The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
| The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson |
| Autore | Watson Scott A |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam ; ; Boston, : Syngress/Elsevier, c2007 |
| Descrizione fisica | 1 online resource (199 p.) |
| Disciplina |
658.4/7
658.47 |
| Soggetto topico |
Conflict management
Risk management Crisis management |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-281-02250-0
9786611022501 0-08-052201-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front cover; The Art of War for Security Managers; Copyright page; Table of contents; Preface; Acknowledgments; Chapter 1: Introduction to The Art of War; Executive Summary; Today's Threat Environment; Who Was Sun Tzu?; Applications of The Art of War; The Art of War for Security Managers; Discussion Questions; Chapter 2: Be a Leader!; Executive Summary; Who Would You Follow into Battle?; Fundamental Questions; Who Should Lead and Why?; The Leader's Role and Characteristics; Failures of Leadership; Leadership; Discussion Questions; Chapter 3: Accept the Inevitability of Conflict
Executive SummaryConflict Is Inevitable; World-View and Conflict; Business World Conflicts; The Security Manager and Conflict; Chapter 3 Scenario; Discussion Questions; Chapter 4: Know Yourself and Know Your Enemy; Executive Summary; Who Is the Enemy?; Discussion Questions; Chapter 5: Conduct Strategic Assessments; Executive Summary; Strategy and Tactics; Sun Tzu's View of Strategic Assessments; Sun Tzu's Strategic Assessments for the Security Manager; Conducting a Strategic Assessment; Chapter 5 Scenario; Discussion Questions; Chapter 6: Remember What Is Really Important; Executive Summary The SchoolyardThe Battlefield; Lessons Learned; The Business World; What Really Matters?; The Department; The Security Manager; Victory Is Important, Not Persistence; Chapter 6 Scenario; Discussion Questions; Chapter 7: Engage the Enemy; Executive Summary; Preparations; The Context of Battle; Types of Militarists; Fundamental Concepts of Battle; The Battle Equation; Basic Battle Strategies; Choosing a Basic Battle Strategy; Chapter 7 Scenario; Discussion Questions; Chapter 8: Maneuver Your Army; Executive Summary; Terrain and Position; Rules for Maneuvering Armies; Movement Chapter 8 ScenarioDiscussion Questions; Chapter 9: Adapt to the Battlefield; Executive Summary; Dynamics of the Conventional and Unconventional; Adaptation and the Security Manager; Conventional Security Management Knowledge; Unconventional Knowledge; Chapter 9 Scenario 1; Chapter 9 Scenario 2; Discussion Questions; Chapter 10: Avoid Predictability; Executive Summary; Predictability: The Ultimate Strategic Advantage or Detriment; The Balance; Avoiding Predictability; Chapter 10 Scenario 1; Chapter 10 Scenario 2; Discussion Questions; Chapter 11: Collect Intelligence; Executive Summary The Importance of IntelligenceThe Intelligence Cycle; Evaluating Your Intelligence Capability; Intelligence: A Key Concept; Chapter 11 Scenario; Discussion Questions; Chapter 12: The Art of War and Homeland Security; Executive Summary; "Objectivity" and the War on Terror; September 11, 2001-A Watershed Event; The Wrong Question; The Right Questions; The Private Sector; The Big Question; Definitional Problems; Sun Tzu and the War on Terrorism; A Continual War on Terrorism; Conclusions; Appendix: The Armory; Annotated Bibliography; Index |
| Record Nr. | UNINA-9910457075003321 |
Watson Scott A
|
||
| Amsterdam ; ; Boston, : Syngress/Elsevier, c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson
| The art of war for security managers [[electronic resource] ] : 10 steps to enhancing organizational effectiveness / / Scott A. Watson |
| Autore | Watson Scott A |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam ; ; Boston, : Syngress/Elsevier, c2007 |
| Descrizione fisica | 1 online resource (199 p.) |
| Disciplina |
658.4/7
658.47 |
| Soggetto topico |
Conflict management
Risk management Crisis management |
| ISBN |
1-281-02250-0
