top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
Autore Watson Scott A
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Descrizione fisica 1 online resource (199 p.)
Disciplina 658.4/7
658.47
Soggetto topico Conflict management
Risk management
Crisis management
Soggetto genere / forma Electronic books.
ISBN 1-281-02250-0
9786611022501
0-08-052201-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; The Art of War for Security Managers; Copyright page; Table of contents; Preface; Acknowledgments; Chapter 1: Introduction to The Art of War; Executive Summary; Today's Threat Environment; Who Was Sun Tzu?; Applications of The Art of War; The Art of War for Security Managers; Discussion Questions; Chapter 2: Be a Leader!; Executive Summary; Who Would You Follow into Battle?; Fundamental Questions; Who Should Lead and Why?; The Leader's Role and Characteristics; Failures of Leadership; Leadership; Discussion Questions; Chapter 3: Accept the Inevitability of Conflict
Executive SummaryConflict Is Inevitable; World-View and Conflict; Business World Conflicts; The Security Manager and Conflict; Chapter 3 Scenario; Discussion Questions; Chapter 4: Know Yourself and Know Your Enemy; Executive Summary; Who Is the Enemy?; Discussion Questions; Chapter 5: Conduct Strategic Assessments; Executive Summary; Strategy and Tactics; Sun Tzu's View of Strategic Assessments; Sun Tzu's Strategic Assessments for the Security Manager; Conducting a Strategic Assessment; Chapter 5 Scenario; Discussion Questions; Chapter 6: Remember What Is Really Important; Executive Summary
The SchoolyardThe Battlefield; Lessons Learned; The Business World; What Really Matters?; The Department; The Security Manager; Victory Is Important, Not Persistence; Chapter 6 Scenario; Discussion Questions; Chapter 7: Engage the Enemy; Executive Summary; Preparations; The Context of Battle; Types of Militarists; Fundamental Concepts of Battle; The Battle Equation; Basic Battle Strategies; Choosing a Basic Battle Strategy; Chapter 7 Scenario; Discussion Questions; Chapter 8: Maneuver Your Army; Executive Summary; Terrain and Position; Rules for Maneuvering Armies; Movement
Chapter 8 ScenarioDiscussion Questions; Chapter 9: Adapt to the Battlefield; Executive Summary; Dynamics of the Conventional and Unconventional; Adaptation and the Security Manager; Conventional Security Management Knowledge; Unconventional Knowledge; Chapter 9 Scenario 1; Chapter 9 Scenario 2; Discussion Questions; Chapter 10: Avoid Predictability; Executive Summary; Predictability: The Ultimate Strategic Advantage or Detriment; The Balance; Avoiding Predictability; Chapter 10 Scenario 1; Chapter 10 Scenario 2; Discussion Questions; Chapter 11: Collect Intelligence; Executive Summary
The Importance of IntelligenceThe Intelligence Cycle; Evaluating Your Intelligence Capability; Intelligence: A Key Concept; Chapter 11 Scenario; Discussion Questions; Chapter 12: The Art of War and Homeland Security; Executive Summary; "Objectivity" and the War on Terror; September 11, 2001-A Watershed Event; The Wrong Question; The Right Questions; The Private Sector; The Big Question; Definitional Problems; Sun Tzu and the War on Terrorism; A Continual War on Terrorism; Conclusions; Appendix: The Armory; Annotated Bibliography; Index
Record Nr. UNINA-9910457075003321
Watson Scott A  
Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
Autore Watson Scott A
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Descrizione fisica 1 online resource (199 p.)
