Security manager's guide to disasters : managing through emergencies, violence, and other workplace threats / / Anthony D. Manley |
Autore | Manley Anthony D. <1932, > |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2009 |
Descrizione fisica | 1 online resource (410 p.) |
Disciplina | 658.477 |
Soggetto topico |
Emergency management
Crisis management Industries - Security measures - Management |
Soggetto genere / forma | Electronic books. |
ISBN |
0-429-24475-4
1-282-29448-2 9786612294488 1-4398-0907-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Contents; Author's Note; Preface; Introduction; SECTION 1; Chapter 1. Loss Prevention; Chapter 2. The Emergency Procedure Plan; SECTION 2; Chapter 3. Speciic Threats and Emergencies; Chapter 4. Critical Business Threats That Cause Emergency Situations; Chapter 5. Terrorism; Chapter 6. Weapons of Mass Destruction of the First Class; Chapter 7. Weapons of Mass Destruction of the Second Class; Chapter 8. Combating Terrorism; Chapter 9. Bombs and Bomb Threats; Chapter 10. Other Serious Emergencies That Can Become Disasters; Chapter 11. Computer Theft and Sabotage
Chapter 12. The Protection of Proprietary InformationSECTION 3; Chapter 13. Natural, Accidental, and Intentional Occurrences; Chapter 14. Natural and Common Environmental Occurrences; Chapter 15. Accidental, Intentional, or Unintentional Acts; Chapter 16. Accidental Occurrences and Medical Emergencies; Chapter 17. Infectious and Health Hazards; Chapter 18. Fire Emergency40; Chapter 19. Fire Science and Fire Classification; Chapter 20. Fire Safety Procedures and Guidelines; SECTION 4; Chapter 21. The Disaster Management Process; Chapter 22. Disaster Management of the Incident; SECTION 5 Chapter 23. Terrorism and ViolenceChapter 24. Violence in the Workplace; Chapter 25. The Documentation of Poopr Performance or Abnormal Behavior; Chapter 26. Strkes65; Chapter 27. Civil Disturbances; SECTION 6; Chapter 28. Familiarization with Criminal and Civil Litigation67; Chapter 29. Criminal Law; Chapter 30. Civil Law69; Chapter 31. Possible Criminal and Civil Liability that Loss-Prevention Personnel May Encounter; Chapter 32. Premises Liability; Chapter 33. Vicarious Liability; Chapter 34. Product Liability; Chapter 35. Contractual Liability Chapter 36. The Criminal and Civil Litigation Process70Chapter 37. Privacy Rights and Civil Rights Violations; Chapter 38. Right To Privacy; Chapter 39. The Invasion of Privacy and Defamation; Chapter 40. Incident Investigation; Appendix A; Appendix B; Appendix C; Appendix D; Endnotes; Glossary; Bibliography; Index; Back cover |
Record Nr. | UNINA-9910454892503321 |
Manley Anthony D. <1932, > | ||
Boca Raton, Fla. : , : CRC Press, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security manager's guide to disasters : managing through emergencies, violence, and other workplace threats / / Anthony D. Manley |
Autore | Manley Anthony D. <1932, > |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2009 |
Descrizione fisica | 1 online resource (410 p.) |
Disciplina | 658.477 |
Soggetto topico |
Emergency management
Crisis management Industries - Security measures - Management |
ISBN |
0-429-24475-4
1-282-29448-2 9786612294488 1-4398-0907-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Contents; Author's Note; Preface; Introduction; SECTION 1; Chapter 1. Loss Prevention; Chapter 2. The Emergency Procedure Plan; SECTION 2; Chapter 3. Speciic Threats and Emergencies; Chapter 4. Critical Business Threats That Cause Emergency Situations; Chapter 5. Terrorism; Chapter 6. Weapons of Mass Destruction of the First Class; Chapter 7. Weapons of Mass Destruction of the Second Class; Chapter 8. Combating Terrorism; Chapter 9. Bombs and Bomb Threats; Chapter 10. Other Serious Emergencies That Can Become Disasters; Chapter 11. Computer Theft and Sabotage
Chapter 12. The Protection of Proprietary InformationSECTION 3; Chapter 13. Natural, Accidental, and Intentional Occurrences; Chapter 14. Natural and Common Environmental Occurrences; Chapter 15. Accidental, Intentional, or Unintentional Acts; Chapter 16. Accidental Occurrences and Medical Emergencies; Chapter 17. Infectious and Health Hazards; Chapter 18. Fire Emergency40; Chapter 19. Fire Science and Fire Classification; Chapter 20. Fire Safety Procedures and Guidelines; SECTION 4; Chapter 21. The Disaster Management Process; Chapter 22. Disaster Management of the Incident; SECTION 5 Chapter 23. Terrorism and ViolenceChapter 24. Violence in the Workplace; Chapter 25. The Documentation of Poopr Performance or Abnormal Behavior; Chapter 26. Strkes65; Chapter 27. Civil Disturbances; SECTION 6; Chapter 28. Familiarization with Criminal and Civil Litigation67; Chapter 29. Criminal Law; Chapter 30. Civil Law69; Chapter 31. Possible Criminal and Civil Liability that Loss-Prevention Personnel May Encounter; Chapter 32. Premises Liability; Chapter 33. Vicarious Liability; Chapter 34. Product Liability; Chapter 35. Contractual Liability Chapter 36. The Criminal and Civil Litigation Process70Chapter 37. Privacy Rights and Civil Rights Violations; Chapter 38. Right To Privacy; Chapter 39. The Invasion of Privacy and Defamation; Chapter 40. Incident Investigation; Appendix A; Appendix B; Appendix C; Appendix D; Endnotes; Glossary; Bibliography; Index; Back cover |