9786611022501 0-08-052201-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front cover; The Art of War for Security Managers; Copyright page; Table of contents; Preface; Acknowledgments; Chapter 1: Introduction to The Art of War; Executive Summary; Today's Threat Environment; Who Was Sun Tzu?; Applications of The Art of War; The Art of War for Security Managers; Discussion Questions; Chapter 2: Be a Leader!; Executive Summary; Who Would You Follow into Battle?; Fundamental Questions; Who Should Lead and Why?; The Leader's Role and Characteristics; Failures of Leadership; Leadership; Discussion Questions; Chapter 3: Accept the Inevitability of Conflict
Executive SummaryConflict Is Inevitable; World-View and Conflict; Business World Conflicts; The Security Manager and Conflict; Chapter 3 Scenario; Discussion Questions; Chapter 4: Know Yourself and Know Your Enemy; Executive Summary; Who Is the Enemy?; Discussion Questions; Chapter 5: Conduct Strategic Assessments; Executive Summary; Strategy and Tactics; Sun Tzu's View of Strategic Assessments; Sun Tzu's Strategic Assessments for the Security Manager; Conducting a Strategic Assessment; Chapter 5 Scenario; Discussion Questions; Chapter 6: Remember What Is Really Important; Executive Summary The SchoolyardThe Battlefield; Lessons Learned; The Business World; What Really Matters?; The Department; The Security Manager; Victory Is Important, Not Persistence; Chapter 6 Scenario; Discussion Questions; Chapter 7: Engage the Enemy; Executive Summary; Preparations; The Context of Battle; Types of Militarists; Fundamental Concepts of Battle; The Battle Equation; Basic Battle Strategies; Choosing a Basic Battle Strategy; Chapter 7 Scenario; Discussion Questions; Chapter 8: Maneuver Your Army; Executive Summary; Terrain and Position; Rules for Maneuvering Armies; Movement Chapter 8 ScenarioDiscussion Questions; Chapter 9: Adapt to the Battlefield; Executive Summary; Dynamics of the Conventional and Unconventional; Adaptation and the Security Manager; Conventional Security Management Knowledge; Unconventional Knowledge; Chapter 9 Scenario 1; Chapter 9 Scenario 2; Discussion Questions; Chapter 10: Avoid Predictability; Executive Summary; Predictability: The Ultimate Strategic Advantage or Detriment; The Balance; Avoiding Predictability; Chapter 10 Scenario 1; Chapter 10 Scenario 2; Discussion Questions; Chapter 11: Collect Intelligence; Executive Summary The Importance of IntelligenceThe Intelligence Cycle; Evaluating Your Intelligence Capability; Intelligence: A Key Concept; Chapter 11 Scenario; Discussion Questions; Chapter 12: The Art of War and Homeland Security; Executive Summary; "Objectivity" and the War on Terror; September 11, 2001-A Watershed Event; The Wrong Question; The Right Questions; The Private Sector; The Big Question; Definitional Problems; Sun Tzu and the War on Terrorism; A Continual War on Terrorism; Conclusions; Appendix: The Armory; Annotated Bibliography; Index |
| Record Nr. | UNINA-9910784354503321 |
Watson Scott A
|
||
| Amsterdam ; ; Boston, : Syngress/Elsevier, c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Augmented reality : an emerging technologies guide to AR / Gregory Kipper, Joseph Rampolla
| Augmented reality : an emerging technologies guide to AR / Gregory Kipper, Joseph Rampolla |
| Autore | Kipper, Gregory |
| Pubbl/distr/stampa | Amsterdam ; Boston, MA : Syngress/Elsevier, c2013 |
| Descrizione fisica | xvi, 158 p. : ill. ; 24 cm |
| Disciplina | 006.8 |
| Altri autori (Persone) | Rampolla, Josephauthor |
| Soggetto topico |
Augmented reality
Human-computer interaction Real-time data processing |
| ISBN | 9781597497336 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISALENTO-991002424279707536 |
Kipper, Gregory
|
||
| Amsterdam ; Boston, MA : Syngress/Elsevier, c2013 | ||
| Lo trovi qui: Univ. del Salento | ||
| ||
The IT/digital legal companion : a comprehensive business guide to software, Internet, and IP law : includes contracts and web forms / / Gene K. Landy ; editing and additional content by Amy J. Mastrobattista
| The IT/digital legal companion : a comprehensive business guide to software, Internet, and IP law : includes contracts and web forms / / Gene K. Landy ; editing and additional content by Amy J. Mastrobattista |
