|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910583325603321 |
|
|
Autore |
Kovacich Gerald L. |
|
|
Titolo |
Security metrics management : measuring the effectiveness and efficiency of a security program / / Dr. Gerald L. Kovacich, Edward P. Halibozek |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Oxford, United Kingdom : , : Butterworth-Heinemann, , [2017] |
|
�2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[Second edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xxxiii, 272 pages) : illustrations |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Private security services |
Security systems |
Corporations - Security measures |
Corporations - Security measures - Costs |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
chapter 1. Security metrics management program : an overview -- chapter 2. Corporate assets protection program -- chapter 3. Personnel security -- chapter 4. Information security -- chapter 5. Security compliance audits -- chapter 6. Security education and awareness -- chapter 7. Surveys and risk management -- chapter 8. Contingency planning -- chapter 9. The guard force -- chapter 10. Technical security systems -- chapter 11. Locks and keys -- chapter 12. Fire protection -- chapter 13. Event security -- chapter 14. Executive protection -- chapter 15. Investigations and noncompliance inquiries -- chapter 16. Government security -- chapter 17. Information systems security -- chapter 18. Mergers, acquisitions, or divestitures security -- chapter 19. Outsourcing -- chapter 20. A look into the future. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This guide provides support for managing an asset protection program and related security functions through the use of metrics. It covers budget matters necessary to justify the cost-effectiveness of security-related decisions to senior management and other key decision-makers and details the application of quantitative, statistical, and/or mathematical analyses to measure security functional trends and |
|
|
|
|