{"id":21815,"date":"2025-11-04T13:53:21","date_gmt":"2025-11-04T11:53:21","guid":{"rendered":"https:\/\/skaitytaknyga.lt\/?post_type=product&#038;p=21815"},"modified":"2026-02-26T09:59:56","modified_gmt":"2026-02-26T07:59:56","slug":"readings-in-security-management","status":"publish","type":"product","link":"https:\/\/skaitytaknyga.lt\/en\/produktas\/readings-in-security-management\/","title":{"rendered":"Readings in Security Management"},"content":{"rendered":"<p>In many ways, security management is a new field. While the protection of assets goes back to time immemorial, the management approach of preventing and controlling losses is only a few generations old. As an academic concern, the field is newer still. Readings in Security Management serves the interest of both the thoughtful practitioner and students within the undergraduate and graduate security management programs. Earlier books on the topic have considered individual topics of risk mitigation. By contrast, this volume seeks to present an eclectic compilation of worthy readings on selective topics. The intention has been to select contributions that are relevant, authoritative, interesting, and clear. The selection of readings contained in this book has been shaped with the interests of business and management programs in mind, as well as programs based within traditional security management and criminal justice milieus. Topics covered include the legal aspect of security management, investigations, personnel, technical management, information protection, business intelligence, and more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In many ways, security management is a new field. While the protection of assets goes back to time immemorial, the management approach of preventing and controlling losses is only a few generations old. As an academic concern, the field is newer still. Readings in Security Management serves the interest of both the thoughtful practitioner and students within the undergraduate and graduate security management programs. Earlier books on the topic have considered individual topics of risk mitigation. By contrast, this volume seeks to present an eclectic compilation of worthy readings on selective topics. The intention has been to select contributions that are relevant, authoritative, interesting, and clear. The selection of readings contained in this book has been shaped with the interests of business and management programs in mind, as well as programs based within traditional security management and criminal justice milieus. Topics covered include the legal aspect of security management, investigations, personnel, technical management, information protection, business intelligence, and more.<\/p>\n","protected":false},"featured_media":21821,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"product_brand":[],"product_cat":[34],"product_tag":[],"class_list":{"0":"post-21815","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-knygos-anglu-kalba","7":"desktop-align-left","8":"tablet-align-left","9":"mobile-align-left","11":"first","12":"instock","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Readings in Security Management<\/title>\n<meta name=\"description\" content=\"In many ways, security management is a new field. While the protection of assets goes back to time immemorial, the management approach of preventing and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skaitytaknyga.lt\/en\/produktas\/readings-in-security-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:locale:alternate\" content=\"lt_LT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Readings in Security Management\" \/>\n<meta property=\"og:description\" content=\"In many ways, security management is a new field. While the protection of assets goes back to time immemorial, the management approach of preventing and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skaitytaknyga.lt\/en\/produktas\/readings-in-security-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Skaitytaknyga\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/skaitytaknyga\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-26T07:59:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skaitytaknyga.lt\/wp-content\/uploads\/2025\/11\/Readings-in-Security-Management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"321\" \/>\n\t<meta property=\"og:image:height\" content=\"466\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/\",\"url\":\"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/\",\"name\":\"Readings in Security Management\",\"isPartOf\":{\"@id\":\"https:\/\/skaitytaknyga.lt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/skaitytaknyga.lt\/wp-content\/uploads\/2025\/11\/Readings-in-Security-Management.jpg\",\"datePublished\":\"2025-11-04T11:53:21+00:00\",\"dateModified\":\"2026-02-26T07:59:56+00:00\",\"description\":\"In many ways, security management is a new field. While the protection of assets goes back to time immemorial, the management approach of preventing and\",\"breadcrumb\":{\"@id\":\"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/#primaryimage\",\"url\":\"https:\/\/skaitytaknyga.lt\/wp-content\/uploads\/2025\/11\/Readings-in-Security-Management.jpg\",\"contentUrl\":\"https:\/\/skaitytaknyga.lt\/wp-content\/uploads\/2025\/11\/Readings-in-Security-Management.jpg\",\"width\":321,\"height\":466},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/skaitytaknyga.lt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Parduotuv\u0117\",\"item\":\"https:\/\/skaitytaknyga.lt\/knygu-parduotuve\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Readings in Security Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/skaitytaknyga.lt\/#website\",\"url\":\"https:\/\/skaitytaknyga.lt\/\",\"name\":\"skaitytaknyga.lt\",\"description\":\"Skaitytaknyga.lt \u2013 tai ma\u017eas \u0161eimos verslas, kuris prasid\u0117jo nuo meil\u0117s knygoms ir siekio i\u0161gelb\u0117ti knygas nuo likimo prie konteinerio. Kas vienam nereikalingas daiktas \u2013 kitam lobis, o mes esame tarpininkai, kurie padeda abiems tapti laimingesniems ???? \u017dinome kaip nelengva i\u0161gyventi ma\u017eiems verslams, tad nuo \u0161iol, \u010dia rasite ir kit\u0173, ma\u017e\u0173 \u0161eim\u0173 versl\u0173, rank\u0173 darbo, dovan\u0173 sau ir artimiesiems.