| Autore | Landy Gene K |
| Edizione | [1st edition.] |
| Pubbl/distr/stampa | Amsterdam ; ; Boston : , : Syngress/Elsevier, , c2008 |
| Descrizione fisica | 1 online resource (xliv, 1209 pages) |
| Disciplina | 343.7309/944 |
| Altri autori (Persone) | MastrobattistaAmy J |
| Soggetto topico |
Internet - Law and legislation - United States
Electronic commerce - Law and legislation - United States Data protection - Law and legislation - United States Intellectual property - United States Information technology - United States |
| Soggetto genere / forma | Electronic books. |
| ISBN |
9780080558820
0080558828 9781281762948 1281762946 9786611762940 6611762949 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; The IT/Digital LegalCompanion; Copyright Page; Dedication Page; Contents; Acknowledgment by Gene Landy; A Note from the Authors; About the Authors; About the Authors' Law Firm; Form Downloading Instructions; Chapter 1: Introduction: Using this Book to Build Value; Your Need to Know Digital Business Law; Who is this Book For?; Organization of this Book; Approach of this Book; Understanding and Using Intellectual Property; Doing Deals; Understanding and Dealing with Legal Risk Factors; Global Perspective; Focusing on Your End Game from the Beginning; How to Use this Book
Using the Legal FormsLimits to the Contents of this Book; Legal Counsel; Chapter 2: Digital Copyright Basics; Some History; Copyright Counts!; In this Chapter; The Nature of a Copyright; What Is Covered by US Copyright Law?; What Is a Computer Program under Copyright Law?; The (Very Modest) Requirement of Originality; Copyright and Musical Works; Exclusive Rights under Copyright Law; Expressions vs. Ideas and Methods; How to Get a Copyright; Copyright vs. Other Kinds of Intellectual Property (IP); Duration of Copyright Protection; Public Domain; Notice; Copyright Registration; Infringement Derivative WorksWorks Made for Hire; More on Work Made for Hire; Work Made for Hire Clauses in Contracts; Note on the Right to Revoke Copyright Grants and Transfer after 35 Years; California Law Issue Involving Work Made for Hire Clauses; Problems When Parties Fail to Specify Who Is to Own the Copyright; Fair Use; Factor-Based Analysis; Fair Use and Personal Copying; The First Sale Rule; Thin Copyright Protection for Computer Databases; Copy Protection Technology and Anticircumvention Law; Digital Rights Management Technology and Anticircumvention; Anticircumvention Law Concepts What Is Illegal under Anticircumvention Law?Absence of Defenses; Registering Your Copyright; How Copyright Registration Works; Advantages of Copyright Registration; Statutory Damages under the Copyright Act; Getting a Good Shot at Attorneys' Fees; Filing for Timely Copyright Registration; Presumption of Validity of Your Copyright; Making Copyright Registration a Regular Practice; Recording Assignments and Exclusive Licenses; Criminal Copyright Violations; More on Copyright Law; Conclusion; Chapter 3: Copyrights on the Internet, for Software Protection and Around the World; In this Chapter Topic One: Copyright and the InternetExample; Analysis of Web Functions; Links; Deep Linking; Framing; Linking and Peer-to-Peer Copying; The DMCA Notice-and-Take-Down Rules; Protection from Libel Claims; More on Copyright and the Internet; Topic Two: Copyright and Software Protection; Unauthorized Copying of Copyrighted Computer Code; Piracy; Private Illegal Copying; Pieces of Software Programs; No Protection for Functional Elements Inherent in the Idea of the Application; No Protection for Commonly Used Software Elements No Protection for Use of Interfaces and File Formats Needed for Compatibility |
| Altri titoli varianti | The IT/digital legal companion : a comprehensive business guide to software, IT, Internet, media and IP law |
| Record Nr. | UNINA-9910453401303321 |
Landy Gene K
|
||
| Amsterdam ; ; Boston : , : Syngress/Elsevier, , c2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The IT/digital legal companion : a comprehensive business guide to software, Internet, and IP law : includes contracts and web forms / / Gene K. Landy ; editing and additional content by Amy J. Mastrobattista
