Casino Security and Gaming Surveillance 1st Edition by Derk J Boss, Alan W Zajic – Ebook PDF Instant Download/Delivery: 1420087827, 9781420087826
Full download Casino Security and Gaming Surveillance 1st Edition after payment

Product details:
ISBN 10: 1420087827
ISBN 13: 9781420087826
Author: Derk J Boss, Alan W Zajic
Casino Security and Gaming Surveillance 1st Table of contents:
Section I: Surveillance in Gaming Operations
1. Camera Operational Techniques
1.1 Surveillance Patrol
1.2 IOU Patrol
1.2.1 Case History
1.3 Tri-Shot Coverage
1.3.1 Case History
1.3.2 Case History
1.4 Surveillance Audits
1.4.1 Case History
1.5 Surveillance Close Watches
1.5.1 Tips for Successful Close Watches
1.6 Proactive or Reactive?
1.7 Covert Cameras
1.7.1 Case History
2. Game Protection
2.1 Surveillance Skills
2.1.1 Best Practice #1
2.1.2 Best Practice #2
2.1.3 Best Practice #3
2.1.4 Computer Technology
2.1.5 Case History
2.2 Game Protection
2.3 Tells
2.3.1 Case History
2.3.2 Summation
2.3.3 Case History
2.4 Basic Strategy
2.5 Card Counting
2.6 Money Management
2.7 Critical Index
2.8 Evaluating Players
2.8.1 Case History
2.8.2 Threat Level
2.9 Suspicious Activity, Advantage Play, and Cheating at Gaming
2.9.1 Putting It All Together
2.9.2 Case History
Reference
3. Internal Theft and Fraud
3.1 What Is Internal Theft and Fraud?
3.2 Why Is Internal Theft and Fraud So Costly?
3.3 Why Do Employees Steal?
3.3.1 Case History
3.4 Detecting Internal Theft and Fraud
3.4.1 Identifying Critical Areas and Key Transactions
3.4.2 Exception Reports
3.4.3 Statistical Information
3.5 Loss Prevention Programs
3.5.1 Prescreening Techniques
3.5.2 Basic Prescreening Program Components
3.6 Threat and Risk Assessment
3.6.1 Identify Your Vulnerabilities, Risks, and Threats
3.6.2 Case History
3.6.3 Threat Analysis for Surveillance Directors
3.6.4 Protection Plan and Strategies
3.6.5 Apply Countermeasures
3.6.6 Monitor and Investigate Exceptions
3.6.7 Obtaining Buy-In from Top Management and Program Partners
3.6.8 Determine Program Objectives
3.6.9 Case History
3.6.10 Train Program Participants to Operate Program
3.6.11 Perform Daily Analytics
3.6.12 Implement Program
3.6.13 Monitor Program
3.6.14 Evaluate Program Results
3.7 Key Departments to Monitor for Internal Theft and Fraud
3.7.1 Case History: Theft in Players’ Clubs
3.7.1.1 Computer Access Security
3.7.1.2 Computer Security Controls: Breached
3.7.1.3 Exception Reports: Ignored
3.7.1.4 Players’ Club Protection: Failed
3.8 Protection Strategies and Best Practices for Promotions
3.8.1 Best Practice #1: Review Marketing Programs and Promotions
3.8.2 Best Practice #2: Monitor Marketing Programs and Promotions
3.8.3 Best Practice #3: Review Exception Reports
3.8.4 Best Practice #4: Train Your Personnel to Recognize and Report Suspicious Activity
3.8.5 Conclusion
3.9 Loss Prevention at the Point of Sale
3.9.1 Important First Steps
3.9.2 Deterring and Detecting Employee Theft and Fraud
3.10 Summary
4. Security Surveillance
4.1 The Evolution of Security Surveillance
4.2 Tips for Successful Security Surveillance Operation
4.2.1 Case History
5. Standard Operating Procedures
5.1 Surveillance Department Operational Policies and Procedures
5.1.1 Standard Operating Procedures
5.2 Key Surveillance Policies and Procedures
5.3 Key Surveillance Functions
5.3.1 Audits
5.3.2 Officer Training
5.3.3 Summary
5.4 Appendix
5.4.1 Mission Statement
5.4.2 Key Objectives
5.4.3 Investigator Code of Ethics
5.4.4 Function of Surveillance Department
5.4.5 Authority Specific to Surveillance
5.4.6 Surveillance Chain of Command
5.4.7 Surveillance Monitor Room Access
5.4.8 Surveillance Daily Operations
5.4.9 Surveillance Tri-Shot Coverage
5.4.10 Evaluation and Coverage of High Action Games
5.4.11 Advantage Play
5.4.12 Response to Criminal Activity
5.4.13 Reporting Violations of Policy or Procedure
5.4.14 Close Watch and Audit Operations
5.4.15 Required Incident Reports
5.4.16 Writing Incident Reports
References
6. Investigations
6.1 Fundamental Investigative Techniques
6.1.1 Case History
6.2 Interviewing Suspects and Witnesses
6.3 Evidence Gathering and Handling
7. Surveillance Training and Education
7.1 Surveillance Training and Education Program
7.2 Program Setup
7.2.1 Trainee to Level I/Investigator I
7.2.2 Level II/Investigator II
7.2.3 Level III/Investigator III
7.2.3.1 Compensation and Rewards
7.2.3.2 Program Benefits
8. Statistical Information and Analysis
8.1 Table Games
8.1.1 Case History
8.2 Slots
8.2.1 Case History
8.3 Key Daily Reports
8.4 Key Business Indicators (KBIs)
9. Surveillance in the Future
Section II: Physical Security in Gaming Operations
10. The Gaming Security Officer’s Role
10.1 Operational Separation from Surveillance and Reasons
10.2 Proactive Presence
10.3 Public Relations and Security
10.4 Uniforms and Appearance
11. Security Patrols and Assignments in the Gaming Environment
11.1 The Function of Patrols and Assignments
11.2 Identification Checks as a Constant
11.3 Stationary Assignments
People also search for Casino Security and Gaming Surveillance 1st:
casino surveillance salary
casino surveillance job description
casino security systems
casino surveillance systems
casino surveillance cameras
Tags: Derk J Boss, Alan W Zajic, Casino Security, Gaming Surveillance


