Skip to main content

Books in Security management

11-20 of 132 results in All results

Security Metrics Management

  • 2nd Edition
  • November 15, 2016
  • Gerald L. Kovacich + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 3 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 0 0 - 8
Security Metrics Management, Measuring the Effectiveness and Efficiency of a Security Program, Second Edition details the application of quantitative, statistical, and/or mathematical analyses to measure security functional trends and workload, tracking what each function is doing in terms of level of effort (LOE), costs, and productivity. This fully updated guide is the go-to reference for managing an asset protection program and related security functions through the use of metrics. It supports the security professional’s position on budget matters, helping to justify the cost-effectiveness of security-related decisions to senior management and other key decision-makers. The book is designed to provide easy-to-follow guidance, allowing security professionals to confidently measure the costs of their assets protection program - their security program - as well as its successes and failures. It includes a discussion of how to use the metrics to brief management, build budgets, and provide trend analyses to develop a more efficient and effective asset protection program.

Insider Threat

  • 1st Edition
  • May 26, 2016
  • Michael G. Gelles
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 4 1 0 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 6 2 2 - 9
Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft from current or former employees. This book outlines a step-by-step path for developing an insider threat program within any organization, focusing on management and employee engagement, as well as ethical, legal, and privacy concerns. In addition, it includes tactics on how to collect, correlate, and visualize potential risk indicators into a seamless system for protecting an organization’s critical assets from malicious, complacent, and ignorant insiders. Insider Threat presents robust mitigation strategies that will interrupt the forward motion of a potential insider who intends to do harm to a company or its employees, as well as an understanding of supply chain risk and cyber security, as they relate to insider threat.

Threat Forecasting

  • 1st Edition
  • May 17, 2016
  • John Pirc + 3 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 0 0 6 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 4 7 8 - 4
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

Maritime Security

  • 2nd Edition
  • March 19, 2016
  • Michael McNicholas
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 6 7 2 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 6 7 3 - 0
Maritime Security: An Introduction, Second Edition, provides practical, experience-based, and proven knowledge - and a "how-to-guide" - on maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what threats currently exist; what security policies, procedures, systems, and measures must be implemented to mitigate these threats; and how to conduct ship and port security assessments and plans. Whether the problem is weapons of mass destruction or cargo theft, Maritime Security provides invaluable guidance for the professionals who protect our shipping and ports. New chapters focus on whole government maritime security, UN legal conventions and frameworks, transnational crime, and migration. Updates throughout will provide the latest information in increasingly important field.

Building a Corporate Culture of Security

  • 1st Edition
  • February 24, 2016
  • John Sullivant
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 0 1 9 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 0 5 8 - 6
Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency provides readers with the proven strategies, methods, and techniques they need to present ideas and a sound business case for improving or enhancing security resilience to senior management. Presented from the viewpoint of a leading expert in the field, the book offers proven and integrated strategies that convert threats, hazards, risks, and vulnerabilities into actionable security solutions, thus enhancing organizational resiliency in ways that executive management will accept. The book delivers a much-needed look into why some corporate security practices programs work and others don’t. Offering the tools necessary for anyone in the organization charged with security operations, Building a Corporate Culture of Security provides practical and useful guidance on handling security issues corporate executives hesitate to address until it’s too late.

Biosecurity and Bioterrorism

  • 2nd Edition
  • February 12, 2016
  • Jeffrey Ryan
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 0 2 9 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 0 5 7 - 9
Biosecurity and Bioterrorism, Second Edition, takes a holistic approach to biosecurity, with coverage of pathogens, prevention, and response methodology. It addresses these hazards in the context of vulnerability assessments and the planning strategies government and industry can use to prepare for and respond to such events. The book is organized into four thematic sections: Part I provides a conceptual understanding of biowarfare, bioterrorism and the laws we have to counteract this; Part II investigates known bioagents and the threat from emerging diseases; Part III focuses on agricultural terrorism and food security; and Part IV outlines international, US, and local initiatives for biodefense and biosecurity. Case studies illustrate biodefense against both intentional terrorism and natural outbreaks.

Threat Assessment and Risk Analysis

  • 1st Edition
  • October 27, 2015
  • Gregory Allen + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 4 9 3 - 5
Threat Assessment and Risk Analysis: An Applied Approach details the entire risk analysis process in accessible language, providing the tools and insight needed to effectively analyze risk and secure facilities in a broad range of industries and organizations. The book explores physical vulnerabilities in such systems as transportation, distribution, and communications, and demonstrates how to measure the key risks and their consequences, providing cost-effective and achievable methods for evaluating the appropriate security risk mitigation countermeasures. Users will find a book that outlines the processes for identifying and assessing the most essential threats and risks an organization faces, along with information on how to address only those that justify security expenditures. Balancing the proper security measures versus the actual risks an organization faces is essential when it comes to protecting physical assets. However, determining which security controls are appropriate is often a subjective and complex matter. The book explores this process in an objective and achievable manner, and is a valuable resource for security and risk management executives, directors, and students.

Workplace Safety

  • 1st Edition
  • October 23, 2015
  • Randall W. Ferris + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 7 5 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 8 9 - 9
Workplace Safety: Establishing an Effective Violence Prevention Program includes a powerful model on how to overcome organizational rationalization, objection, and denial when confronted with proposing a workplace violence protection program. The book offers real-life cases studies on how violence was successfully avoided using the book’s program, and also shows how to recognize and report precursor behaviors that precede violence. In addition, the book demonstrates proven methods for properly, and effectively, responding to violence should it occur, and tactfully managing the aftermath.

Security Litigation

  • 1st Edition
  • October 9, 2015
  • Eddie Sorrells
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 9 2 4 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 9 3 7 - 5
Security Litigation: Best Practices for Managing and Preventing Security-Related Lawsuits provides practical guidance and examples on how to deal with the most difficult legal issues that security executives face every day, also exploring the key issues that occur before, during, and after a lawsuit. The book demonstrates scenarios that have actually played out in courtrooms, depositions, and contractual negotiations, and provides answers to challenging security litigation questions such as, What does this contractual provision mean if we get sued? Am I in legal trouble if I assign unarmed vs. armed officers and a crime occurs? How do I defend my company without blaming my customer? Increasingly, issues such as security surveys, contractual indemnification, and even marketing language are at the center of lawsuits concerning security practices. Many organizations face security-related lawsuits on an increasing basis, and this book provides a much needed resource to help security professionals successfully navigate the unique nature of security-related lawsuits. Accessibly written for those without a law background, the book assists readers through education, awareness, sample contract language, and assessment templates, offering meaningful recommendations and solutions.

Security Operations Management

  • 3rd Edition
  • September 11, 2015
  • Robert McCrie
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 6 1 8 - 2
Security Operations Management, 3rd edition, is the latest edition the seminal reference on corporate security management operations for today’s security management professionals and students. The book explores the characteristics of today’s globalized workplaces, why security has a key role within them, and what the greatest concern are to security practitioners and senior managers. Incorporating the latest security research and best practices, updates to Security Operations Management 3rd edition include explorations of the key skills needed by security managers to demonstrate the value of their security program, greater emphasis on identifying and managing risk, and coverage of the latest technological advances in security control, command, communications, and computing. The third edition also delves more deeply than previous editions into online security training practices, as well as investigates the changing roles of women and minorities in security operations.