Disciplina 658.4/7
658.47
Soggetto topico Conflict management
Risk management
Crisis management
ISBN 1-281-02250-0
9786611022501
0-08-052201-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; The Art of War for Security Managers; Copyright page; Table of contents; Preface; Acknowledgments; Chapter 1: Introduction to The Art of War; Executive Summary; Today's Threat Environment; Who Was Sun Tzu?; Applications of The Art of War; The Art of War for Security Managers; Discussion Questions; Chapter 2: Be a Leader!; Executive Summary; Who Would You Follow into Battle?; Fundamental Questions; Who Should Lead and Why?; The Leader's Role and Characteristics; Failures of Leadership; Leadership; Discussion Questions; Chapter 3: Accept the Inevitability of Conflict
Executive SummaryConflict Is Inevitable; World-View and Conflict; Business World Conflicts; The Security Manager and Conflict; Chapter 3 Scenario; Discussion Questions; Chapter 4: Know Yourself and Know Your Enemy; Executive Summary; Who Is the Enemy?; Discussion Questions; Chapter 5: Conduct Strategic Assessments; Executive Summary; Strategy and Tactics; Sun Tzu's View of Strategic Assessments; Sun Tzu's Strategic Assessments for the Security Manager; Conducting a Strategic Assessment; Chapter 5 Scenario; Discussion Questions; Chapter 6: Remember What Is Really Important; Executive Summary
The SchoolyardThe Battlefield; Lessons Learned; The Business World; What Really Matters?; The Department; The Security Manager; Victory Is Important, Not Persistence; Chapter 6 Scenario; Discussion Questions; Chapter 7: Engage the Enemy; Executive Summary; Preparations; The Context of Battle; Types of Militarists; Fundamental Concepts of Battle; The Battle Equation; Basic Battle Strategies; Choosing a Basic Battle Strategy; Chapter 7 Scenario; Discussion Questions; Chapter 8: Maneuver Your Army; Executive Summary; Terrain and Position; Rules for Maneuvering Armies; Movement
Chapter 8 ScenarioDiscussion Questions; Chapter 9: Adapt to the Battlefield; Executive Summary; Dynamics of the Conventional and Unconventional; Adaptation and the Security Manager; Conventional Security Management Knowledge; Unconventional Knowledge; Chapter 9 Scenario 1; Chapter 9 Scenario 2; Discussion Questions; Chapter 10: Avoid Predictability; Executive Summary; Predictability: The Ultimate Strategic Advantage or Detriment; The Balance; Avoiding Predictability; Chapter 10 Scenario 1; Chapter 10 Scenario 2; Discussion Questions; Chapter 11: Collect Intelligence; Executive Summary
The Importance of IntelligenceThe Intelligence Cycle; Evaluating Your Intelligence Capability; Intelligence: A Key Concept; Chapter 11 Scenario; Discussion Questions; Chapter 12: The Art of War and Homeland Security; Executive Summary; "Objectivity" and the War on Terror; September 11, 2001-A Watershed Event; The Wrong Question; The Right Questions; The Private Sector; The Big Question; Definitional Problems; Sun Tzu and the War on Terrorism; A Continual War on Terrorism; Conclusions; Appendix: The Armory; Annotated Bibliography; Index
Record Nr. UNINA-9910784354503321
Watson Scott A  
Amsterdam ; ; Boston, : Syngress/Elsevier, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Augmented reality : an emerging technologies guide to AR / Gregory Kipper, Joseph Rampolla
Augmented reality : an emerging technologies guide to AR / Gregory Kipper, Joseph Rampolla
Autore Kipper, Gregory
Pubbl/distr/stampa Amsterdam ; Boston, MA : Syngress/Elsevier, c2013
Descrizione fisica xvi, 158 p. : ill. ; 24 cm
Disciplina 006.8
Altri autori (Persone) Rampolla, Josephauthor
Soggetto topico Augmented reality
Human-computer interaction
Real-time data processing
ISBN 9781597497336
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISALENTO-991002424279707536
Kipper, Gregory  
Amsterdam ; Boston, MA : Syngress/Elsevier, c2013
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
The IT/digital legal companion : a comprehensive business guide to software, Internet, and IP law : includes contracts and web forms / / Gene K. Landy ; editing and additional content by Amy J. Mastrobattista
The IT/digital legal companion : a comprehensive business guide to software, Internet, and IP law : includes contracts and web forms / / Gene K. Landy ; editing and additional content by Amy J. Mastrobattista
Autore Landy Gene K
Edizione [1st edition.]