Record Nr. | UNINA-9910778328403321 |
Manley Anthony D. <1932, > | ||
Boca Raton, Fla. : , : CRC Press, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security manager's guide to disasters : managing through emergencies, violence, and other workplace threats / / Anthony D. Manley |
Autore | Manley Anthony D. <1932, > |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2009 |
Descrizione fisica | 1 online resource (410 p.) |
Disciplina | 658.477 |
Soggetto topico |
Emergency management
Crisis management Industries - Security measures - Management |
ISBN |
0-429-24475-4
1-282-29448-2 9786612294488 1-4398-0907-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Contents; Author's Note; Preface; Introduction; SECTION 1; Chapter 1. Loss Prevention; Chapter 2. The Emergency Procedure Plan; SECTION 2; Chapter 3. Speciic Threats and Emergencies; Chapter 4. Critical Business Threats That Cause Emergency Situations; Chapter 5. Terrorism; Chapter 6. Weapons of Mass Destruction of the First Class; Chapter 7. Weapons of Mass Destruction of the Second Class; Chapter 8. Combating Terrorism; Chapter 9. Bombs and Bomb Threats; Chapter 10. Other Serious Emergencies That Can Become Disasters; Chapter 11. Computer Theft and Sabotage
Chapter 12. The Protection of Proprietary InformationSECTION 3; Chapter 13. Natural, Accidental, and Intentional Occurrences; Chapter 14. Natural and Common Environmental Occurrences; Chapter 15. Accidental, Intentional, or Unintentional Acts; Chapter 16. Accidental Occurrences and Medical Emergencies; Chapter 17. Infectious and Health Hazards; Chapter 18. Fire Emergency40; Chapter 19. Fire Science and Fire Classification; Chapter 20. Fire Safety Procedures and Guidelines; SECTION 4; Chapter 21. The Disaster Management Process; Chapter 22. Disaster Management of the Incident; SECTION 5 Chapter 23. Terrorism and ViolenceChapter 24. Violence in the Workplace; Chapter 25. The Documentation of Poopr Performance or Abnormal Behavior; Chapter 26. Strkes65; Chapter 27. Civil Disturbances; SECTION 6; Chapter 28. Familiarization with Criminal and Civil Litigation67; Chapter 29. Criminal Law; Chapter 30. Civil Law69; Chapter 31. Possible Criminal and Civil Liability that Loss-Prevention Personnel May Encounter; Chapter 32. Premises Liability; Chapter 33. Vicarious Liability; Chapter 34. Product Liability; Chapter 35. Contractual Liability Chapter 36. The Criminal and Civil Litigation Process70Chapter 37. Privacy Rights and Civil Rights Violations; Chapter 38. Right To Privacy; Chapter 39. The Invasion of Privacy and Defamation; Chapter 40. Incident Investigation; Appendix A; Appendix B; Appendix C; Appendix D; Endnotes; Glossary; Bibliography; Index; Back cover |
Record Nr. | UNINA-9910811021403321 |
Manley Anthony D. <1932, > | ||
Boca Raton, Fla. : , : CRC Press, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Strategic security management [[electronic resource] ] : a risk assessment guide for decision makers / / Karim H. Vellani |
Autore | Vellani Karim H. <1971-> |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 |
Descrizione fisica | 1 online resource (413 p.) |
Disciplina |
658.403
658.478 |
Soggetto topico |
Industries - Security measures - Management
Risk assessment Information technology - Security measures Management information systems - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-70767-4
9786610707676 0-08-046596-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Title page; Copyright page; Table of contents; About the Author; Contributing Authors; Acknowledgments; Introduction; Chapter 1: Data-Driven Security; Data-Driven Security; Security Metrics; SMART Metrics; Data-Driven Assessments; Chapter 2: Asset Identification and Security Inventory; Definitions; Asset Classification; Identifying Critical Assets; Target Selection; Consequence Analysis; Countermeasure Inventory; Security Assessments; Chapter 3: Threat Assessments; Threat Formula; Threat Identification and Classification; Threat Information Sources; Assessing Threats
