Skip to main content

Books in Security management

91-100 of 132 results in All results

Maritime Security

  • 1st Edition
  • December 14, 2007
  • Michael McNicholas
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 1 9 5 3 - 9
The commercial maritime sector is highly vulnerable to theft and piracy, and presents a probable target for a major terrorist attack. The best way to prevent losses is to apply lessons learned in another arena-–the struggle to curb drug smuggling. This effort has shown that successes can be achieved when effective and comprehensive security measures and procedures are implemented at key initial links in the cargo supply chain. The integrity and security of whole system are improved when efforts are focused at the primary "choke point" – the load seaports and their ships. This book provides practical, experience-based, and proven knowledge - and a "how-to-guide" - on maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what threats currently exist; what security policies, procedures, systems, and measures must be implemented to mitigate these threats; and how to conduct ship and port security assessments and plans. Whether the problem is weapons of mass destruction or cargo theft, Maritime Security provides invaluable guidance for the professionals who protect our shipping and ports.

The Best Damn IT Security Management Book Period

  • 1st Edition
  • December 14, 2007
  • Susan Snedaker + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 7 3 3 - 5
The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and security professionals and is an ideal resource for those dealing with a changing daily workload.Coverage includes Business Continuity, Disaster Recovery, Risk Assessment, Protection Assets, Project Management, Security Operations, and Security Management, and Security Design & Integration.Compiled from the best of the Syngress and Butterworth Heinemann libraries and authored by business continuity expert Susan Snedaker, this volume is an indispensable addition to a serious security professional's toolkit.

Security Supervision and Management

  • 3rd Edition
  • November 6, 2007
  • IFPO
  • Sandi J. Davies
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 3 9 9 - 3
The International Foundation for Protection Officers (IFPO) has for many years provided materials to support its certification programs. The current edition of this book is being used as the core text for the Security Supervision and Management Training/Certified in Security Supervision and Management (CSSM) Program at IFPO. The CSSM was designed in 1988 to meet the needs of the security supervisor or senior protection officer. The book has enjoyed tremendous acceptance and success in the past, and the changes in this third edition, vetted by IFPO, make it still more current and relevant. Updates include 14 new chapters, 3 completely revised chapters, "Student Performance Objectives" in each chapter, and added information on related resources (both print and online).

Security and Loss Prevention

  • 5th Edition
  • October 24, 2007
  • Philip Purpura
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 4 0 0 - 6
Security and Loss Prevention, Fifth Edition, encompasses the breadth and depth of considerations involved in implementing general loss prevention concepts and security programs within an organization. It presents proven strategies to prevent and reduce incidents of loss due to legal issues, theft and other crimes, fire, accidental or intentional harm from employees as well as the many ramifications of corporate mismanagement. It contains a brand new terrorism chapter, along with coverage on background investigations, protection of sensitive information, internal threats, and considerations at select facilities (nuclear, DoD, government and federal). Author Philip Purpura once again demonstrates why students and professionals alike rely on this best-selling text as a timely, reliable resource. This book is an ideal resource for criminal justice and security academic programs, physical security professionals, retail security professionals, security managers, security consultants, law enforcement professionals, investigations professionals, risk and contingency planning professionals.

The History of Information Security

  • 1st Edition
  • August 28, 2007
  • Karl Maria Michael de Leeuw + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 4 4 4 - 5 1 6 0 8 - 4
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 0 5 8 - 9
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered. There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.

The Corporate Security Professional's Handbook on Terrorism

  • 1st Edition
  • August 28, 2007
  • Edward Halibozek + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 7 5 0 6 - 8 2 5 7 - 2
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 1 8 8 - 3
The Corporate Security Professional's Handbook on Terrorism is a professional reference that clarifies the difference between terrorism against corporations and their assets, versus terrorism against government assets. It addresses the existing misconceptions regarding how terrorism does or does not affect corporations, and provides security professionals and business executives with a better understanding of how terrorism may impact them. Consisting three sections, Section I provides an explanation of what terrorism is, its history, who engages in it, and why. Section II focuses on helping the security professional develop and implement an effective anti-terrorism program in order to better protect the employees and assets of the corporation. Section III discusses the future as it relates to the likelihood of having to deal with terrorism. The book provides the reader with a practitioner’s guide, augmented by a historical assessment of terrorism and its impact to corporations, enabling them to immediately put in place useful security processes and methods to protect their corporate interests against potential acts of terror. This is guide is an essential tool for preparing security professionals and company executives to operate in an increasingly hostile global business environment.

Security Convergence

  • 1st Edition
  • June 7, 2007
  • Dave Tyson
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 4 6 2 6 - 1
Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how organizations and corporations will protect their assets.

The Art of War for Security Managers

  • 1st Edition
  • May 29, 2007
  • Scott Watson
  • English
  • Paperback
    9 7 8 - 0 - 7 5 0 6 - 7 9 8 5 - 5
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 2 2 0 1 - 2
The classic book The Art of War (or as it is sometimes translated, The Art of Strategy) by Sun Tzu is often used to illustrate principles that can apply to the management of business environments. The Art of War for Security Managers is the first book to apply the time-honored principles of Sun Tzu’s theories of conflict to contemporary organizational security.Corporate leaders have a responsibility to make rational choices that maximize return on investment. The author posits that while conflict is inevitable, it need not be costly. The result is an efficient framework for understanding and dealing with conflict while minimizing costly protracted battles, focusing specifically on the crucial tasks a security manager must carry out in a 21st century organization.

Security Design Consulting

  • 1st Edition
  • May 2, 2007
  • Brian Gouin
  • English
  • Hardback
    9 7 8 - 0 - 7 5 0 6 - 7 6 8 8 - 5
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 3 0 5 - 3
A crucial reference for the practicing or aspiring design consultant, Security Design Consulting brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, Security Design Consulting gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant’s important and growing role in an overall security program.

Encyclopedia of Security Management

  • 2nd Edition
  • May 2, 2007
  • John Fay
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 4 6 0 6 - 3
The Encyclopedia of Security Management is a valuable guide for all security professionals, and an essential resource for those who need a reference work to support their continuing education. In keeping with the excellent standard set by the First Edition, the Second Edition is completely updated. The Second Edition also emphasizes topics not covered in the First Edition, particularly those relating to homeland security, terrorism, threats to national infrastructures (e.g., transportation, energy and agriculture) risk assessment, disaster mitigation and remediation, and weapons of mass destruction (chemical, biological, radiological, nuclear and explosives). Fay also maintains a strong focus on security measures required at special sites such as electric power, nuclear, gas and chemical plants; petroleum production and refining facilities; oil and gas pipelines; water treatment and distribution systems; bulk storage facilities; entertainment venues; apartment complexes and hotels; schools; hospitals; government buildings; and financial centers. The articles included in this edition also address protection of air, marine, rail, trucking and metropolitan transit systems.