Pubbl/distr/stampa Amsterdam ; ; Boston : , : Syngress/Elsevier, , c2008
Descrizione fisica 1 online resource (xliv, 1209 pages)
Disciplina 343.7309/944
Altri autori (Persone) MastrobattistaAmy J
Soggetto topico Internet - Law and legislation - United States
Electronic commerce - Law and legislation - United States
Data protection - Law and legislation - United States
Intellectual property - United States
Information technology - United States
Soggetto genere / forma Electronic books.
ISBN 9780080558820
0080558828
9781281762948
1281762946
9786611762940
6611762949
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; The IT/Digital LegalCompanion; Copyright Page; Dedication Page; Contents; Acknowledgment by Gene Landy; A Note from the Authors; About the Authors; About the Authors' Law Firm; Form Downloading Instructions; Chapter 1: Introduction: Using this Book to Build Value; Your Need to Know Digital Business Law; Who is this Book For?; Organization of this Book; Approach of this Book; Understanding and Using Intellectual Property; Doing Deals; Understanding and Dealing with Legal Risk Factors; Global Perspective; Focusing on Your End Game from the Beginning; How to Use this Book
Using the Legal FormsLimits to the Contents of this Book; Legal Counsel; Chapter 2: Digital Copyright Basics; Some History; Copyright Counts!; In this Chapter; The Nature of a Copyright; What Is Covered by US Copyright Law?; What Is a Computer Program under Copyright Law?; The (Very Modest) Requirement of Originality; Copyright and Musical Works; Exclusive Rights under Copyright Law; Expressions vs. Ideas and Methods; How to Get a Copyright; Copyright vs. Other Kinds of Intellectual Property (IP); Duration of Copyright Protection; Public Domain; Notice; Copyright Registration; Infringement
Derivative WorksWorks Made for Hire; More on Work Made for Hire; Work Made for Hire Clauses in Contracts; Note on the Right to Revoke Copyright Grants and Transfer after 35 Years; California Law Issue Involving Work Made for Hire Clauses; Problems When Parties Fail to Specify Who Is to Own the Copyright; Fair Use; Factor-Based Analysis; Fair Use and Personal Copying; The First Sale Rule; Thin Copyright Protection for Computer Databases; Copy Protection Technology and Anticircumvention Law; Digital Rights Management Technology and Anticircumvention; Anticircumvention Law Concepts
What Is Illegal under Anticircumvention Law?Absence of Defenses; Registering Your Copyright; How Copyright Registration Works; Advantages of Copyright Registration; Statutory Damages under the Copyright Act; Getting a Good Shot at Attorneys' Fees; Filing for Timely Copyright Registration; Presumption of Validity of Your Copyright; Making Copyright Registration a Regular Practice; Recording Assignments and Exclusive Licenses; Criminal Copyright Violations; More on Copyright Law; Conclusion; Chapter 3: Copyrights on the Internet, for Software Protection and Around the World; In this Chapter
Topic One: Copyright and the InternetExample; Analysis of Web Functions; Links; Deep Linking; Framing; Linking and Peer-to-Peer Copying; The DMCA Notice-and-Take-Down Rules; Protection from Libel Claims; More on Copyright and the Internet; Topic Two: Copyright and Software Protection; Unauthorized Copying of Copyrighted Computer Code; Piracy; Private Illegal Copying; Pieces of Software Programs; No Protection for Functional Elements Inherent in the Idea of the Application; No Protection for Commonly Used Software Elements
No Protection for Use of Interfaces and File Formats Needed for Compatibility
Altri titoli varianti The IT/digital legal companion : a comprehensive business guide to software, IT, Internet, media and IP law
Record Nr. UNINA-9910453401303321
Landy Gene K  
Amsterdam ; ; Boston : , : Syngress/Elsevier, , c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The IT/digital legal companion : a comprehensive business guide to software, Internet, and IP law : includes contracts and web forms / / Gene K. Landy ; editing and additional content by Amy J. Mastrobattista
The IT/digital legal companion : a comprehensive business guide to software, Internet, and IP law : includes contracts and web forms / / Gene K. Landy ; editing and additional content by Amy J. Mastrobattista
Autore Landy Gene K
Edizione [1st edition.]
