Cargando…

Risk Analysis and the Security Survey.

As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth E...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Broder, James F.
Otros Autores: Tucker, Gene
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington : Elsevier Science, 2011.
Edición:4th ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn769344345
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 121124s2011 vtu o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d MHW  |d YDXCP  |d DEBSZ  |d OCLCQ  |d ZCU  |d MERUC  |d ICG  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 770874088 
020 |a 9780123822345 
020 |a 0123822343 
029 1 |a AU@  |b 000052892763 
029 1 |a DEBBG  |b BV044160599 
029 1 |a DEBSZ  |b 431080402 
029 1 |a DKDLA  |b 820120-katalog:999918656105765 
035 |a (OCoLC)769344345  |z (OCoLC)770874088 
050 4 |a HV8290 
082 0 4 |a 658.47 
049 |a UAMI 
100 1 |a Broder, James F. 
245 1 0 |a Risk Analysis and the Security Survey. 
250 |a 4th ed. 
260 |a Burlington :  |b Elsevier Science,  |c 2011. 
300 |a 1 online resource (369 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Front Cover; Risk Analysis and the Security Survey; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; 1. The Treatment and Analysis of Risk; 1. Risk; What Is Risk?; What Is Risk Analysis?; Risk Assessment; What Can Risk Analysis Do for Management?; Role of Management in Risk Analysis; Risk Exposure Assessment; 2. Vulnerability and Threat Identification; Risk Identification; Examples of the Problems of Identification; Security Checklist; I. Policy and Program; II. Organization; III. Control of Entry and Movement; IV. Barriers (Fences, Gates, Walls, etc.). 
505 8 |a V. LightingVI. Locks and Keys; VII. Alarms; VIII. Communications; IX. Property Control (Equipment, Material, Tools, Personal Property); X. Emergency Planning; XI. Personnel Screening; XII. Comments; 3. Risk Measurement; Cost Valuation and Frequency of Occurrence; Principles of Probability; Probability, Risk, and Security; Estimating Frequency of Occurrence; 4. Quantifying and Prioritizing Loss Potential; Assessing Criticality or Severity; The Decision Matrix; 5. Cost/Benefit Analysis; System Design Engineering; Cost; Reliability; Delay; Building Redundancy into the System. 
505 8 |a A Security Countermeasure6. Other Risk Analysis Methodologies; National Infrastructure Protection Plan; Set Goals and Objectives; Identify Assets, Systems, Networks, and Functions; Assess Risk Based on Consequences, Vulnerabilities, and Threats; Core Criteria; Consequence; Vulnerability; Threat; Establish Priorities Based on Risk Assessments; Implement Protection Programs and Resiliency Strategies; Measure Effectiveness; Review; 7. The Security Survey: An Overview; Why Are Security Surveys Needed?; Who Needs Security Surveys?; Attitude of Business Toward Security. 
505 8 |a What Can a Security Survey Accomplish?Why the Need for a Security Professional?; How Do You Sell Security?; 8. Management Audit Techniques and the Preliminary Survey; Audit Guide and Procedures; Audit: Aids to Surveys; Fieldwork; Observing; Questioning; Analyzing; Verifying; Investigating; Evaluating; The Preliminary Survey; Definition and Purpose; The Initial Interview; Obtaining Information; What Information to Obtain; Sources of Information; Physical Observation; Flowcharting; Summary; 9. The Survey Report; "I Must Write, Therefore I Shall"; Five Criteria of Good Reporting; Accuracy. 
505 8 |a ClarityConciseness; Timeliness; Slant or Pitch; Format; Cover Letter; Body of the Report; Title; Introduction or Foreword; Purpose; Scope; Findings; Statement of Opinion (Conclusions); Summary; 10. Crime Prediction; Analysis of Internal Crime; Analysis of External Crime; Inadequate Security; How to Establish Notice; Review; 11. Determining Insurance Requirements; Risk Management Defined; Risk Control; Crime Insurance; K & R (Kidnap and Ransom) Coverage; 2. Emergency Management and Business Continuity Planning; 12. Emergency Management -- A Brief Introduction; Comprehensive Emergency Management. 
500 |a Standards. 
520 |a As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of Risk Analysis and the Security Survey. Broder and Tucker guide you through analysis to implementation to provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updatin. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Industries  |x Security measures. 
650 0 |a Risk management. 
650 0 |a Crime prevention surveys. 
650 0 |a Assistance in emergencies  |x Planning. 
650 6 |a Industrie  |x Sécurité  |x Mesures. 
650 6 |a Gestion du risque. 
650 6 |a Secours d'urgence  |x Planification. 
650 7 |a risk management.  |2 aat 
650 7 |a Assistance in emergencies  |x Planning  |2 fast 
650 7 |a Crime prevention surveys  |2 fast 
650 7 |a Industries  |x Security measures  |2 fast 
650 7 |a Risk management  |2 fast 
700 1 |a Tucker, Gene. 
758 |i has work:  |a Risk analysis and the security survey (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGxDqpQwfBBWYhHh9p9ggC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Broder, James F.  |t Risk Analysis and the Security Survey.  |d Burlington : Elsevier Science, ©2011  |z 9780123822338 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=829965  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL829965 
938 |a YBP Library Services  |b YANK  |n 7305627 
994 |a 92  |b IZTAP