| The IT/digital legal companion : a comprehensive business guide to software, Internet, and IP law : includes contracts and web forms / / Gene K. Landy ; editing and additional content by Amy J. Mastrobattista |
| Autore | Landy Gene K |
| Edizione | [1st edition.] |
| Pubbl/distr/stampa | Amsterdam ; ; Boston : , : Syngress/Elsevier, , c2008 |
| Descrizione fisica | 1 online resource (xliv, 1209 pages) |
| Disciplina | 343.7309/944 |
| Altri autori (Persone) | MastrobattistaAmy J |
| Soggetto topico |
Internet - Law and legislation - United States
Electronic commerce - Law and legislation - United States Data protection - Law and legislation - United States Intellectual property - United States Information technology - United States |
| ISBN |
1-281-76294-6
9786611762940 0-08-055882-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; The IT/Digital LegalCompanion; Copyright Page; Dedication Page; Contents; Acknowledgment by Gene Landy; A Note from the Authors; About the Authors; About the Authors' Law Firm; Form Downloading Instructions; Chapter 1: Introduction: Using this Book to Build Value; Your Need to Know Digital Business Law; Who is this Book For?; Organization of this Book; Approach of this Book; Understanding and Using Intellectual Property; Doing Deals; Understanding and Dealing with Legal Risk Factors; Global Perspective; Focusing on Your End Game from the Beginning; How to Use this Book
Using the Legal FormsLimits to the Contents of this Book; Legal Counsel; Chapter 2: Digital Copyright Basics; Some History; Copyright Counts!; In this Chapter; The Nature of a Copyright; What Is Covered by US Copyright Law?; What Is a Computer Program under Copyright Law?; The (Very Modest) Requirement of Originality; Copyright and Musical Works; Exclusive Rights under Copyright Law; Expressions vs. Ideas and Methods; How to Get a Copyright; Copyright vs. Other Kinds of Intellectual Property (IP); Duration of Copyright Protection; Public Domain; Notice; Copyright Registration; Infringement Derivative WorksWorks Made for Hire; More on Work Made for Hire; Work Made for Hire Clauses in Contracts; Note on the Right to Revoke Copyright Grants and Transfer after 35 Years; California Law Issue Involving Work Made for Hire Clauses; Problems When Parties Fail to Specify Who Is to Own the Copyright; Fair Use; Factor-Based Analysis; Fair Use and Personal Copying; The First Sale Rule; Thin Copyright Protection for Computer Databases; Copy Protection Technology and Anticircumvention Law; Digital Rights Management Technology and Anticircumvention; Anticircumvention Law Concepts What Is Illegal under Anticircumvention Law?Absence of Defenses; Registering Your Copyright; How Copyright Registration Works; Advantages of Copyright Registration; Statutory Damages under the Copyright Act; Getting a Good Shot at Attorneys' Fees; Filing for Timely Copyright Registration; Presumption of Validity of Your Copyright; Making Copyright Registration a Regular Practice; Recording Assignments and Exclusive Licenses; Criminal Copyright Violations; More on Copyright Law; Conclusion; Chapter 3: Copyrights on the Internet, for Software Protection and Around the World; In this Chapter Topic One: Copyright and the InternetExample; Analysis of Web Functions; Links; Deep Linking; Framing; Linking and Peer-to-Peer Copying; The DMCA Notice-and-Take-Down Rules; Protection from Libel Claims; More on Copyright and the Internet; Topic Two: Copyright and Software Protection; Unauthorized Copying of Copyrighted Computer Code; Piracy; Private Illegal Copying; Pieces of Software Programs; No Protection for Functional Elements Inherent in the Idea of the Application; No Protection for Commonly Used Software Elements No Protection for Use of Interfaces and File Formats Needed for Compatibility |
| Altri titoli varianti | The IT/digital legal companion : a comprehensive business guide to software, IT, Internet, media and IP law |
| Record Nr. | UNINA-9910782358903321 |
Landy Gene K
|
||
| Amsterdam ; ; Boston : , : Syngress/Elsevier, , c2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||