Skip to main content

Books in Business management and accounting

Our Business, Management, and Accounting titles are essential reading for students and professionals, and cover a range of foundational and advanced topics across actuarial science, quantitative assets management and investment modelling, business venturing, business law, and human resource management, among other topics

    • Business Continuity and Disaster Recovery Planning for IT Professionals

      • 2nd Edition
      • September 10, 2013
      • Susan Snedaker
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 5 2 6 3
      • eBook
        9 7 8 0 1 2 4 1 1 4 5 1 7
      Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. The new 2nd Edition of Business Continuity and Disaster Recovery for IT Professionals gives you the most up-to-date planning and risk management techniques for business continuity and disaster recovery (BCDR). With distributed networks, increasing demands for confidentiality, integrity and availability of data, and the widespread risks to the security of personal, confidential and sensitive data, no organization can afford to ignore the need for disaster planning. Author Susan Snedaker shares her expertise with you, including the most current options for disaster recovery and communication, BCDR for mobile devices, and the latest infrastructure considerations including cloud, virtualization, clustering, and more. Snedaker also provides you with new case studies in several business areas, along with a review of high availability and information security in healthcare IT. Don’t be caught off guard—Business Continuity and Disaster Recovery for IT Professionals, 2nd Edition , is required reading for anyone in the IT field charged with keeping information secure and systems up and running.
    • Demystifying the Institutional Repository for Success

      • 1st Edition
      • August 31, 2013
      • Marianne Buehler
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 6 7 3 9
      • eBook
        9 7 8 1 7 8 0 6 3 3 2 1 3
      Institutional repositories remain key to data storage on campus, fulfilling the academic needs of various stakeholders. Demystifying the Institutional Repository for Success is a practical guide to creating and sustaining an institutional repository through marketing, partnering, and understanding the academic needs of all stakeholders on campus. This title is divided into seven chapters, covering: traditional scholarly communication and open access publishing; the academic shift towards open access; what the successful institutional repository looks like; institutional repository collaborations and building campus relationships; building internal and external campus institutional repository relationships; the impact and value proposition of institutional repositories; and looking ahead to open access opportunities.
    • Bringing a Corporate Security Culture to Life

      • 1st Edition
      • August 23, 2013
      • Peter Cheviot
      • English
      • eBook
        9 7 8 0 1 2 4 1 7 2 4 1 8
      Bringing a Corporate Security Culture to Life is a video presentation. Length: 18 minutes. In Bringing a Corporate Security Culture to Life, presenter Peter Cheviot, former vice president of corporate security for BAX Global Inc., discusses how to build and maintain a corporate security culture that encourages company employees to take ownership of security and facilitates communication. In this 18-minute video presentation of narrated slides, the concept of "security culture" is defined, and Cheviot explains how it can improve the effectiveness of security and risk management programs. Security culture refers to the idea that the security manager must encourage shared ownership of and accountability for the organization’s security program among all employees. In this presentation, the ways to achieve a good security culture are outlined. They include impressing the return on investment (ROI) of security services, designating security ambassadors for various functional areas of the business, providing training, connecting with senior management, and sharing security program performance results. When employees and other business stakeholders feel that they have ownership over security policies, the results are higher compliance, return on investment, and net gains through continuous improvements. The tools and recommendations found in Bringing a Corporate Security Culture to Life will help security managers and their teams achieve these results. Bringing a Corporate Security Culture to Life is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • The Benefits and Security Risks of Web-Based Applications for Business

      • 1st Edition
      • May 28, 2013
      • Kathleen Kotwica
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 0 0 1 8
      • eBook
        9 7 8 0 1 2 4 1 6 9 8 7 6
      This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration, and marketing and publicity outreach. The benefits of web-based applications for business are many, but so too are the risks associated with them. Data leakage, information manipulation, malware, and authentication security are just a few of the cyber threats discussed in this report. It is critical to weigh the pros and cons of implementing a web-based application in the workplace and plan accordingly to mitigate risk. This report is a valuable resource for any security professional who is considering the adoption of a web-based application for corporate use. The Benefits and Security Risks of Web-Based Applications for Business is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • The Case for the Chief Data Officer

