition by Charles A. Sennewald CPP, Butterworth-Heinemann, 2012, ISBN 978-0123-985-002 .
GRAMA, J.L.: Legal Issues in Information Security. Jones & Bartlett Learning. ISBN 978-12-8415-104-6 .
GARCIA, M.L. The Design and Evaluation of Physical Protection Systems. USA : Elsevier. 2008. ISBN 978-0-7506-8352-4.
Ethics at work. Boston: Harvard Business School Press, c1991. Harvard business review paperback. ISBN 0-87584-286-0.


Language of instruction čeština, angličtina, čeština, angličtina
Code 060-0927
Abbreviation TTOPN
Course title Theory and technology of the company
Coordinating department Department of Security Services
Course coordinator doc. Mgr. Ing. Radomír Ščurek, Ph.D.