Cargando…

Security for business professionals : how to plan, implement, and manage your company's security program /

Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an existing security program. Th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wayland, Bradley A.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Butterworth-Heinemann, ©2014.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn892969610
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 141015s2014 maua ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d EBLCP  |d E7B  |d S4S  |d DEBSZ  |d OCLCQ  |d OCLCF  |d COD  |d OCLCQ  |d MERUC  |d OCLCQ  |d AU@  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 887508641  |a 934506471 
020 |a 9780128006214 
020 |a 0128006218 
020 |a 0128005653 
020 |a 9780128005651 
020 |z 9780128005651 
029 1 |a DEBBG  |b BV043611483 
029 1 |a DEBSZ  |b 431746907 
029 1 |a GBVCP  |b 793176700 
035 |a (OCoLC)892969610  |z (OCoLC)887508641  |z (OCoLC)934506471 
037 |a CL0500000489  |b Safari Books Online 
050 4 |a HV8290  |b .W395 2014 
082 0 4 |a 658.4/7 2 
049 |a UAMI 
100 1 |a Wayland, Bradley A. 
245 1 0 |a Security for business professionals :  |b how to plan, implement, and manage your company's security program /  |c Bradley A. Wayland. 
260 |a Waltham, MA :  |b Butterworth-Heinemann,  |c ©2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
505 0 |a Front Cover; Security for Business Professionals: How to Plan, Implement, and Manage Your Company's Security Program; Copyright; Dedication; Contents; About the Author; 1 -- Leadership and Management; 1.1 Relation Between Leadership and Management; 1.2 Leadership Techniques and Traits; 1.3 Management Techniques and Traits; 1.4 Conclusions Regarding Leadership and Management; References; Part 1 -- Security Planning Considerations; 2 -- Safety and Security Principles; 2.1 Overview of Safety and Security Principles; 2.2 Preparatory Actions to Emergency Incidents; 2.3 Security Fundamentals. 
505 8 |a 2.4 Balancing Security Measures with Business Operations2.5 Summary; 2.6 Safety and Security Principles Checklist; References; 3 -- Security Plan Development and Risk Assessment; 3.1 Safety and Security Plans and Procedures; 3.2 Risk Assessment; 3.3 Quantifying Safety and Security Initiatives; 3.4 Summary of Security Plan Development and Risk Assessment; 3.5 Security Plan Development and Risk Assessment Checklist; References; 4 -- Safety and Security Program Administration; 4.1 OSHA Employer Safety Requirements; 4.2 Considerations and Staffing for Security Guard Forces. 
505 8 |a 4.3 Security Measurements and Metrics4.4 Summary of Safety and Security Program Administration Areas; 4.5 Safety and Security Program Administration Checklist; References; 5 -- Facility Security Design; 5.1 Crime Prevention through Environmental Design; 5.2 Conclusions Regarding Facility Security Design; Reference; Part 2 -- Security Program Areas; 6 -- Physical Security; 6.1 Overview; 6.2 Perimeter Security Measures; 6.3 Doors and Windows; 6.4 Lighting; 6.5 Access Control; 6.6 Alarm Systems; 6.7 Closed-Circuit Television; 6.8 Security Integration Systems; 6.9 Safes and Vaults; 6.10 Summary. 
505 8 |a Reference7 -- Information Security; 7.1 Overview; 7.2 Confidentiality; 7.3 Integrity; 7.4 Availability; 7.5 Information Security Summary; References; 8 -- Personnel Security; 8.1 Conducting the Pre-employment Screening; 8.2 Employee Investigations; 8.3 Protecting Employees from Discrimination and Unfounded Allegations; 8.4 Summary; References; Part 3 -- Emergency Response and Training; 9 -- Emergency Response and Contingency Planning; 9.1 Emergency Response Planning Factors; 9.2 Types of Emergency Incidents; 9.3 Additional Considerations Related to Emergency Planning Procedures; 9.4 Summary. 
505 8 |a Reference10 -- Safety and Security Training Program; 10.1 Initial Safety and Security Training; 10.2 Recurring Safety and Security Training; 10.3 Safety and Security Exercises; 10.4 Conclusions on Safety and Security Training; Index. 
520 |a Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an existing security program. The book provides an overview of the key security objectives and challenges that managers face, such as how to measure the effectiveness of a security program and balance the costs and benefits. It also shows how to develop security procedures that conform to key regulatory requirements, a. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Business enterprises  |x Security measures. 
650 6 |a Entreprises  |x Sécurité  |x Mesures. 
650 7 |a Business enterprises  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Wayland, Bradley A.  |t Security for business professionals.  |d Waltham, MA: Butterworth-Heinemann 2014  |z 0128005653  |w (OCoLC)890575256 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128005651/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a RECORD REPORTED FOR DELETION--USE #887943211 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1766351 
938 |a ebrary  |b EBRY  |n ebr10908179 
994 |a 92  |b IZTAP