Skip to main content

Books in Security

601-610 of 613 results in All results

The Ultimate Financial Security Survey

  • 1st Edition
  • August 3, 1995
  • James L Schaub + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 4 3 6 8 - 8
The most in-depth and comprehensive financial security survey on the market, this book will help the reader reveal vulnerabilities and identify critical areas by aiding with the time-consuming job of the security survey. 'The Ultimate Financial Security Survey', with over 1000 questions, is a time saver for the security manager. This valuable tool will save hours of typing because the questions on disk can be used and re-used to design specific security surveys.Tailor a survey for one or one hundred facilities and protect against fraud, information theft and robbery. This book has everything necessary to achieve this goal.

Ultimate Computer Security Survey

  • 1st Edition
  • August 3, 1995
  • James L Schaub + 1 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 6 5 0 - 0
This valuable tool for the security manager will assist in tailoring surveys specifically for computer security. The Ultimate Computer Security Survey will allow security managers to take one of the most time-consuming and difficult areas of security -vulnerability assessment- and make it manageable. This bank of questions provides all the information needed to design numerous surveys for computer and data security. It takes into account that every facility and location, as well as the corporate complexion of every business, is distinctly different. The questions in this survery are all on a disk, which accompanies the book eliminating the need to retype anything, and saving valuable time.

Anti-Virus Tools and Techniques for Computer

  • 1st Edition
  • January 1, 1995
  • W. Timothy Polk + 3 more
  • English
  • Hardback
    9 7 8 - 0 - 8 1 5 5 - 1 3 6 4 - 3
  • eBook
    9 7 8 - 1 - 4 3 7 7 - 2 8 2 1 - 7
Anti-Virus Tools & Techniques for Computer

Media Equities

  • 1st Edition
  • January 1, 1995
  • Christopher Gasson
  • English
  • eBook
    9 7 8 - 0 - 8 5 7 0 9 - 9 9 8 - 3
This book provides an invaluable insight into one of the most influential global industries. It covers: publishing; broadcasting; newspapers and journals; advertising and public relations. Each section provides the reader with an analysis of potential costs and incomes, together with opportunities and associated risks. This provides a highly structured and informative view of the media industry. The final section provides an overview of the current developments and possibilities for the future.

The Effective Security Supervision Manual

  • 1st Edition
  • September 12, 1994
  • Ralph Brislin
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 7 1 6 7 - 6
Supervision is the cornerstone of good management. Security personnel are often promoted to supervision positions as a result of having performed successfully in their roles as a security officers. This practical manual provides new or experienced security supervisors with the essential tools and skills which will allow them to be more successful in supervising security officers and meeting the objectives of the organization.

Security Officer's Handbook

  • 1st Edition
  • February 23, 1994
  • Edward Kehoe
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 7 1 5 7 - 7
The Security Officer's Handbook fulfills the distinct need for a single methodof setting up the field operations needed to provide adequate protection to the client, firm or individual. The Standard Operating Procedure System asks all the questions required to survey any protection objective. In addition, the system provides all the basic information needed to answer those questions and leads to the implementation of the tactical or mission standard operating procedure. The Standard Operating Procedure System may be applied to any type of security or protection operation and may be modified, expanded or contracted, without needing to rewrite or redesign an existing security program.

Security: A Guide to Security System Design and Equipment Selection and Installation

  • 2nd Edition
  • January 15, 1994
  • Neil Cumming
  • English
  • Paperback
    9 7 8 - 0 - 7 5 0 6 - 9 6 2 4 - 1
Security: A Guide to Security System Design and Equipment Selection and Installation, second edition is the first comprehensive reference for electronic security systems. In eight chapters, it guides the reader through selection, installation, testing, and maintenance of security equipment in 35 categories, from interior and exterior sensors to security systems, The uninformed purchaser, the security-conscious manager, and the novice security practitioner will find that this book demystifies the "black art" of security systems design via clear descriptions of operation principles and extensive practical advice. The more knowledgeable reader will find a unique reference and compendium of information usually found in many separate sources. Each device explained in this book is broken down into sections covering its principles of operation, uses, applications, equipment types, and advantages and disadvantages. This important reference outlines the data objectively, enabling the reader to independently make informed judgments about competing bids or proposals, compile a brief, and design or maintain a security system. Neil Cumming is a partner at Dodd, Cumming, and Love, Consulting Engineers in Plymouth, England. As Projects Manager for all security projects, he is directly responsible for the design of all security systems from inception to completion for a variety of clients. In this role, Mr. Cumming has designed and supervised the installation of security systems on private and military sites throughout Britain and the Middle East. Starting working life as an apprentice electrician, Mr. Cumming later studies at the City University, London, earning a degree in Building Services and Environmental Engineering.

Private Security Law

  • 1st Edition
  • November 9, 1992
  • David Maxwell
  • English
  • Hardback
    9 7 8 - 0 - 7 5 0 6 - 9 0 3 4 - 8
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 7 1 3 7 - 9
Private Security Law: Case Studies is uniquely designed for the special needs of private security practitioners, students, and instructors. Part One of the book encompasses negligence, intentional torts, agency contracts, alarms, and damages. Part Two covers authority of the private citizen, deprivation of rights, and entrapment.The factual cases presented in this book touch on the everyday duties of persons associated with the private security industry. Private Security Law: Case Studies provides a basic orientation to problems capable of inciting litigation. The information presented through case laws comes from cases chosen for their factual, realistic, and practical connection to the private security industry. This focused approach addresses specific problem areas of the industry and provides information necessary to a security manager to avert future loss.

Computer Risk Manager

  • 1st Edition
  • October 31, 1992
  • K.R. Pursall
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 6 7 8 - 4
Please note this is a Short Discount publication.A comprehensive guide to EDP contingency planning and disaster recovery.Thoroughly revised and updated from the last edition [published 1989], this best selling management guide has been re–written to reflect the latest thinking on contingency planning.The new third edition follows the same step–by–step practical guidance as the last edition – presenting an immediate source of reference for anyone wanting to develop their own contingency plan BEFORE a systems disaster. As well as a useful check for those assessing the security of their present systems.Who should read it:★ IT Managers★ Operations Managers★ Computer Security Managers★ MIS Managers★ Technical Support Managers★ Computer Manufacturers and Suppliers★ Computer Auditors★ General Managers

Data Protection and Security for Personal Computers

  • 1st Edition
  • October 30, 1992
  • R. Schifreen
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 4 7 4 - 2
Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively.Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security conscious manager in an organization.Practical, comprehensive and easy to read, this guide will ensure that the reader is aware of everything concerned with maintaining the confidentiality, availability and integrity of data on personal computers and local area networks.UNIQUE FEATURES INCLUDE:– Totally PC and LAN specific– Practical tips and guidance– Comprehensive coverage of the topic– Unique action sheets for immediate implementation– Step–by– step coverage, easy to read, with limited technical jargonWHO SHOULD READ THIS GUIDE:– PC support managers, security managers, IT managers, sales and marketing managers, personnel officers, financial directors and all those responsible for corporate data.– Senior managers who wish to ensure that data on their employees PC's is safe at all times.– Managers with little computing or security experience who wish to implement a security policy throughout an organization.Please note this is a Short Discount publication.