Cargando…

Protective security : creating military-grade defenses for your digital business /

This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-crit...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Seaman, Jim (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Berkeley] : Apress, [2021]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Chapter 1: Introduction
  • Chapter 2: What is Protective Security (PS)?
  • Chapter 3: Protective Security (PS) in Terms of the Legal and Regulatory Considerations for the Digital Business
  • Chapter 4: The Integration of Compliance with Protection Security(PS)
  • Chapter 5: Developing a Protective Security Strategy
  • Chapter 6: Cyber Security and the Digital Business
  • Chapter 7: Network/IT Security in Protective Security (PS)
  • Chapter 8: Information Systems Security
  • Chapter 9: Physical Security
  • Chapter 10: Industrial Systems Protective Security
  • Chapter 11: Securing Your Supply Chain
  • Chapter 12: Developing Your Human Firewall
  • Chapter 13: Strict Access Restrictions
  • Chapter 14: Building Resilience
  • Chapter 15: Demonstrating the Protective Security Return on Investment (ROI)
  • Appendix A: A Lifetime in Protective Security
  • Appendix B: A Chronology of Protective Security Development.