|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
SCIDIR_ocn906575075 |
003 |
OCoLC |
005 |
20231120111950.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
150406s2015 enk o 001 0 eng d |
010 |
|
|
|a 2015933036
|
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d OPELS
|d IDEBK
|d CDX
|d YDXCP
|d Z5A
|d OCLCQ
|d U3W
|d D6H
|d WYU
|d OCLCQ
|d VT2
|d ABC
|d UKMGB
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBB552832
|2 bnb
|
016 |
7 |
|
|a 017166224
|2 Uk
|
019 |
|
|
|a 1066631369
|a 1088961996
|
020 |
|
|
|a 9780128029350
|q (electronic bk.)
|
020 |
|
|
|a 0128029358
|q (electronic bk.)
|
020 |
|
|
|z 9780128029343
|
020 |
|
|
|z 012802934X
|
035 |
|
|
|a (OCoLC)906575075
|z (OCoLC)1066631369
|z (OCoLC)1088961996
|
050 |
|
4 |
|a HV8290
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.4/7
|2 23
|
100 |
1 |
|
|a Cabric, Marko,
|e author.
|
245 |
1 |
0 |
|a Corporate security management :
|b challenges, risks, and strategies /
|c Marko Cabric.
|
264 |
|
1 |
|a Oxford :
|b Butterworth-Heinemann,
|c [2015]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Vendor-supplied metadata.
|
520 |
|
|
|a Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible assets, and people. The book merges business and security perspectives to help transform this often conflicted relationship into a successful and sustainable partnership. It combines security doctrine, business priorities, and best practices to uniquely answer the Who, What, Where, Why, When and How of corporate security. Corporate Security Management explores the diverse structures of security organizations in different industries. It shows the crucial corporate security competencies needed and demonstrates how they blend with the competencies of the entire organization. This book shows how to identify, understand, evaluate and anticipate the specific risks that threaten enterprises and how to design successful protection strategies against them. It guides readers in developing a systematic approach to assessing, analyzing, planning, quantifying, administrating, and measuring the security function.
|
505 |
0 |
0 |
|g Machine generated contents note:
|g SECTION 1
|t WHAT: DEFINE --
|g 1.
|t About Security --
|t Security and Its Essence --
|t Basic Principles of Security --
|t Glossary of Corporate Security Terms and Abbreviations --
|g 2.
|t Corporations and the Place of Corporate Security --
|t Corporations --
|t Key Corporate Partners of Security --
|t About Corporate Security: The Profession and Its Challenges --
|t Glossary of Corporate Terms and Abbreviations --
|g SECTION 2
|t WHO: ARRANGE --
|g 3.
|t The People --
|t Chief Security Officer Competences --
|t Security Team --
|t Private Security Industry --
|t People Management and Leadership --
|t Reference --
|g SECTION 3
|t HOW: ORGANIZE --
|g 4.
|t Managing a Security Organization --
|t Security Models according to Industry --
|t Security Management Styles --
|t Key Success Factors in Managing Security Processes --
|t Corporate Security Setup --
|g 5.
|t Incorporating Security Elements --
|t Information and Intelligence --
|t Security Governance --
|t People --
|t Physical Elements --
|t Technology (Electronic Systems) --
|t Communication --
|t Control --
|g SECTION 4
|t WHY: UNDERSTAND --
|g 6.
|t Internal Risks --
|t Overview of Internal Risks --
|t Reputational Risks --
|t Embezzlement, Theft, and Fraud --
|t Acts of Protest --
|t Sexual Harassment and Mobbing --
|t Substance Abuse and Gambling --
|t Inadequate Security Resilience --
|t References --
|g 7.
|t External Risks --
|t Overview of External Risks --
|t Global Issues versus Corporate Security --
|t Crime --
|t Cybercrime and High-Tech Crimes --
|t External Frauds --
|t Corporate Exposure to Terrorism --
|t Natural Factors --
|t Specific Risks to People --
|t Data Leakage --
|t Emergency Situations --
|t References --
|g SECTION 5
|t WHERE: ALLOCATE --
|g 8.
|t Physical Security --
|t Facility Security --
|t Security of Events --
|g 9.
|t Product --
|t Supply Chain --
|t Retail Loss Prevention --
|t References --
|g 10.
|t Human Capital --
|t Human Resources --
|t Security of Corporate Travelers and Expatriates --
|t References --
|g 11.
|t Confidentiality, Integrity, and Availability --
|t Confidentiality: Basic Information Security Principles --
|t Integrity: Combating Fraud --
|t Internal Investigations --
|t Availability: BCM and Disaster Recovery --
|g SECTION 6
|t WHEN: MEASURE --
|g 12.
|t Analysis, Assessments, Planning, Control, and Administration --
|t Threat Analysis --
|t Vulnerability Assessment --
|t Security Planning --
|t Security Metrics/KPI --
|t Trainings and Exercises.
|
650 |
|
0 |
|a Corporations
|x Security measures
|x Management.
|
650 |
|
6 |
|a Soci�et�es
|0 (CaQQLa)201-0000342
|x S�ecurit�e
|0 (CaQQLa)201-0373949
|x Mesures
|0 (CaQQLa)201-0373949
|x Gestion.
|0 (CaQQLa)201-0380063
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Industrial Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management Science.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Behavior.
|2 bisacsh
|
650 |
|
7 |
|a S�ecurit�e du travail.
|2 ram
|
776 |
0 |
8 |
|i Print version:
|z 9780128029343
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128029343
|z Texto completo
|