Skip to main content

Books in Security management

81-90 of 132 results in All results

Seven Deadliest Web Application Attacks

  • 1st Edition
  • February 20, 2010
  • Mike Shema
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 5 4 3 - 1
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 5 4 4 - 8
Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter presents examples of different attacks conducted against web sites. The methodology behind the attack is explored, showing its potential impact. The chapter then moves on to address possible countermeasures for different aspects of the attack. The book consists of seven chapters that cover the following: the most pervasive and easily exploited vulnerabilities in web sites and web browsers; Structured Query Language (SQL) injection attacks; mistakes of server administrators that expose the web site to attack; brute force attacks; and logic attacks. The ways in which malicious software malware has been growing as a threat on the Web are also considered. This book is intended for information security professionals of all levels, as well as web application developers and recreational hackers.

Hospital Emergency Response Teams

  • 1st Edition
  • November 19, 2009
  • Jan Glarum + 2 more
  • English
  • Paperback
    9 7 8 - 1 - 8 5 6 1 7 - 7 0 1 - 6
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 6 4 9 5 - 9
Hospital Emergency Response Teams aims to provide authoritative training for hospital personnel in the emergency department, as well community-level medical service personnel, assisting them in times of disaster and emergency. Comprised of six chapters, the book covers various aspects of emergency response. Some of the aspects are the National Incident Management System (NIMS) implementation activities for hospitals and health care systems and the Hospital Incident Command System (HICS) IV missions. The book also explains the implementation issues, requirements, and timelines in establishing an internal HICS IV program. It presents the assessment of likely mass casualty events and potential hospital impact. The book also features appendices for emergency response team checklists, PPE donning and doffing guide, ambulatory and non-ambulatory decontamination setup, ETA exercises, and ETA drills.The book is intended to provide understanding of emergency response to first emergency medicine professionals, first responders, security staff, community-level disaster planners, and public health and disaster management researchers.

Hospital and Healthcare Security

  • 5th Edition
  • October 12, 2009
  • Tony W York + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 8 8 6 0 2 - 2
Hospital and Healthcare Security, Fifth Edition, examines the issues inherent to healthcare and hospital security, including licensing, regulatory requirements, litigation, and accreditation standards. Building on the solid foundation laid down in the first four editions, the book looks at the changes that have occurred in healthcare security since the last edition was published in 2001. It consists of 25 chapters and presents examples from Canada, the UK, and the United States. It first provides an overview of the healthcare environment, including categories of healthcare, types of hospitals, the nonhospital side of healthcare, and the different stakeholders. It then describes basic healthcare security risks/vulnerabilities and offers tips on security management planning. The book also discusses security department organization and staffing, management and supervision of the security force, training of security personnel, security force deployment and patrol activities, employee involvement and awareness of security issues, implementation of physical security safeguards, parking control and security, and emergency preparedness. Healthcare security practitioners and hospital administrators will find this book invaluable.

The Law of Emergencies

  • 1st Edition
  • June 22, 2009
  • Nan D. Hunter
  • English
  • Paperback
    9 7 8 - 1 - 8 5 6 1 7 - 5 4 7 - 0
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 4 9 7 9 - 6
The Law of Emergencies discusses the legal framework for disaster response and emergency management. The book engages with and debates some of the most important Constitutional issues of our time, such as the tension between civil liberties and national security. It also examines how the law of emergencies plays out in the context of real life emergencies where individuals often have to make split-second decisions. It analyzes legal authority at the federal, state and local levels, placing the issues in historical context but concentrating on contemporary questions. This book includes primary texts, reader-friendly expository explanations, and sample discussion questions. Prior knowledge of the law is not necessary in order to use and understand this book. The contents are organized into 13 substantive chapters plus two additional chapters with problem sets, making the book especially easy to use for a separate course focused on law. The book leads students through the process of understanding both what the law requires and how to analyze issues for which there is no clear legal answer. It features materials on such critical issues as how to judge the extent of Constitutional authority for government to intervene in the lives and property of American citizens. At the same time, it also captures bread-and-butter issues such as responder liability and disaster relief methods. No other book brings these components together in a logically organized, step by step fashion. The book also features case studies of high-risk scenarios including pandemic flu, together with charts and text boxes for clarification. This book will be of interest to graduate and undergraduate students studying the major legal principles underlying emergency management and homeland security policy and operations; professionals in EM and HS; and private-sector risk managers.

