Cargando…

Strategic security management : a risk assessment guide for decision makers /

Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fres...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Vellani, Karim H., 1971-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Butterworth-Heinemann, ©2007.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn714802818
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 110426s2007 ne a ob 001 0 eng d
010 |a  2006287918 
040 |a N$T  |b eng  |e pn  |c N$T  |d E7B  |d ZCU  |d OCLCQ  |d OPELS  |d OCLCO  |d DKDLA  |d UMI  |d OCLCO  |d DEBSZ  |d NLGGC  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d AZK  |d OCLCO  |d JBG  |d COCUF  |d STF  |d MOR  |d PIFAG  |d OCLCQ  |d OCLCF  |d WRM  |d OCLCQ  |d VTS  |d CEF  |d NRAMU  |d VT2  |d OCLCQ  |d WYU  |d OL$  |d VLY  |d OCLCQ  |d OCLCO  |d UKCRE  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 162573806  |a 488135168  |a 507575200  |a 647626709  |a 712974440  |a 842846310  |a 856952127  |a 961623630  |a 962638696  |a 974152788  |a 984821060  |a 988464798  |a 992031476  |a 1037728150  |a 1038636247  |a 1039680907  |a 1043017026  |a 1045527197  |a 1064165843  |a 1081294148  |a 1100566157  |a 1153051820  |a 1162548388 
020 |a 9780080465968  |q (electronic bk.) 
020 |a 008046596X  |q (electronic bk.) 
020 |a 1280707674 
020 |a 9781280707674 
020 |a 9786610707676 
020 |a 6610707677 
020 |z 9780123708977 
020 |z 0123708974 
029 1 |a AU@  |b 000051559432 
029 1 |a AU@  |b 000051859874 
029 1 |a CHBIS  |b 005827924 
029 1 |a CHNEW  |b 001010101 
029 1 |a CHVBK  |b 168377195 
029 1 |a CHVBK  |b 51925032X 
029 1 |a DEBBG  |b BV039828900 
029 1 |a DEBBG  |b BV041121301 
029 1 |a DEBBG  |b BV042314252 
029 1 |a DEBBG  |b BV043044426 
029 1 |a DEBSZ  |b 396761968 
029 1 |a DEBSZ  |b 405308078 
029 1 |a DEBSZ  |b 422229202 
029 1 |a GBVCP  |b 560503423 
029 1 |a NZ1  |b 11778488 
029 1 |a NZ1  |b 14540036 
035 |a (OCoLC)714802818  |z (OCoLC)162573806  |z (OCoLC)488135168  |z (OCoLC)507575200  |z (OCoLC)647626709  |z (OCoLC)712974440  |z (OCoLC)842846310  |z (OCoLC)856952127  |z (OCoLC)961623630  |z (OCoLC)962638696  |z (OCoLC)974152788  |z (OCoLC)984821060  |z (OCoLC)988464798  |z (OCoLC)992031476  |z (OCoLC)1037728150  |z (OCoLC)1038636247  |z (OCoLC)1039680907  |z (OCoLC)1043017026  |z (OCoLC)1045527197  |z (OCoLC)1064165843  |z (OCoLC)1081294148  |z (OCoLC)1100566157  |z (OCoLC)1153051820  |z (OCoLC)1162548388 
037 |a 134298:134426  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a HD61.5  |b .V45 2007eb 
072 7 |a BUS  |x 097000  |2 bisacsh 
072 7 |a BUS  |x 104000  |2 bisacsh 
072 7 |a BUS  |x 071000  |2 bisacsh 
072 7 |a BUS  |x 103000  |2 bisacsh 
082 0 4 |a 658.4/78  |2 22 
049 |a UAMI 
100 1 |a Vellani, Karim H.,  |d 1971- 
245 1 0 |a Strategic security management :  |b a risk assessment guide for decision makers /  |c Karim H. Vellani. 
260 |a Amsterdam ;  |a Boston :  |b Butterworth-Heinemann,  |c ©2007. 
300 |a 1 online resource (xxi, 389 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references (pages 357-373) and index. 
588 0 |a Print version record. 
505 0 |a Chapter 1: Data Driven Security -- Chapter 2: Asset Identification and Security Inventory -- Chapter 3: Threat Assessments -- Chapter 4: Crime Analysis -- Chapter 5: Vulnerability Assessment -- Chapter 6: Risk Assessment -- Chapter 7: Information Technology Risk Management -- Chapter 8: Prevention -- Chapter 9: Security Measures: Polices & Procedures -- Chapter 10: Security Measures: Physical Security -- Chapter 11: Security Measures: Deploying Physical Security Measures -- Chapter 12: Security Measures: Personnel -- Chapter 13: Project Management -- Chapter 14: Premises Security Liability -- Chapter 15: Forensic Security -- Chapter 16: Ethics in Security -- Appendix A: Certified Security Consultants (CSC) Code of Ethics -- Appendix B: International Association of Professional Security Consultants Forensic Methodology -- Appendix C: Sample Risk Assessment Report -- Appendix D: Crime Analysis Reports. 
520 |a Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organizations assets, giving decision makers the foundation needed to climb the next step up the corporate ladder. Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures. Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald. * Provides clear direction on how to meet new business demands on the security professional * Guides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the program * Covers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Industries  |x Security measures  |x Management. 
650 0 |a Risk assessment. 
650 0 |a Information technology  |x Security measures. 
650 0 |a Management information systems  |x Security measures. 
650 2 |a Risk Assessment 
650 6 |a Industrie  |x Sécurité  |x Mesures  |x Gestion. 
650 6 |a Évaluation du risque. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Systèmes d'information de gestion  |x Sécurité  |x Mesures. 
650 7 |a risk assessment.  |2 aat 
650 7 |a BUSINESS & ECONOMICS  |x Workplace Culture.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Corporate Governance.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Leadership.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Development.  |2 bisacsh 
650 7 |a Industries  |x Security measures  |x Management  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
650 7 |a Risk assessment  |2 fast 
776 0 8 |i Print version:  |a Vellani, Karim H., 1971-  |t Strategic security management.  |d Amsterdam ; Boston : Butterworth-Heinemann, ©2007  |z 9780123708977  |w (DLC) 2006287918  |w (OCoLC)78994754 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780123708977/?ar  |z Texto completo 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=182187  |z Texto completo 
938 |a ebrary  |b EBRY  |n ebr10151443 
938 |a EBSCOhost  |b EBSC  |n 182187 
994 |a 92  |b IZTAP