|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn932322884 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
151216s2016 enka ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCO
|d OCLCA
|d KMS
|d OCLCA
|d OCLCF
|d CN5CF
|d SFB
|d TXI
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1019981054
|
020 |
|
|
|z 9780128022245
|
020 |
|
|
|a 9780128024935
|
020 |
|
|
|a 0128024933
|
020 |
|
|
|a 0128022248
|
020 |
|
|
|a 9780128022245
|
035 |
|
|
|a (OCoLC)932322884
|z (OCoLC)1019981054
|
037 |
|
|
|a CL0500000688
|b Safari Books Online
|
050 |
|
4 |
|a HD61
|
082 |
0 |
4 |
|a 658.155
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Allen, Gregory.
|
245 |
1 |
0 |
|a Threat assessment and risk analysis :
|b an applied approach /
|c Gregory Allen and Rachel Derr.
|
264 |
|
1 |
|a Oxford, UK ; Waltham, MA :
|b Butterworth-Heinemann,
|c [2016]
|
264 |
|
4 |
|c ©2016
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
|
|
|a Description based on online resource; title from title page (Safari, viewed December 14, 2015).
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Introduction to the Department of Homeland Security --
|t What is risk? --
|t Risk analysis --
|t Threat identification and rating --
|t Risk identification --
|t National infrastructure protection plan and critical infrastructure and key resources --
|t Vulnerability assessment --
|t Vulnerabilities --
|t Risk assessment --
|t Crime prevention through environmental design --
|t Mitigation and preparedness --
|t Emergency action plans.
|
520 |
|
|
|a This volume details the entire risk analysis process in accessible language, providing the tools and insight needed to effectively analyze risk and secure facilities in a broad range of industries and organizations. It explores physical vulnerabilities in such systems as transportation, distribution, and communications, and demonstrates how to measure the key risks and their consequences, providing cost-effective and achievable methods for evaluating the appropriate security risk mitigation countermeasures. Balancing the proper security measures versus the actual risks an organization faces is essential when it comes to protecting physical assets. However, determining which security controls are appropriate is often a subjective and complex matter. The book explores this process in an objective and achievable manner, and is a valuable resource for security and risk management executives, directors, and students.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Risk management.
|
650 |
|
0 |
|a Threats
|x Prevention.
|
650 |
|
0 |
|a Violence in the workplace
|x Prevention.
|
650 |
|
0 |
|a Corporations
|x Security measures.
|
650 |
|
0 |
|a Behavioral assessment.
|
650 |
|
6 |
|a Gestion du risque.
|
650 |
|
6 |
|a Sociétés
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Analyse comportementale.
|
650 |
|
7 |
|a risk management.
|2 aat
|
650 |
|
7 |
|a Behavioral assessment
|2 fast
|
650 |
|
7 |
|a Corporations
|x Security measures
|2 fast
|
650 |
|
7 |
|a Risk management
|2 fast
|
650 |
|
7 |
|a Violence in the workplace
|x Prevention
|2 fast
|
700 |
1 |
|
|a Derr, Rachel,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128024935/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|