Skip to main content

Books in Social sciences and humanities

    • Media Exposure and Risk

      • 1st Edition
      • June 4, 2013
      • Kenneth Kasten
      • English
      • eBook
        9 7 8 0 1 2 4 1 6 9 9 1 3
      Media Exposure and Risk is a video presentation. Length: 15 minutes. Media Exposure and Risk discusses the risk of exposure of security-sensitive information through corporate communications. This 15-minute video presentation of narrated slides describes strategies to prevent sensitive information from reaching the public through a press release, web page, annual report, or other type of corporate communication. Presenter Kenneth Kasten, former director of security at Carlson, provides numerous examples of the ways security practitioners can eliminate risk by identifying and removing sensitive personal and corporate information in communications. Any personal information, medical history, family information, business data, transportation and travel information, photographs, or timing information are areas of concern. This presentation is an excellent resource for business leaders and risk mitigation professionals who want to maintain a corporate reputation of transparency and openness without introducing unnecessary risk. Media Exposure and Risk is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Personnel Protection: Concepts of Executive Security

      • 1st Edition
      • May 31, 2013
      • Jerome Miller + 1 more
      • English
      • eBook
        9 7 8 0 1 2 4 1 6 9 8 8 3
      Personnel Protection: Concepts of Executive Security is a video presentation. Length: 16 minutes. Personnel Protection: Concepts of Executive Security serves as an introduction to the concepts of executive security and as a guide for developing an executive security program. In this 16-minute video presentation of narrated slides, the two approaches to executive security, proactive and reactive, are defined. It also includes information about the selection of security personnel for the executive security team, security advance procedures, and executive security program objectives. This presentation is one of 11 modules in the Personnel Protection presentation series, which is designed for organizations considering an executive security program or that need to enhance an existing executive security program. Each presentation in the series is narrated by Jerome Miller, formerly a commander in the Detroit Police Department and senior manager of international and special security operations at Chrysler Corporation, and Radford Jones, formerly the manager of global security and fire protection at Ford Motor Company after 20 years with the U.S. Secret Service. Other topics in this series include: advance procedures; the executive threat assessment profile; the selection of executive security personnel; kidnapping issues and guidelines; security procedures for residences; worksite, aircraft, and vehicle operations; and executive compensation issues, including IRS requirements. Personnel Protection: Concepts of Executive Security is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Personnel Protection: Aircraft Security

      • 1st Edition
      • May 31, 2013
      • Jerome Miller + 1 more
      • English
      • eBook
        9 7 8 0 1 2 4 1 6 9 8 9 0
      Personnel Protection: Aircraft Security is a video presentation. Length: 13 minutes. Personnel Protection: Aircraft Security describes how, in conjunction with the aircraft operations team, the security team must be equipped mitigate aircraft risks. This 13-minute video presentation of narrated slides provides strategies for preparing for unintentional and intentional threats to aircraft security, which could take the form of, for example, the unintentional release of an executive’s flight times or the planned sabotage of aircraft equipment. This presentation is one of 11 modules in the Personnel Protection presentation series, which is designed for organizations considering an executive security program or that need to enhance an existing executive security program. Each presentation in the series is narrated by Jerome Miller, formerly a commander in the Detroit Police Department and senior manager of international and special security operations at Chrysler Corporation, and Radford Jones, formerly manager of global security and fire protection at Ford Motor Company after 20 years with the U.S. Secret Service. Other topics in this series include: advance procedures; the concepts of executive security; the executive threat assessment profile; the selection of executive security personnel; kidnapping issues and guidelines; security procedures for residences; worksite and vehicle operations; and executive compensation issues, including IRS requirements. Personnel Protection: Aircraft Security is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Corporate Security Organizational Structure, Cost of Services and Staffing Benchmark

      • 1st Edition
      • May 29, 2013
      • Bob Hayes + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 0 0 2 5
      • eBook
        9 7 8 0 1 2 4 1 6 9 9 6 8
      This research report presents the findings of a broad survey of corporate security programs conducted by the Security Executive Council’s Security Leadership Research Institute (SLRI). The researchers' objective was to benchmark the state of the security industry in terms of organizational structure, budget, staff resources, board-level risk concerns, program drivers, and services provided. The level of responsibility each respondent reported for a list of 30 security programs or services is also compared across several organizational categories. This report can be used by security professionals for introspective analysis of the security team within their organizations, external review of the ways in which other organizations approach risk management, internal justification of security budgets and initiatives, and for performance metrics. Corporate Security Organizational Structure, Cost of Services and Staffing Benchmark is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • An Introduction to the Mathematics of Finance