Emerging ThreatsThreat Dynamics; The Homeland Security Advisory System; Chapter 4: Crime Analysis; Statistics for Security Management; Crime Triangle; Purpose of Crime Analysis; Data Sources; Law Enforcement Data versus Social Disorder Models; Advantages of Law Enforcement Data; Geographic Levels; Methodology; Return on Security Investment (ROSI); Chapter 5: Vulnerability Assessments; Definition; Vulnerability Assessments; Scope of Vulnerability Assessments; The Vulnerability Assessment Team; Asset-Based and Scenario-Based Vulnerability Assessments; Vulnerability Assessment Steps Vulnerability Rating ScaleThe Security Survey Report; The Vulnerability Assessment Report; Chapter 6: Risk Assessments; Definition; Risk Assessments; Qualitative Risk Assessments; Quantitative Risk Assessments; Specialized Risk Assessment Methodologies; Risk Mitigation; Risk Assessment Report; Chapter 7: Information Technology Risk Management; Why Information Technology Security Is Important to Traditional Security Decision Makers; Information Technology Risk Management; Asset Identification; Information Technology Risk Assessment; Information Technology System Characterization Threat AssessmentVulnerability Assessment; Control Evaluation; Likelihood Determination; Impact Analysis; Risk Determination; Control Recommendations; Results Documentation; Risk Mitigation; Control Implementation Methodology; Control Categories; Cost-Benefit Analysis; Residual Risk; Evaluation and Refinement; Chapter 8: Prevention; The Need and Practical Application of Theoretical Study; Situational Crime Prevention; Rational Choice; Routine Activity; Crime Prevention Through Environmental Design (CPTED); Crime Displacement and Diffusion of Benefits; Prevention Measures Chapter 9: Security Measures: Policies and ProceduresSecurity Awareness; Security Plan; Emergency Management Plan; Conclusion; Chapter 10: Security Measures: Physical Security; Introduction; Types of Physical Security Countermeasures; Integration of Multiple Physical Security Countermeasures; Integration of Physical Security Countermeasures with Personnel and Policies and Procedures Countermeasures; Determining Physical Security Countermeasure Needs; Matching Product to Need; Defining Cost and Cost-Benefit Analysis; Cost-Benefit Analysis; Best Practices; Codes and Ordinances; Summary Chapter 11: Security Measures: Deploying Physical Security |
Record Nr. | UNINA-9910458593103321 |
Vellani Karim H. <1971-> | ||
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Strategic security management [[electronic resource] ] : a risk assessment guide for decision makers / / Karim H. Vellani |
Autore | Vellani Karim H. <1971-> |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 |
Descrizione fisica | 1 online resource (413 p.) |
Disciplina |
658.403
658.478 |
Soggetto topico |
Industries - Security measures - Management
Risk assessment Information technology - Security measures Management information systems - Security measures |
ISBN |
1-280-70767-4
9786610707676 0-08-046596-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Title page; Copyright page; Table of contents; About the Author; Contributing Authors; Acknowledgments; Introduction; Chapter 1: Data-Driven Security; Data-Driven Security; Security Metrics; SMART Metrics; Data-Driven Assessments; Chapter 2: Asset Identification and Security Inventory; Definitions; Asset Classification; Identifying Critical Assets; Target Selection; Consequence Analysis; Countermeasure Inventory; Security Assessments; Chapter 3: Threat Assessments; Threat Formula; Threat Identification and Classification; Threat Information Sources; Assessing Threats
Emerging ThreatsThreat Dynamics; The Homeland Security Advisory System; Chapter 4: Crime Analysis; Statistics for Security Management; Crime Triangle; Purpose of Crime Analysis; Data Sources; Law Enforcement Data versus Social Disorder Models; Advantages of Law Enforcement Data; Geographic Levels; Methodology; Return on Security Investment (ROSI); Chapter 5: Vulnerability Assessments; Definition; Vulnerability Assessments; Scope of Vulnerability Assessments; The Vulnerability Assessment Team; Asset-Based and Scenario-Based Vulnerability Assessments; Vulnerability Assessment Steps Vulnerability Rating ScaleThe Security Survey Report; The Vulnerability Assessment Report; Chapter 6: Risk Assessments; Definition; Risk Assessments; Qualitative Risk Assessments; Quantitative Risk Assessments; Specialized Risk Assessment Methodologies; Risk Mitigation; Risk Assessment Report; Chapter 7: Information Technology Risk Management; Why Information Technology Security Is Important to Traditional Security Decision Makers; Information Technology Risk Management; Asset Identification; Information Technology Risk Assessment; Information Technology System