Skip to main content

Books in Security management

    • The Professional Protection Officer

      • 1st Edition
      • March 9, 2010
      • IFPO
      • Sandi J. Davies
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 7 4 6 7
      • eBook
        9 7 8 0 0 8 0 9 6 1 6 4 4
      The Professional Protection Officer: Security Strategies, Tactics and Trends, Second Edition, is the definitive reference and instructional text for career oriented security officers in both the private and public sectors. The first edition originated with the birth of the International Foundation for Protection Officers (IFPO) in 1988, which has been using the book as the official text since that time. Each subsequent edition has brought new and enlightened information to the protection professional. The material in this new edition includes all of the subjects essential to training of protection professionals, and has been updated to reflect new strategies, tactics, and trends in this dynamic field.Written by leading security educators, trainers and consultants, this valuable resource has served as the definitive text for both students and professionals worldwide. This new edition adds critical updates and fresh pedagogy, as well as new diagrams, illustrations, and self assessments. The Professional Protection Officer: Security Strategies, Tactics and Trends is tailored to the training and certification needs of today’s protection professionals and proves to be the most exciting and progressive edition yet.
    • Seven Deadliest Microsoft Attacks

      • 1st Edition
      • March 1, 2010
      • Rob Kraus + 3 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 5 5 1 6
      • eBook
        9 7 8 1 5 9 7 4 9 5 5 2 3
      Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the most closely guarded company secrets. If you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products, this book is for you. It pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.The book consists of seven chapters that cover the seven deadliest attacks against Microsoft software and networks: attacks against Windows passwords; escalation attacks; stored procedure attacks; mail service attacks; client-side ActiveX and macro attacks; Web service attacks; and multi-tier attacks. Each chapter provides an overview of a single Microsoft software product, how it is used, and some of the core functionality behind the software. Furthermore, each chapter explores the anatomy of attacks against the software, the dangers of an attack, and possible defenses to help prevent the attacks described in the scenarios.This book will be a valuable resource for those responsible for oversight of network security for either small or large organizations. It will also benefit those interested in learning the details behind attacks against Microsoft infrastructure, products, and services; and how to defend against them. Network administrators and integrators will find value in learning how attacks can be executed, and transfer knowledge gained from this book into improving existing deployment and integration practices.
    • Network and System Security

      • 1st Edition
      • February 27, 2010
      • John Vacca
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 5 3 5 6
      • eBook
        9 7 8 1 5 9 7 4 9 5 3 6 3
      Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization; cryptography; system intrusion; UNIX and Linux security; Internet security, intranet security; LAN security; wireless network security; cellular network security, RFID security, and more. This compilation of 13 chapters is tightly focused and ideally suited as an essential desk reference in this high-growth subject area.
    • Digital Video Surveillance and Security

      • 1st Edition
      • February 23, 2010
      • Anthony C. Caputo
      • English
      • eBook
        9 7 8 0 0 8 0 9 6 1 6 9 9
      Digital Video Surveillance and Security provides a blueprint for the IP-based electronic security system clients need, allowing security professionals to protect their client's place of business or home. The author gives detailed plans on the best camera position, areas of coverage, and hardware and software to select to maximize the effectiveness of newer lower-cost networked technologies. Clear, step-by-step descriptions and detailed illustrations describe the integration of such components as the current or new security system, door and window sensors, or other access controls, offering the capability of instantly launching a video of the area under surveillance on a computer or HDTV. Today's digital video surveillance solutions are networked, digitally archived, offering granular, managed accessibility from anywhere (any office, home, PDA, or smart phone), and providing interoperability and simple scalability. With recent advances in technology, DVS is economically attainable for most businesses. Security consultants can use this information to guide their clients in making budget-friendly choices of design and equipment and assembling the optimal system for their needs. Systems installers can use this step-by-step illustrated guide to master this crucial new technology.
    • Seven Deadliest Web Application Attacks

      • 1st Edition
      • February 20, 2010
      • Mike Shema
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 5 4 3 1
      • eBook
        9 7 8 1 5 9 7 4 9 5 4 4 8
      Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter presents examples of different attacks conducted against web sites. The methodology behind the attack is explored, showing its potential impact. The chapter then moves on to address possible countermeasures for different aspects of the attack. The book consists of seven chapters that cover the following: the most pervasive and easily exploited vulnerabilities in web sites and web browsers; Structured Query Language (SQL) injection attacks; mistakes of server administrators that expose the web site to attack; brute force attacks; and logic attacks. The ways in which malicious software malware has been growing as a threat on the Web are also considered. This book is intended for information security professionals of all levels, as well as web application developers and recreational hackers.
    • Hospital Emergency Response Teams

