Strategic security management : a risk assessment guide for decision makers /
Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fres...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam ; Boston :
Butterworth-Heinemann,
©2007.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBSCO_ocn714802818 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 110426s2007 ne a ob 001 0 eng d | ||
010 | |a 2006287918 | ||
040 | |a N$T |b eng |e pn |c N$T |d E7B |d ZCU |d OCLCQ |d OPELS |d OCLCO |d DKDLA |d UMI |d OCLCO |d DEBSZ |d NLGGC |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d AZK |d OCLCO |d JBG |d COCUF |d STF |d MOR |d PIFAG |d OCLCQ |d OCLCF |d WRM |d OCLCQ |d VTS |d CEF |d NRAMU |d VT2 |d OCLCQ |d WYU |d OL$ |d VLY |d OCLCQ |d OCLCO |d UKCRE |d OCLCO |d OCLCQ |d OCLCO | ||
019 | |a 162573806 |a 488135168 |a 507575200 |a 647626709 |a 712974440 |a 842846310 |a 856952127 |a 961623630 |a 962638696 |a 974152788 |a 984821060 |a 988464798 |a 992031476 |a 1037728150 |a 1038636247 |a 1039680907 |a 1043017026 |a 1045527197 |a 1064165843 |a 1081294148 |a 1100566157 |a 1153051820 |a 1162548388 | ||
020 | |a 9780080465968 |q (electronic bk.) | ||
020 | |a 008046596X |q (electronic bk.) | ||
020 | |a 1280707674 | ||
020 | |a 9781280707674 | ||
020 | |a 9786610707676 | ||
020 | |a 6610707677 | ||
020 | |z 9780123708977 | ||
020 | |z 0123708974 | ||
029 | 1 | |a AU@ |b 000051559432 | |
029 | 1 | |a AU@ |b 000051859874 | |
029 | 1 | |a CHBIS |b 005827924 | |
029 | 1 | |a CHNEW |b 001010101 | |
029 | 1 | |a CHVBK |b 168377195 | |
029 | 1 | |a CHVBK |b 51925032X | |
029 | 1 | |a DEBBG |b BV039828900 | |
029 | 1 | |a DEBBG |b BV041121301 | |
029 | 1 | |a DEBBG |b BV042314252 | |
029 | 1 | |a DEBBG |b BV043044426 | |
029 | 1 | |a DEBSZ |b 396761968 | |
029 | 1 | |a DEBSZ |b 405308078 | |
029 | 1 | |a DEBSZ |b 422229202 | |
029 | 1 | |a GBVCP |b 560503423 | |
029 | 1 | |a NZ1 |b 11778488 | |
029 | 1 | |a NZ1 |b 14540036 | |
035 | |a (OCoLC)714802818 |z (OCoLC)162573806 |z (OCoLC)488135168 |z (OCoLC)507575200 |z (OCoLC)647626709 |z (OCoLC)712974440 |z (OCoLC)842846310 |z (OCoLC)856952127 |z (OCoLC)961623630 |z (OCoLC)962638696 |z (OCoLC)974152788 |z (OCoLC)984821060 |z (OCoLC)988464798 |z (OCoLC)992031476 |z (OCoLC)1037728150 |z (OCoLC)1038636247 |z (OCoLC)1039680907 |z (OCoLC)1043017026 |z (OCoLC)1045527197 |z (OCoLC)1064165843 |z (OCoLC)1081294148 |z (OCoLC)1100566157 |z (OCoLC)1153051820 |z (OCoLC)1162548388 | ||
037 | |a 134298:134426 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a HD61.5 |b .V45 2007eb | |
072 | 7 | |a BUS |x 097000 |2 bisacsh | |
072 | 7 | |a BUS |x 104000 |2 bisacsh | |
072 | 7 | |a BUS |x 071000 |2 bisacsh | |
072 | 7 | |a BUS |x 103000 |2 bisacsh | |
082 | 0 | 4 | |a 658.4/78 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Vellani, Karim H., |d 1971- | |
245 | 1 | 0 | |a Strategic security management : |b a risk assessment guide for decision makers / |c Karim H. Vellani. |
260 | |a Amsterdam ; |a Boston : |b Butterworth-Heinemann, |c ©2007. | ||
300 | |a 1 online resource (xxi, 389 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references (pages 357-373) and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Chapter 1: Data Driven Security -- Chapter 2: Asset Identification and Security Inventory -- Chapter 3: Threat Assessments -- Chapter 4: Crime Analysis -- Chapter 5: Vulnerability Assessment -- Chapter 6: Risk Assessment -- Chapter 7: Information Technology Risk Management -- Chapter 8: Prevention -- Chapter 9: Security Measures: Polices & Procedures -- Chapter 10: Security Measures: Physical Security -- Chapter 11: Security Measures: Deploying Physical Security Measures -- Chapter 12: Security Measures: Personnel -- Chapter 13: Project Management -- Chapter 14: Premises Security Liability -- Chapter 15: Forensic Security -- Chapter 16: Ethics in Security -- Appendix A: Certified Security Consultants (CSC) Code of Ethics -- Appendix B: International Association of Professional Security Consultants Forensic Methodology -- Appendix C: Sample Risk Assessment Report -- Appendix D: Crime Analysis Reports. | |
520 | |a Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organizations assets, giving decision makers the foundation needed to climb the next step up the corporate ladder. Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures. Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald. * Provides clear direction on how to meet new business demands on the security professional * Guides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the program * Covers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each. | ||
546 | |a English. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
650 | 0 | |a Industries |x Security measures |x Management. | |
650 | 0 | |a Risk assessment. | |
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Management information systems |x Security measures. | |
650 | 2 | |a Risk Assessment | |
650 | 6 | |a Industrie |x Sécurité |x Mesures |x Gestion. | |
650 | 6 | |a Évaluation du risque. | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Systèmes d'information de gestion |x Sécurité |x Mesures. | |
650 | 7 | |a risk assessment. |2 aat | |
650 | 7 | |a BUSINESS & ECONOMICS |x Workplace Culture. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Corporate Governance. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Leadership. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Development. |2 bisacsh | |
650 | 7 | |a Industries |x Security measures |x Management |2 fast | |
650 | 7 | |a Information technology |x Security measures |2 fast | |
650 | 7 | |a Risk assessment |2 fast | |
776 | 0 | 8 | |i Print version: |a Vellani, Karim H., 1971- |t Strategic security management. |d Amsterdam ; Boston : Butterworth-Heinemann, ©2007 |z 9780123708977 |w (DLC) 2006287918 |w (OCoLC)78994754 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9780123708977/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=182187 |z Texto completo |
938 | |a ebrary |b EBRY |n ebr10151443 | ||
938 | |a EBSCOhost |b EBSC |n 182187 | ||
994 | |a 92 |b IZTAP |