\",\"publisher\":{\"@id\":\"https:\/\/skaitytaknyga.lt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/skaitytaknyga.lt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/skaitytaknyga.lt\/#organization\",\"name\":\"skaitytaknyga.lt\",\"url\":\"https:\/\/skaitytaknyga.lt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/skaitytaknyga.lt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/skaitytaknyga.lt\/wp-content\/uploads\/2024\/05\/cropped-cropped-cropped-02_00843_jt3bggkj1j3HLc7SyY6rEUpg.jpeg\",\"contentUrl\":\"https:\/\/skaitytaknyga.lt\/wp-content\/uploads\/2024\/05\/cropped-cropped-cropped-02_00843_jt3bggkj1j3HLc7SyY6rEUpg.jpeg\",\"width\":1600,\"height\":1600,\"caption\":\"skaitytaknyga.lt\"},\"image\":{\"@id\":\"https:\/\/skaitytaknyga.lt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/skaitytaknyga\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Readings in Security Management","description":"In many ways, security management is a new field. While the protection of assets goes back to time immemorial, the management approach of preventing and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skaitytaknyga.lt\/en\/produktas\/readings-in-security-management\/","og_locale":"en_GB","og_type":"article","og_title":"[:lt]Readings in Security Management[:] - Skaitytaknyga","og_description":"In many ways, security management is a new field. While the protection of assets goes back to time immemorial, the management approach of preventing and","og_url":"https:\/\/skaitytaknyga.lt\/en\/produktas\/readings-in-security-management\/","og_site_name":"Skaitytaknyga","article_publisher":"https:\/\/www.facebook.com\/skaitytaknyga\/","article_modified_time":"2026-02-26T07:59:56+00:00","og_image":[{"width":321,"height":466,"url":"https:\/\/skaitytaknyga.lt\/wp-content\/uploads\/2025\/11\/Readings-in-Security-Management.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/","url":"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/","name":"Readings in Security Management","isPartOf":{"@id":"https:\/\/skaitytaknyga.lt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/#primaryimage"},"image":{"@id":"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/#primaryimage"},"thumbnailUrl":"https:\/\/skaitytaknyga.lt\/wp-content\/uploads\/2025\/11\/Readings-in-Security-Management.jpg","datePublished":"2025-11-04T11:53:21+00:00","dateModified":"2026-02-26T07:59:56+00:00","description":"In many ways, security management is a new field. While the protection of assets goes back to time immemorial, the management approach of preventing and","breadcrumb":{"@id":"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/#primaryimage","url":"https:\/\/skaitytaknyga.lt\/wp-content\/uploads\/2025\/11\/Readings-in-Security-Management.jpg","contentUrl":"https:\/\/skaitytaknyga.lt\/wp-content\/uploads\/2025\/11\/Readings-in-Security-Management.jpg","width":321,"height":466},{"@type":"BreadcrumbList","@id":"https:\/\/skaitytaknyga.lt\/produktas\/readings-in-security-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/skaitytaknyga.lt\/"},{"@type":"ListItem","position":2,"name":"Parduotuv\u0117","item":"https:\/\/skaitytaknyga.lt\/knygu-parduotuve\/"},{"@type":"ListItem","position":3,"name":"Readings in Security Management"}]},{"@type":"WebSite","@id":"https:\/\/skaitytaknyga.lt\/#website","url":"https:\/\/skaitytaknyga.lt\/","name":"skaitytaknyga.lt","description":"Skaitytaknyga.lt \u2013 tai ma\u017eas \u0161eimos verslas, kuris prasid\u0117jo nuo meil\u0117s knygoms ir siekio i\u0161gelb\u0117ti knygas nuo likimo prie konteinerio. Kas vienam nereikalingas daiktas \u2013 kitam lobis, o mes esame tarpininkai, kurie padeda abiems tapti laimingesniems ???? \u017dinome kaip nelengva i\u0161gyventi ma\u017eiems verslams, tad nuo \u0161iol, \u010dia rasite ir kit\u0173, ma\u017e\u0173 \u0161eim\u0173 versl\u0173, rank\u0173 darbo, dovan\u0173 sau ir artimiesiems.","publisher":{"@id":"https:\/\/skaitytaknyga.lt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skaitytaknyga.lt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/skaitytaknyga.lt\/#organization","name":"skaitytaknyga.lt","url":"https:\/\/skaitytaknyga.lt\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/skaitytaknyga.lt\/#\/schema\/logo\/image\/","url":"https:\/\/skaitytaknyga.lt\/wp-content\/uploads\/2024\/05\/cropped-cropped-cropped-02_00843_jt3bggkj1j3HLc7SyY6rEUpg.jpeg","contentUrl":"https:\/\/skaitytaknyga.lt\/wp-content\/uploads\/2024\/05\/cropped-cropped-cropped-02_00843_jt3bggkj1j3HLc7SyY6rEUpg.jpeg","width":1600,"height":1600,"caption":"skaitytaknyga.lt"},"image":{"@id":"https:\/\/skaitytaknyga.lt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/skaitytaknyga\/"]}]}},"_links":{"self":[{"href":"https:\/\/skaitytaknyga.lt\/en\/wp-json\/wp\/v2\/product\/21815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skaitytaknyga.lt\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/skaitytaknyga.lt\/en\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/skaitytaknyga.lt\/en\/wp-json\/wp\/v2\/comments?post=21815"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/skaitytaknyga.lt\/en\/wp-json\/wp\/v2\/media\/21821"}],"wp:attachment":[{"href":"https:\/\/skaitytaknyga.lt\/en\/wp-json\/wp\/v2\/media?parent=21815"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/skaitytaknyga.lt\/en\/wp-json\/wp\/v2\/product_brand?post=21815"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/skaitytaknyga.lt\/en\/wp-json\/wp\/v2\/product_cat?post=21815"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/skaitytaknyga.lt\/en\/wp-json\/wp\/v2\/product_tag?post=21815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}