|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
SCIDIR_ocn885019721 |
003 |
OCoLC |
005 |
20231120111710.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
140801s2014 enk o 000 0 eng d |
010 |
|
|
|a 2014021032
|
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d YDXCP
|d OPELS
|d E7B
|d UMI
|d DEBSZ
|d GGVRL
|d UKMGB
|d B24X7
|d COO
|d OCLCF
|d OCLCQ
|d LIV
|d OCLCQ
|d U3W
|d D6H
|d OTZ
|d AUD
|d LQU
|d ABC
|d VT2
|d OCLCO
|d LVT
|d OCLCO
|d OCLCQ
|d OCLCO
|
016 |
7 |
|
|a 016887253
|2 Uk
|
016 |
7 |
|
|a 016887253
|
019 |
|
|
|a 888415344
|a 1105180252
|a 1105573710
|a 1192339111
|a 1235830745
|a 1240532622
|a 1262674430
|a 1302274342
|
020 |
|
|
|a 1306992869
|q (ebk)
|
020 |
|
|
|a 9781306992862
|q (ebk)
|
020 |
|
|
|a 9780128009178
|
020 |
|
|
|a 0128009179
|
020 |
|
|
|z 9780128002216
|
020 |
|
|
|a 0128002212
|
020 |
|
|
|a 9780128002216
|
035 |
|
|
|a (OCoLC)885019721
|z (OCoLC)888415344
|z (OCoLC)1105180252
|z (OCoLC)1105573710
|z (OCoLC)1192339111
|z (OCoLC)1235830745
|z (OCoLC)1240532622
|z (OCoLC)1262674430
|z (OCoLC)1302274342
|
050 |
|
4 |
|a HV7431
|b .W465 2014
|
082 |
0 |
4 |
|a 658.4/73
|2 23
|
100 |
1 |
|
|a White, John M.
|c (Security professional)
|
245 |
1 |
0 |
|a Security risk assessment :
|b managing physical and operational security /
|c John M. White.
|
260 |
|
|
|a Oxford :
|b Butterworth-Heinemann,
|c �2014.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Chapter 1. Introduction to security risk assessments -- chapter 2. Preassessment planning -- chapter 3. Project management -- chapter 4. Defining the project scope -- chapter 5. Information gathering -- chapter 6. Physical security assessment -- chapter 7. Security department operations -- chapter 8. Security training -- chapter 9. Workplace violence risks and vulnerabilities -- chapter 10. Financial assessment -- chapter 11. Security technology assessment -- chapter 12. Access control -- chapter 13. Legal considerations and prevention strategies -- chapter 14. Contracted services -- chapter 15. The security risk assessment report -- chapter 16. Conclusion.
|
520 |
|
|
|a Offers security professionals step-by-step guidance for conducting a complete risk assessment using the most current approaches, theories, and best practices.
|
650 |
|
0 |
|a Crime prevention.
|
650 |
|
0 |
|a Security systems.
|
650 |
|
6 |
|a Syst�emes de s�ecurit�e.
|0 (CaQQLa)201-0001035
|
650 |
|
7 |
|a security systems.
|2 aat
|0 (CStmoGRI)aat300076660
|
650 |
|
7 |
|a Crime prevention
|2 fast
|0 (OCoLC)fst00883055
|
650 |
|
7 |
|a Security systems
|2 fast
|0 (OCoLC)fst01110883
|
776 |
0 |
8 |
|i Print version:
|z 9781306992862
|
776 |
0 |
8 |
|i Print version:
|a White, John M. (Security professional).
|t Security risk assessment
|z 9780128002216
|w (DLC) 2014021032
|w (OCoLC)879582331
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128002216
|z Texto completo
|