      • 1st Edition
      • April 22, 2013
      • Peter Aiken + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 4 6 3 0
      • eBook
        9 7 8 0 1 2 4 1 1 4 9 5 1
      Data are an organization's sole, non-depletable, non-degrading, durable asset. Engineered right, data's value increases over time because the added dimensions of time, geography, and precision. To achieve data's full organizational value, there must be dedicated individual to leverage data as assets - a Chief Data Officer or CDO who's three job pillars are: Dedication solely to leveraging data assets, Unconstrained by an IT project mindset, and Reports directly to the business Once these three pillars are set into place, organizations can leverage their data assets. Data possesses properties worthy of additional investment. Many existing CDOs are fatally crippled, however, because they lack one or more of these three pillars. Often organizations have some or all pillars already in place but are not operating in a coordinated manner. The overall objective of this book is to present these pillars in an understandable way, why each is necessary (but insufficient), and what do to about it.
    • Diversity and the Effective Corporate Board

      • 1st Edition
      • April 16, 2013
      • Ram Kumar Mishra + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 4 9 7 6
      • eBook
        9 7 8 0 1 2 4 1 0 5 3 2 4
      The book discusses the various aspects of diversity of corporate boards in terms of gender, age, nationality, tenure, education, experience and personalities. It enumerates the need for such diversity in each category and related concerns. Statistics from around the world support the authors’ claims. The nine chapters in this short book have not been previously published.
    • Assessing Vendors

      • 1st Edition
      • April 10, 2013
      • Josh More
      • English
      • Paperback
        9 7 8 0 1 2 4 0 9 6 0 7 3
      • eBook
        9 7 8 0 1 2 4 1 0 4 4 6 4
      Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. Assessing Vendors shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, digging too deeply, or making decisions too quickly. This hands-on guide will show you how to use an iterative approach to vendor analysis, so you can rapidly filter out the vendors that are clear failures and then select likely winners. It will then show you how to do progressively deeper dives into the likely winners so you can select a preferred vendor. Finally, you will learn how to negotiate with your preferred vendor to get reasonable prices and services. Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price
    • Business Continuity

      • 2nd Edition
      • April 3, 2013
      • Bob Hayes + 1 more
      • Dean Correia
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 6 4 8 1
      • eBook
        9 7 8 0 1 2 4 1 6 5 6 4 9
      The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization’s business continuity program (BCP). Business continuity planning is an activity performed daily by organizations of all types and sizes to ensure that critical business functions are available before, during, and after a crisis. This playbook guides the security leader through the development, implementation, and maintenance of a successful BCP. The text begins with a detailed description of the concept and value of business continuity planning, transitioning into a step-by-step guide to building or enhancing a BCP. Its 14 appendices, which include sample forms, templates, and definitions, make it an invaluable resource for business continuity planning. The Business Continuity playbook is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • The Compliance Response to Misconduct Allegations

      • 2nd Edition
      • March 28, 2013
      • John D. Thompson
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 5 5 4 0
      • eBook
        9 7 8 0 1 2 4 1 6 5 6 3 2
      The Compliance Response to Misconduct Allegations playbook is a step-by-step guide for what to do—and what not to do—in performing an investigation into claims of violations of employee policies. It has been created for corporate professionals who are often the first to be contacted during a suspected employee-related claim, and who may not have investigative training. Sections of this playbook address the decision whether to investigate, the naming of investigators, investigation planning, interview techniques and issues, the importance of taking notes and written statements, investigations in union settings, and much more. Also included are a series of checklists and templates to aid the investigative team before, during, and after an investigation. This playbook is an excellent risk management resource for audit professionals, human resources managers, site or facility managers, small business owners, or anyone who may be the first to receive reports of wrongdoing, regulatory violations, or prohibited workforce behavior. The Compliance Response to Misconduct Allegations is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Establishing the Value of All-Hazards Risk Mitigation

      • 1st Edition
      • March 26, 2013
      • Francis J. D'Addario
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 5 5 2 6
      • eBook
        9 7 8 0 1 2 4 1 6 5 6 7 0
      Establishing the Value of All-Hazards Risk Mitigation is a video presentation. Length: 32 minutes. Establishing the Value of All-Hazards Risk Mitigation is a video presentation of narrated slides discussing the cost of risk and the return-on-investment (ROI) value of risk mitigation. This 32-minute Proven Practices presentation describes a people-centric, data-qualified, and culturally relevant approach to enterprise risk mitigation. The presentation’s broad scope covers cost assessment of natural and man-made catastrophic events, information loss, fraud and theft, and more, as well as the importance of an organization’s preparedness and response. Presenter Francis D’Addario’s expertise in this area comes from his years of experience as an all-hazards risk mitigation leader for multinational convenience, food and beverage, manufacturing, restaurant, retail, and supply chain operators. This presentation is a valuable resource for business leaders and risk mitigation professionals who have responsibility for the protection of people, assets, and critical processes, as well as for educators preparing the next generation of security professionals and leaders. Establishing the Value of All-Hazards Risk Mitigation is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.