|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn910237222 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
150528s2015 flua ob 000 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d YDXCP
|d IDEBK
|d E7B
|d UMI
|d CDX
|d DEBBG
|d EBLCP
|d COO
|d VLB
|d CRCPR
|d OCLCF
|d K6U
|d LIV
|d OCLCQ
|d MERUC
|d UAB
|d OCLCQ
|d VT2
|d BWS
|d D6H
|d VVB
|d CEF
|d AU@
|d WYU
|d UWW
|d OCLCQ
|d SFB
|d STF
|d VLY
|d OCLCQ
|d BRF
|d OCLCQ
|d OCLCO
|d UKAHL
|d OCLCQ
|
019 |
|
|
|a 910447770
|a 911057801
|a 1027963793
|
020 |
|
|
|a 9781498722049
|q (electronic bk.)
|
020 |
|
|
|a 1498722040
|q (electronic bk.)
|
020 |
|
|
|a 1498722032
|
020 |
|
|
|a 9781498722032
|
020 |
|
|
|z 9781498722032
|
029 |
1 |
|
|a AU@
|b 000054975781
|
029 |
1 |
|
|a AU@
|b 000067075045
|
029 |
1 |
|
|a AU@
|b 000067110259
|
029 |
1 |
|
|a DEBBG
|b BV042683725
|
029 |
1 |
|
|a DEBBG
|b BV043620668
|
029 |
1 |
|
|a DEBSZ
|b 446589322
|
029 |
1 |
|
|a GBVCP
|b 826531180
|
029 |
1 |
|
|a GBVCP
|b 829921680
|
035 |
|
|
|a (OCoLC)910237222
|z (OCoLC)910447770
|z (OCoLC)911057801
|z (OCoLC)1027963793
|
037 |
|
|
|a CL0500000604
|b Safari Books Online
|
050 |
|
4 |
|a HV8290
|b .T75 2015
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.4/7
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Trier, Thomas A.,
|e author.
|
245 |
1 |
0 |
|a Intelligence-based security in private industry /
|c Thomas A. Trier.
|
264 |
|
1 |
|a Boca Raton, FL :
|b CRC Press,
|c [2015]
|
264 |
|
4 |
|c ©20
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Vendor-supplied metadata.
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Front Cover; Contents; Preface; About the Author; Chapter 1: Intelligence Descriptions; Chapter 2: Intelligence Background; Chapter 3: Advantages of an Intelligence-Based Program; Chapter 4: Corporate Security Capabilities Assessment; Chapter 5: Evaluate Capabilities; Chapter 6: Recommend Security Standards; Chapter 7: Initiate Collaboration of Cyber Security and Others; Chapter 8: Liaise with Industry Partners and Law Enforcement; Chapter 9: Show Success; Chapter 10: Engage Executive Management; Chapter 11: External Threats; Chapter 12: Industry Threats; Chapter 13: Internal Threats.
|
505 |
8 |
|
|a Chapter 14: VulnerabilitiesChapter 15: Planning and Resources; Chapter 16: Conduct an Intelligence Program Assessment; Chapter 17: Minimize Risk; Chapter 18: Develop a Strategic Plan; Chapter 19: Develop a Tactical Plan; Chapter 20: Communication; Chapter 21: Utility Company Execution; Chapter 22: Other Examples of Execution; Chapter 23: Follow-Up; Back Cover.
|
520 |
|
|
|a In Intelligence-Based Security in Private Industry, Thomas A. Trier identifies the inherent need and desire for intelligence-based security that exists throughout the private security industry. He provides a general overview of intelligence-based security and specific implementation guidelines to reduce private businesses' risk and vulnerability to criminal activities. This book is practical and informational, demonstrating real applications of the concepts, theories, and methods of gathering and acting upon information that may suggest a threat to a company. It explains the difference between.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Private security services.
|
650 |
|
0 |
|a Business enterprises
|x Security measures.
|
650 |
|
6 |
|a Services privés de sécurité.
|
650 |
|
6 |
|a Entreprises
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Industrial Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management Science.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Behavior.
|2 bisacsh
|
650 |
|
7 |
|a Business enterprises
|x Security measures.
|2 fast
|0 (OCoLC)fst00842623
|
650 |
|
7 |
|a Private security services.
|2 fast
|0 (OCoLC)fst01077603
|
776 |
0 |
8 |
|i Print version:
|a Trier, Thomas A.
|t Intelligence-Based Security in Private Industry.
|d Hoboken : CRC Press, ©2015
|z 9781498722032
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781498722032/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH28235384
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 31462491
|
938 |
|
|
|a CRC Press
|b CRCP
|n CRC0KE32426PDF
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr11059091
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 996996
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis31462491
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12383317
|
994 |
|
|
|a 92
|b IZTAP
|