Skip to main content

Books in Security

81-90 of 613 results in All results

Security Litigation

  • 1st Edition
  • October 9, 2015
  • Eddie Sorrells
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 9 2 4 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 9 3 7 - 5
Security Litigation: Best Practices for Managing and Preventing Security-Related Lawsuits provides practical guidance and examples on how to deal with the most difficult legal issues that security executives face every day, also exploring the key issues that occur before, during, and after a lawsuit. The book demonstrates scenarios that have actually played out in courtrooms, depositions, and contractual negotiations, and provides answers to challenging security litigation questions such as, What does this contractual provision mean if we get sued? Am I in legal trouble if I assign unarmed vs. armed officers and a crime occurs? How do I defend my company without blaming my customer? Increasingly, issues such as security surveys, contractual indemnification, and even marketing language are at the center of lawsuits concerning security practices. Many organizations face security-related lawsuits on an increasing basis, and this book provides a much needed resource to help security professionals successfully navigate the unique nature of security-related lawsuits. Accessibly written for those without a law background, the book assists readers through education, awareness, sample contract language, and assessment templates, offering meaningful recommendations and solutions.

Securing the Outdoor Construction Site

  • 1st Edition
  • September 21, 2015
  • Kevin Wright Carney
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 3 8 3 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 6 0 2 - 1
Securing the Outdoor Construction Site: Strategy, Prevention, and Mitigation offers a holistic view of security planning for vulnerable capital projects, providing the strategic and tactical plans needed to protect large areas with a minimum investment in personnel and equipment. This book is a one-stop reference that provides effective security strategies, methods, and tactics to mitigate the theft of equipment and how to avoid these incidents altogether. In addition, the book outlines the true costs of construction site theft to organizations in terms of lost time, equipment, and brand reputation, along with increased insurance premiums and danger to personnel. It lists the types of theft that regularly occur at sites, explores their underlying causes, and documents their worldwide financial significance. Finally, readers will learn how to conduct a construction site survey with loss prevention in mind, and how to budget for the unexpected.

Security Operations Management

  • 3rd Edition
  • September 11, 2015
  • Robert McCrie
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 6 1 8 - 2
Security Operations Management, 3rd edition, is the latest edition the seminal reference on corporate security management operations for today’s security management professionals and students. The book explores the characteristics of today’s globalized workplaces, why security has a key role within them, and what the greatest concern are to security practitioners and senior managers. Incorporating the latest security research and best practices, updates to Security Operations Management 3rd edition include explorations of the key skills needed by security managers to demonstrate the value of their security program, greater emphasis on identifying and managing risk, and coverage of the latest technological advances in security control, command, communications, and computing. The third edition also delves more deeply than previous editions into online security training practices, as well as investigates the changing roles of women and minorities in security operations.

Operational Policy Making for Professional Security

  • 1st Edition
  • September 9, 2015
  • Allen Sondej
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 6 2 8 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 7 8 8 - 3
Operational Policy Making for Professional Security: Practical Policy Skills for the Public and Private Sector is a clear, concise, and practical resource for drafting effective, legally defensible security policies. Presented in a clear, step-by-step style that can be tailored to fit the smallest organization to the largest, the book offers the strategies needed for reducing risk through solid policy construction. It is the first book available that provides a step-by-step guide to basic security policy construction, along with helpful hints on how to draft a document that conveys exactly what is intended. The book explores common policy creation pitfalls and how to avoid them, outlining proven methods for implementing and disseminating effective policies throughout any organization. Discussing the core security and safety policies that no organization should operate without, the book covers common types of policies, along with the pros and cons of different policy-making methodologies. It is a one-stop reference on functional security policy-making for organizational leaders.

Professional Penetration Testing

  • 1st Edition
  • August 31, 2015
  • Thomas Wilhelm
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 6 0 9 4 - 4
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability identification, vulnerability exploitation, privilege escalation, and test-data archival methods. It also discusses how to maintain access and cover one's tracks. It includes two video courses to teach readers fundamental and intermediate information-system penetration testing techniques, and to explain how to create and operate a formal hacking lab.The book is divided into three parts. Part 1 focuses on the professionals who are members of a penetration test team, the skills required to be an effective team member, and the ways to create a PenTest lab. Part 2 looks at the activities involved in a penetration test and how to run a PenTest to improve the overall security posture of the client. Part 3 discusses the creation of a final report for the client, cleaning up the lab for the next penetration test, and identifying the training needs of penetration-test team members. This book will benefit both experienced and novice penetration test practitioners.

You: For Sale

  • 1st Edition
  • August 20, 2015
  • Stuart Sumner
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 4 0 5 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 4 2 3 - 1
Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK – have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening for years, with firms such as Google capturing everything you type into a browser and selling it to the highest bidder. Apps take information about where you go, and your contact book details, harvest them and sell them on – and people just click the EULA without caring. No one is revealing the dirty secret that is the tech firms harvesting customers’ personal data and selling it for vast profits – and people are totally unaware of the dangers. You: For Sale is for anyone who is concerned about what corporate and government invasion of privacy means now and down the road. The book sets the scene by spelling out exactly what most users of the Internet and smart phones are exposing themselves to via commonly used sites and apps such as facebook and Google, and then tells you what you can do to protect yourself. The book also covers legal and government issues as well as future trends. With interviews of leading security experts, black market data traders, law enforcement and privacy groups, You: For Sale will help you view your personal data in a new light, and understand both its value, and its danger.

Active Shooter

  • 1st Edition
  • August 17, 2015
  • Kevin Doss + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 8 4 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 8 3 - 7
According to Pinkerton—the leading provider of risk management services in the world—workplace violence is second only to cybersecurity as the top threat faced by organizations today. Incidents involving active shooters in the workplace are on the rise and becoming more violent and deadly. Active Shooter provides the tools necessary to identify potential violent individuals, along with the options and responses needed to save lives, reduce corporate liability, and recover from an active shooter event should it happen. Active Shooter begins with a brief history of active shooters and how they have changed over time. It shows why many perpetrators initiate attacks, what they often are thinking, and some of the indicators that could have been identified prior to the attack. The book shows how to develop an active shooter program in an organization, walking readers through the entire process including training exercises to test the efficiency of the program. With the uniquely private security perspective, Active Shooter illustrates how to communicate with law enforcement, government agencies, and the media in the event of active shooter incident. The book concludes with a discussion of how organizations can recover promptly after an incident, which is crucial for operational survival.

Effective Security Management

  • 6th Edition
  • August 15, 2015
  • Charles A. Sennewald + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 2 7 7 4 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 9 0 - 5
Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers. The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media.

Smart Grid Security

  • 1st Edition
  • August 11, 2015
  • Florian Skopik + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 1 2 2 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 3 5 4 - 9
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times. Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.

Dissecting the Hack

  • 1st Edition
  • July 20, 2015
  • Jayson E Street
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 2 7 8 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 2 8 2 - 3
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest. "The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.