Securing Intellectual Property

  • 1st Edition
  • December 1, 2008
  • Information Information Security
  • English
  • Paperback
    9 7 8 - 0 - 7 5 0 6 - 7 9 9 5 - 4
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 4 1 4 1 - 7
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

Techno Security's Guide to Securing SCADA

  • 1st Edition
  • July 16, 2008
  • Greg Miles + 8 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 2 8 2 - 9
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 9 9 9 - 4
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.

Nuclear Safeguards, Security and Nonproliferation

  • 1st Edition
  • June 30, 2008
  • James Doyle
  • James Doyle
  • English
  • Hardback
    9 7 8 - 0 - 7 5 0 6 - 8 6 7 3 - 0
  • eBook
    9 7 8 - 0 - 0 8 - 0 8 8 8 1 1 - 8
With an increase of global security concerns over potential terrorist acts, the threat of WMDs, and increasing political issues with nations seeking nuclear capability, the need to track, detect, and safeguard nuclear material globally has never been greater. Nuclear Safeguards, Security and Nonproliferation is a comprehensive reference that covers cutting-edge technologies used to trace, track, and safeguard nuclear material. It is a contributed volume with sections contributed by scientists from leading institutions such as Los Alamos National Labs, Sandia National Labs, Pacific Northwest Nuclear Labs, and Texas A&M University, and the Monterey Institute of International Studies. The book is divided into 3 sections and includes 30 chapters on such topics as - the security of nuclear facilities and material, the illicit trafficking of nuclear materials, improvised nuclear devices, how to prevent nuclear terrorism. International case studies of security at nuclear facilities and illegal nuclear trade activities provide specific examples of the complex issues surrounding the technology and policy for nuclear material protection, control and accountability. Specific cases include analysis of the timely issues in the nuclear programs of countries such as North Korea, Iran, and Kazakstan among others. Nuclear Security is a must-have volume for the dozens of private and public organizations involved in driving Homeland Security, domestic, and international policy issues relating to nuclear material security, non-proliferation, and nuclear transparency.

Emergency Management and Tactical Response Operations

  • 1st Edition
  • May 22, 2008
  • Thomas D. Phelan
  • English
  • Paperback
    9 7 8 - 0 - 7 5 0 6 - 8 7 1 2 - 6
  • eBook
    9 7 8 - 0 - 0 8 - 0 8 7 8 6 0 - 7
Is emergency management education undoing an age-old tradition in the American Fire Service? Has the time arrived to educate emergency managers in college classrooms rather than in twenty years of tactical operations experience? Over one hundred forty-three (143) institutions of higher education are now offering certificate or degree programs in emergency management with no tactical operations experience required for admission. Resistance by veteran law enforcement officers and fire fighters may have to be overcome if we are to prepare emergency managers with required skill sets. Dr. Tom Phelan explores the skills being taught to emergency management students and addresses the concerns of experienced first responders in accepting their leadership.

Background Screening and Investigations

  • 1st Edition
  • March 19, 2008
  • W. Barry Nixon + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 7 5 0 6 - 8 2 5 6 - 5
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 9 1 7 - 8
Hiring highly qualified people is crucial to every company, and Background Screening and Investigations is an essential guide to succeeding in a turbulent business environment. A crucial part of any hiring process should be employment background screening, pre- and post-hire, which gives hiring personnel a glimpse into a person's past behavior patterns, propensities, and likely future behavior. Background Screening and Investigations describes all aspects of the employment background screening processes - its history and evolution, the imperative for implementing a screening process, and the creation of a comprehensive policy. Nixon and Kerr show how security and human resources professionals can work together to negotiate legal hurdles and make their background screening process successful.

Secrets Stolen, Fortunes Lost

  • 1st Edition
  • March 5, 2008
  • Richard Power + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 2 5 5 - 3
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 8 8 0 - 6
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.