      • 2nd Edition
      • May 28, 2013
      • Stephen Garrett
      • English
      • Paperback
        9 7 8 0 0 8 1 0 1 3 0 2 1
      • eBook
        9 7 8 0 0 8 0 9 8 2 7 5 5
      An Introduction to the Mathematics of Finance: A Deterministic Approach, Second edition, offers a highly illustrated introduction to mathematical finance, with a special emphasis on interest rates. This revision of the McCutcheon-Scott classic follows the core subjects covered by the first professional exam required of UK actuaries, the CT1 exam. It realigns the table of contents with the CT1 exam and includes sample questions from past exams of both The Actuarial Profession and the CFA Institute. With a wealth of solved problems and interesting applications, An Introduction to the Mathematics of Finance stands alone in its ability to address the needs of its primary target audience, the actuarial student.
    • The Benefits and Security Risks of Web-Based Applications for Business

      • 1st Edition
      • May 28, 2013
      • Kathleen Kotwica
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 0 0 1 8
      • eBook
        9 7 8 0 1 2 4 1 6 9 8 7 6
      This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration, and marketing and publicity outreach. The benefits of web-based applications for business are many, but so too are the risks associated with them. Data leakage, information manipulation, malware, and authentication security are just a few of the cyber threats discussed in this report. It is critical to weigh the pros and cons of implementing a web-based application in the workplace and plan accordingly to mitigate risk. This report is a valuable resource for any security professional who is considering the adoption of a web-based application for corporate use. The Benefits and Security Risks of Web-Based Applications for Business is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Homicide Investigation Field Guide

      • 1st Edition
      • May 25, 2013
      • D'Michelle P. DuPre
      • English
      • eBook
        9 7 8 0 1 2 4 1 0 4 4 0 2
      This practical field guide contains many of the checklists necessary to guide the first responder step-by-step through procedures, tactics, and forensic techniques used in sudden death and violent death investigations. Using these protocols, techniques and checklists will ensure that a proper and complete investigation is undertaken at the death scene.
    • Markov Processes for Stochastic Modeling

      • 2nd Edition
      • May 22, 2013
      • Oliver Ibe
      • English
      • Hardback
        9 7 8 0 1 2 4 0 7 7 9 5 9
      • Paperback
        9 7 8 0 3 2 3 2 8 2 9 5 6
      • eBook
        9 7 8 0 1 2 4 0 7 8 3 9 0
      Markov processes are processes that have limited memory. In particular, their dependence on the past is only through the previous state. They are used to model the behavior of many systems including communications systems, transportation networks, image segmentation and analysis, biological systems and DNA sequence analysis, random atomic motion and diffusion in physics, social mobility, population studies, epidemiology, animal and insect migration, queueing systems, resource management, dams, financial engineering, actuarial science, and decision systems. Covering a wide range of areas of application of Markov processes, this second edition is revised to highlight the most important aspects as well as the most recent trends and applications of Markov processes. The author spent over 16 years in the industry before returning to academia, and he has applied many of the principles covered in this book in multiple research projects. Therefore, this is an applications-oriente... book that also includes enough theory to provide a solid ground in the subject for the reader.
    • Challenging Behavior

      • 1st Edition
      • Volume 44
      • May 19, 2013
      • English
      • eBook
        9 7 8 0 1 2 4 0 1 7 2 5 2
      International Review of Research in Developmental Disabilities is an ongoing scholarly look at research into the causes, effects, classification systems, syndromes, etc. of developmental disabilities. Contributors come from wide-ranging perspectives, including genetics, psychology, education, and other health and behavioral sciences. Volume 44 of the series offers chapters on challenging behavior.
    • Introduction to Cyber-Warfare

      • 1st Edition
      • May 16, 2013
      • Paulo Shakarian + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 8 1 4 7
      • eBook
        9 7 8 0 1 2 4 0 7 9 2 6 7
      Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.