|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn885019721 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
140801s2014 enk o 000 0 eng d |
010 |
|
|
|a 2014021032
|
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d YDXCP
|d OPELS
|d E7B
|d UMI
|d DEBSZ
|d GGVRL
|d UKMGB
|d B24X7
|d COO
|d OCLCF
|d OCLCQ
|d LIV
|d OCLCQ
|d U3W
|d D6H
|d OTZ
|d AUD
|d LQU
|d ABC
|d VT2
|d OCLCO
|d LVT
|d OCLCO
|d OCLCQ
|d OCLCO
|
016 |
7 |
|
|a 016887253
|2 Uk
|
016 |
7 |
|
|a 016887253
|
019 |
|
|
|a 888415344
|a 1105180252
|a 1105573710
|a 1192339111
|a 1235830745
|a 1240532622
|a 1262674430
|a 1302274342
|
020 |
|
|
|a 1306992869
|q (ebk)
|
020 |
|
|
|a 9781306992862
|q (ebk)
|
020 |
|
|
|a 9780128009178
|
020 |
|
|
|a 0128009179
|
020 |
|
|
|z 9780128002216
|
020 |
|
|
|a 0128002212
|
020 |
|
|
|a 9780128002216
|
029 |
1 |
|
|a CHBIS
|b 010295355
|
029 |
1 |
|
|a CHVBK
|b 32777665X
|
029 |
1 |
|
|a DEBBG
|b BV042300079
|
029 |
1 |
|
|a DEBBG
|b BV042989851
|
029 |
1 |
|
|a DEBSZ
|b 414277309
|
029 |
1 |
|
|a DEBSZ
|b 475027914
|
029 |
1 |
|
|a CHNEW
|b 001012360
|
029 |
1 |
|
|a AU@
|b 000066232589
|
035 |
|
|
|a (OCoLC)885019721
|z (OCoLC)888415344
|z (OCoLC)1105180252
|z (OCoLC)1105573710
|z (OCoLC)1192339111
|z (OCoLC)1235830745
|z (OCoLC)1240532622
|z (OCoLC)1262674430
|z (OCoLC)1302274342
|
037 |
|
|
|a 630537
|b MIL
|
050 |
|
4 |
|a HV7431
|b .W465 2014
|
082 |
0 |
4 |
|a 658.4/73
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a White, John M.
|c (Security professional)
|
245 |
1 |
0 |
|a Security risk assessment :
|b managing physical and operational security /
|c John M. White.
|
260 |
|
|
|a Oxford :
|b Butterworth-Heinemann,
|c ©2014.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Chapter 1. Introduction to security risk assessments -- chapter 2. Preassessment planning -- chapter 3. Project management -- chapter 4. Defining the project scope -- chapter 5. Information gathering -- chapter 6. Physical security assessment -- chapter 7. Security department operations -- chapter 8. Security training -- chapter 9. Workplace violence risks and vulnerabilities -- chapter 10. Financial assessment -- chapter 11. Security technology assessment -- chapter 12. Access control -- chapter 13. Legal considerations and prevention strategies -- chapter 14. Contracted services -- chapter 15. The security risk assessment report -- chapter 16. Conclusion.
|
520 |
|
|
|a Offers security professionals step-by-step guidance for conducting a complete risk assessment using the most current approaches, theories, and best practices.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Crime prevention.
|
650 |
|
0 |
|a Security systems.
|
650 |
|
6 |
|a Systèmes de sécurité.
|
650 |
|
7 |
|a security systems.
|2 aat
|
650 |
|
7 |
|a Crime prevention
|2 fast
|
650 |
|
7 |
|a Security systems
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 9781306992862
|
776 |
0 |
8 |
|i Print version:
|a White, John M. (Security professional).
|t Security risk assessment
|z 9780128002216
|w (DLC) 2014021032
|w (OCoLC)879582331
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128002216/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00070002
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10899172
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL8QPI
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis28704979
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12001957
|
994 |
|
|
|a 92
|b IZTAP
|