04268nam 2200589 450 991081001440332120200520144314.0(CKB)3710000000383055(EBL)2006456(OCoLC)908099831(SSID)ssj0001491894(PQKBManifestationID)11843513(PQKBTitleCode)TC0001491894(PQKBWorkID)11497618(PQKB)10530144(MiAaPQ)EBC2006456(Au-PeEL)EBL2006456(CaPaEBR)ebr11039203(CaONFJC)MIL760430(OCoLC)908064175(PPN)198667000(EXLCZ)99371000000038305520150413h20152015 uy 0engur|n|---|||||txtccrCorporate security management challenges, risks, and strategies /Marko Cabric ; designer, Mark RogersAmsterdam, [Netherlands] :Butterworth-Heinemann,2015.©20151 online resource (243 p.)Includes index.0-12-802935-8 0-12-802934-X ""Front Cover""; ""Corporate Security Management""; ""Copyright""; ""Dedication""; ""Contents""; ""About the Author""; ""Introduction""; ""Section 1 - What: Define""; ""Chapter 1 - About Security""; ""SECURITY AND ITS ESSENCE""; ""BASIC PRINCIPLES OF SECURITY""; ""GLOSSARY OF CORPORATE SECURITY TERMS AND ABBREVIATIONS""; ""Chapter 2 - Corporations and the Place of Corporate Security""; ""CORPORATIONS""; ""KEY CORPORATE PARTNERS OF SECURITY""; ""ABOUT CORPORATE SECURITY: THE PROFESSION AND ITS CHALLENGES""; ""GLOSSARY OF CORPORATE TERMS AND ABBREVIATIONS""; ""Section 2 - Who: Arrange""""Chapter 3 - The People""""CHIEF SECURITY OFFICER COMPETENCES""; ""SECURITY TEAM""; ""PRIVATE SECURITY INDUSTRY""; ""PEOPLE MANAGEMENT AND LEADERSHIP""; ""REFERENCE""; ""Section 3 - How: Organize""; ""Chapter 4 - Managing a Security Organization""; ""SECURITY MODELS ACCORDING TO INDUSTRY""; ""SECURITY MANAGEMENT STYLES""; ""KEY SUCCESS FACTORS IN MANAGING SECURITY PROCESSES""; ""CORPORATE SECURITY SETUP""; ""Chapter 5 - Incorporating Security Elements""; ""INFORMATION AND INTELLIGENCE""; ""SECURITY GOVERNANCE""; ""PEOPLE""; ""PHYSICAL ELEMENTS""; ""TECHNOLOGY (ELECTRONIC SYSTEMS)""""COMMUNICATION""""CONTROL""; ""Section 4 - Why: Understand""; ""Chapter 6 - Internal Risks""; ""OVERVIEW OF INTERNAL RISKS""; ""REPUTATIONAL RISKS""; ""EMBEZZLEMENT, THEFT, AND FRAUD""; ""ACTS OF PROTEST""; ""SEXUAL HARASSMENT AND MOBBING""; ""SUBSTANCE ABUSE AND GAMBLING""; ""INADEQUATE SECURITY RESILIENCE""; ""REFERENCES""; ""Chapter 7 - External Risks""; ""OVERVIEW OF EXTERNAL RISKS""; ""GLOBAL ISSUES VERSUS CORPORATE SECURITY""; ""CRIME""; ""CYBERCRIME AND HIGH-TECH CRIMES""; ""EXTERNAL FRAUDS""; ""CORPORATE EXPOSURE TO TERRORISM""; ""NATURAL FACTORS""; ""SPECIFIC RISKS TO PEOPLE""""DATA LEAKAGE""""EMERGENCY SITUATIONS""; ""REFERENCES""; ""Section 5 - Where: Allocate""; ""Chapter 8 - Physical Security""; ""FACILITY SECURITY""; ""SECURITY OF EVENTS""; ""Chapter 9 - Product""; ""SUPPLY CHAIN""; ""RETAIL LOSS PREVENTION""; ""REFERENCES""; ""Chapter 10 - Human Capital""; ""HUMAN RESOURCES""; ""SECURITY OF CORPORATE TRAVELERS AND EXPATRIATES""; ""REFERENCES""; ""Chapter 11 - Confidentiality, Integrity, and Availability""; ""CONFIDENTIALITY: BASIC INFORMATION SECURITY PRINCIPLES""; ""INTEGRITY: COMBATING FRAUD""; ""INTERNAL INVESTIGATIONS""""AVAILABILITY: BCM AND DISASTER RECOVERY""""Section 6 - When: Measure""; ""Chapter 12 - Analysis, Assessments, Planning, Control, and Administration""; ""THREAT ANALYSIS""; ""VULNERABILITY ASSESSMENT""; ""SECURITY PLANNING""; ""SECURITY METRICS/KPI""; ""TRAININGS AND EXERCISES""; ""Index""CorporationsSecurity measuresManagementCorporationsSecurity measuresManagement.658.47Cabric Marko890994Rogers MarkMiAaPQMiAaPQMiAaPQBOOK9910810014403321Corporate security management3953104UNINA