      • 1st Edition
      • November 19, 2009
      • Jan Glarum + 2 more
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 7 0 1 6
      • eBook
        9 7 8 0 0 8 0 9 6 4 9 5 9
      Hospital Emergency Response Teams aims to provide authoritative training for hospital personnel in the emergency department, as well community-level medical service personnel, assisting them in times of disaster and emergency. Comprised of six chapters, the book covers various aspects of emergency response. Some of the aspects are the National Incident Management System (NIMS) implementation activities for hospitals and health care systems and the Hospital Incident Command System (HICS) IV missions. The book also explains the implementation issues, requirements, and timelines in establishing an internal HICS IV program. It presents the assessment of likely mass casualty events and potential hospital impact. The book also features appendices for emergency response team checklists, PPE donning and doffing guide, ambulatory and non-ambulatory decontamination setup, ETA exercises, and ETA drills.The book is intended to provide understanding of emergency response to first emergency medicine professionals, first responders, security staff, community-level disaster planners, and public health and disaster management researchers.
    • Hospital and Healthcare Security

      • 5th Edition
      • October 12, 2009
      • Tony W. York + 1 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 3 9 2 2
      • Hardback
        9 7 8 1 8 5 6 1 7 6 1 3 2
      • eBook
        9 7 8 0 0 8 0 8 8 6 0 2 2
      Hospital and Healthcare Security, Fifth Edition, examines the issues inherent to healthcare and hospital security, including licensing, regulatory requirements, litigation, and accreditation standards. Building on the solid foundation laid down in the first four editions, the book looks at the changes that have occurred in healthcare security since the last edition was published in 2001. It consists of 25 chapters and presents examples from Canada, the UK, and the United States. It first provides an overview of the healthcare environment, including categories of healthcare, types of hospitals, the nonhospital side of healthcare, and the different stakeholders. It then describes basic healthcare security risks/vulnerabilitie... and offers tips on security management planning. The book also discusses security department organization and staffing, management and supervision of the security force, training of security personnel, security force deployment and patrol activities, employee involvement and awareness of security issues, implementation of physical security safeguards, parking control and security, and emergency preparedness. Healthcare security practitioners and hospital administrators will find this book invaluable.
    • The Law of Emergencies

      • 1st Edition
      • June 22, 2009
      • Nan D. Hunter
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 5 4 7 0
      • eBook
        9 7 8 0 0 8 0 9 4 9 7 9 6
      The Law of Emergencies discusses the legal framework for disaster response and emergency management. The book engages with and debates some of the most important Constitutional issues of our time, such as the tension between civil liberties and national security. It also examines how the law of emergencies plays out in the context of real life emergencies where individuals often have to make split-second decisions. It analyzes legal authority at the federal, state and local levels, placing the issues in historical context but concentrating on contemporary questions. This book includes primary texts, reader-friendly expository explanations, and sample discussion questions. Prior knowledge of the law is not necessary in order to use and understand this book. The contents are organized into 13 substantive chapters plus two additional chapters with problem sets, making the book especially easy to use for a separate course focused on law. The book leads students through the process of understanding both what the law requires and how to analyze issues for which there is no clear legal answer. It features materials on such critical issues as how to judge the extent of Constitutional authority for government to intervene in the lives and property of American citizens. At the same time, it also captures bread-and-butter issues such as responder liability and disaster relief methods. No other book brings these components together in a logically organized, step by step fashion. The book also features case studies of high-risk scenarios including pandemic flu, together with charts and text boxes for clarification. This book will be of interest to graduate and undergraduate students studying the major legal principles underlying emergency management and homeland security policy and operations; professionals in EM and HS; and private-sector risk managers.
    • Securing Intellectual Property

      • 1st Edition
      • December 1, 2008
      • Information Information Security
      • English
      • Paperback
        9 7 8 0 7 5 0 6 7 9 9 5 4
      • eBook
        9 7 8 0 0 8 0 9 4 1 4 1 7
      Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
    • Introduction to Homeland Security

      • 3rd Edition
      • July 28, 2008
      • Jane Bullock + 2 more
      • English
      • eBook
        9 7 8 0 0 8 0 9 4 9 5 2 9
      Bullock and Haddow have set the standard for homeland security textbooks, and they follow up their top-selling second edition with this substantially improved third edition. Professional practitioners value the decades of experience that the authors bring to their analysis, and their passionate argument for an all-hazards approach to enhancing America's safety is now presented still more cogently.Links to the most current online government information help to keep the text up-to-date in this rapidly developing field.The bedrock principles of preparing for, mitigating, managing, and recovering from a disaster remain the same through the years, and this revision emphasizes their value with new clarity and conviction.