Pubbl/distr/stampa Amsterdam ; ; Boston : , : Syngress/Elsevier, , c2008
Descrizione fisica 1 online resource (xliv, 1209 pages)
Disciplina 343.7309/944
Altri autori (Persone) MastrobattistaAmy J
Soggetto topico Internet - Law and legislation - United States
Electronic commerce - Law and legislation - United States
Data protection - Law and legislation - United States
Intellectual property - United States
Information technology - United States
ISBN 1-281-76294-6
9786611762940
0-08-055882-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; The IT/Digital LegalCompanion; Copyright Page; Dedication Page; Contents; Acknowledgment by Gene Landy; A Note from the Authors; About the Authors; About the Authors' Law Firm; Form Downloading Instructions; Chapter 1: Introduction: Using this Book to Build Value; Your Need to Know Digital Business Law; Who is this Book For?; Organization of this Book; Approach of this Book; Understanding and Using Intellectual Property; Doing Deals; Understanding and Dealing with Legal Risk Factors; Global Perspective; Focusing on Your End Game from the Beginning; How to Use this Book
Using the Legal FormsLimits to the Contents of this Book; Legal Counsel; Chapter 2: Digital Copyright Basics; Some History; Copyright Counts!; In this Chapter; The Nature of a Copyright; What Is Covered by US Copyright Law?; What Is a Computer Program under Copyright Law?; The (Very Modest) Requirement of Originality; Copyright and Musical Works; Exclusive Rights under Copyright Law; Expressions vs. Ideas and Methods; How to Get a Copyright; Copyright vs. Other Kinds of Intellectual Property (IP); Duration of Copyright Protection; Public Domain; Notice; Copyright Registration; Infringement
Derivative WorksWorks Made for Hire; More on Work Made for Hire; Work Made for Hire Clauses in Contracts; Note on the Right to Revoke Copyright Grants and Transfer after 35 Years; California Law Issue Involving Work Made for Hire Clauses; Problems When Parties Fail to Specify Who Is to Own the Copyright; Fair Use; Factor-Based Analysis; Fair Use and Personal Copying; The First Sale Rule; Thin Copyright Protection for Computer Databases; Copy Protection Technology and Anticircumvention Law; Digital Rights Management Technology and Anticircumvention; Anticircumvention Law Concepts
What Is Illegal under Anticircumvention Law?Absence of Defenses; Registering Your Copyright; How Copyright Registration Works; Advantages of Copyright Registration; Statutory Damages under the Copyright Act; Getting a Good Shot at Attorneys' Fees; Filing for Timely Copyright Registration; Presumption of Validity of Your Copyright; Making Copyright Registration a Regular Practice; Recording Assignments and Exclusive Licenses; Criminal Copyright Violations; More on Copyright Law; Conclusion; Chapter 3: Copyrights on the Internet, for Software Protection and Around the World; In this Chapter
Topic One: Copyright and the InternetExample; Analysis of Web Functions; Links; Deep Linking; Framing; Linking and Peer-to-Peer Copying; The DMCA Notice-and-Take-Down Rules; Protection from Libel Claims; More on Copyright and the Internet; Topic Two: Copyright and Software Protection; Unauthorized Copying of Copyrighted Computer Code; Piracy; Private Illegal Copying; Pieces of Software Programs; No Protection for Functional Elements Inherent in the Idea of the Application; No Protection for Commonly Used Software Elements
No Protection for Use of Interfaces and File Formats Needed for Compatibility
Altri titoli varianti The IT/digital legal companion : a comprehensive business guide to software, IT, Internet, media and IP law
Record Nr. UNINA-9910782358903321
Landy Gene K  
Amsterdam ; ; Boston : , : Syngress/Elsevier, , c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui