|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn872620430 |
003 |
OCoLC |
005 |
20231120111532.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
140314s2014 mau o 000 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d OPELS
|d EBLCP
|d OCLCF
|d OCLCQ
|d YDXCP
|d DEBSZ
|d OCLCQ
|d MERUC
|d OCLCQ
|d U3W
|d D6H
|d OTZ
|d OCLCQ
|d WYU
|d AU@
|d OCLCQ
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 874322705
|
020 |
|
|
|a 1306498775
|q (ebk)
|
020 |
|
|
|a 9781306498777
|q (ebk)
|
020 |
|
|
|a 9780128009086
|
020 |
|
|
|a 012800908X
|
020 |
|
|
|z 9780128008447
|
035 |
|
|
|a (OCoLC)872620430
|z (OCoLC)874322705
|
050 |
|
4 |
|a HD61
|
082 |
0 |
4 |
|a 658.15/5
|2 23
|
245 |
0 |
0 |
|a Security leader insights for success :
|b lessons and strategies from leading security professionals /
|c Dave Komendat, contributing editor.
|
260 |
|
|
|a Waltham, MA :
|b Elsevier,
|c 2014.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front Cover; Security Leader Insights for Success; Copyright Page; Contents; Introduction; 1 The Skills Needed for Successful Security Leadership; 1 The Art of Leadership; 1.1 What is Good Security Leadership?; 1.2 What Knowledge, Skills, and Characteristics do you Need?; 1.2.1 Know the Culture; 1.2.2 Enable the Business; 1.2.3 Know Security; 1.2.4 Communicate Effectively; 1.2.5 Build the Right Team; 1.2.6 Be Flexible; 1.3 Where can you get those Skills?; 1.4 Can Leadership be Learned?; 2 Be the Great Motivator; 2.1 It's Not Always Easy; 2.2 Learn as You Go; 3 Becoming a Business Leader.
|
505 |
8 |
|
|a 3.1 The Elements of Leadership3.2 Aerodynamic Security; 3.3 Focused, Online Training; 3.4 Educational Resources; 3.5 Custom Programs; 3.6 Business will become the Language of Dialogue; 3.7 Everyone is a Leader; 4 Finding Time: Time Management Strategies for the Busy Security Leader; 4.1 Don't Reinvent the Wheel; 4.2 Learn from those Who've been there; 4.3 Build a Staff you can Count on; 5 Leading Up: Or, How to Build a Positive Relationship with Your Manager; 5.1 Be a Leader First; 5.2 The Role Goes Beyond Security; 5.3 Number of Incidents is Not the Only Metric; 5.4 Proactive Communication.
|
505 |
8 |
|
|a 5.5 Are You Leading Up?6 Understanding Your Corporate Culture; 7 Rebuilding Influence after Corporate Restructuring; 8 Managing Expectations; 9 Running Security Like a Business; 10 Becoming a Next Generation Security Leader; 10.1 Assess to Find the Best Executive Development Resources; 10.1.1 Mentorship; 10.1.2 Educational Offerings; 10.2 Finding a Job that Enables Next Generation Leadership; 2 Building Your Toolkit; 11 Developing Meaningful Security Metrics; 11.1 Are your Metrics Tied to Business Goals?; 11.2 Do any of your Metrics Show Value by Reliably Measuring Avoided Costs?
|
505 |
8 |
|
|a 11.3 Do you Collect both Forward-Looking and Backward-Looking Metrics?11.4 Do Metrics Measure Direct and Indirect Impacts?; 11.5 Are you Creating Metrics in a Vacuum or Soliciting the help of other Functions?; 11.6 Do your Metrics Tell a Story?; 12 Setting Realistic Goals That Align with Business Interests; 13 The New Security Assessment; 14 Expect the Best: Evaluating Your Security Staff; 15 Business Evolution Requires Active Security Alignment; 16 Emerging Issue Awareness; 16.1 Challenges to Emerging Issue Awareness; 16.2 Tips for Staying Aware; 17 Planning for Change.
|
505 |
8 |
|
|a 17.1 Stronger Influence and Better Security17.2 Align, Align, Align; 17.3 Security as a Nimble Function; 17.4 Efficiency vs. Flexibility; 18 Reinventing Security; 18.1 Common Circumstances of Reinvention; 18.2 Milestones to Reach; 18.3 How to Lead Reinvention; 3 Looking Forward; 19 Security's Role in Corporate Social Responsibility; 19.1 Why Security?; 19.2 What's in it for you?; 19.3 How to Get a CSR Program Started; 20 Advances and Stalemates in Security; 20.1 Advances; 20.2 Stalemates; 21 Addressing the Knowledge Transfer Gap; 21.1 Seven Characteristics of a Knowledge-Sharing Program.
|
520 |
|
|
|a How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Success, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on leadership issues. Instead of re-inventing th.
|
650 |
|
0 |
|a Risk managers.
|
650 |
|
0 |
|a Security systems
|x Management.
|
650 |
|
6 |
|a Gestionnaires de risques.
|0 (CaQQLa)201-0126634
|
650 |
|
6 |
|a Syst�emes de s�ecurit�e
|0 (CaQQLa)201-0001035
|x Gestion.
|0 (CaQQLa)201-0380063
|
650 |
|
7 |
|a Risk managers
|2 fast
|0 (OCoLC)fst01098189
|
650 |
|
7 |
|a Security systems
|x Management
|2 fast
|0 (OCoLC)fst01426558
|
700 |
1 |
|
|a Komendat, Dave.
|
776 |
0 |
8 |
|i Print version:
|z 9781306498777
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128008447
|z Texto completo
|