Characterization Threat AssessmentVulnerability Assessment; Control Evaluation; Likelihood Determination; Impact Analysis; Risk Determination; Control Recommendations; Results Documentation; Risk Mitigation; Control Implementation Methodology; Control Categories; Cost-Benefit Analysis; Residual Risk; Evaluation and Refinement; Chapter 8: Prevention; The Need and Practical Application of Theoretical Study; Situational Crime Prevention; Rational Choice; Routine Activity; Crime Prevention Through Environmental Design (CPTED); Crime Displacement and Diffusion of Benefits; Prevention Measures Chapter 9: Security Measures: Policies and ProceduresSecurity Awareness; Security Plan; Emergency Management Plan; Conclusion; Chapter 10: Security Measures: Physical Security; Introduction; Types of Physical Security Countermeasures; Integration of Multiple Physical Security Countermeasures; Integration of Physical Security Countermeasures with Personnel and Policies and Procedures Countermeasures; Determining Physical Security Countermeasure Needs; Matching Product to Need; Defining Cost and Cost-Benefit Analysis; Cost-Benefit Analysis; Best Practices; Codes and Ordinances; Summary Chapter 11: Security Measures: Deploying Physical Security |
Record Nr. | UNINA-9910784654003321 |
Vellani Karim H. <1971-> | ||
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Strategic security management : a risk assessment guide for decision makers / / Karim H. Vellani |
Autore | Vellani Karim H. <1971-> |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 |
Descrizione fisica | 1 online resource (413 p.) |
Disciplina |
658.403
658.478 |
Soggetto topico |
Industries - Security measures - Management
Risk assessment Information technology - Security measures Management information systems - Security measures |
ISBN |
9786610707676
9781280707674 1280707674 9780080465968 008046596X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Title page; Copyright page; Table of contents; About the Author; Contributing Authors; Acknowledgments; Introduction; Chapter 1: Data-Driven Security; Data-Driven Security; Security Metrics; SMART Metrics; Data-Driven Assessments; Chapter 2: Asset Identification and Security Inventory; Definitions; Asset Classification; Identifying Critical Assets; Target Selection; Consequence Analysis; Countermeasure Inventory; Security Assessments; Chapter 3: Threat Assessments; Threat Formula; Threat Identification and Classification; Threat Information Sources; Assessing Threats
Emerging ThreatsThreat Dynamics; The Homeland Security Advisory System; Chapter 4: Crime Analysis; Statistics for Security Management; Crime Triangle; Purpose of Crime Analysis; Data Sources; Law Enforcement Data versus Social Disorder Models; Advantages of Law Enforcement Data; Geographic Levels; Methodology; Return on Security Investment (ROSI); Chapter 5: Vulnerability Assessments; Definition; Vulnerability Assessments; Scope of Vulnerability Assessments; The Vulnerability Assessment Team; Asset-Based and Scenario-Based Vulnerability Assessments; Vulnerability Assessment Steps Vulnerability Rating ScaleThe Security Survey Report; The Vulnerability Assessment Report; Chapter 6: Risk Assessments; Definition; Risk Assessments; Qualitative Risk Assessments; Quantitative Risk Assessments; Specialized Risk Assessment Methodologies; Risk Mitigation; Risk Assessment Report; Chapter 7: Information Technology Risk Management; Why Information Technology Security Is Important to Traditional Security Decision Makers; Information Technology Risk Management; Asset Identification; Information Technology Risk Assessment; Information Technology System Characterization Threat AssessmentVulnerability Assessment; Control Evaluation; Likelihood Determination; Impact Analysis; Risk Determination; Control Recommendations; Results Documentation; Risk Mitigation; Control Implementation Methodology; Control Categories; Cost-Benefit Analysis; Residual Risk; Evaluation and Refinement; Chapter 8: Prevention; The Need and Practical Application of Theoretical Study; Situational Crime Prevention; Rational Choice; Routine Activity; Crime Prevention Through Environmental Design (CPTED); Crime Displacement and Diffusion of Benefits; Prevention Measures Chapter 9: Security Measures: Policies and ProceduresSecurity Awareness; Security Plan; Emergency Management Plan; Conclusion; Chapter 10: Security Measures: Physical Security; Introduction; Types of Physical Security Countermeasures; Integration of Multiple Physical Security Countermeasures; Integration of Physical Security Countermeasures with Personnel and Policies and Procedures Countermeasures; Determining Physical Security Countermeasure Needs; Matching Product to Need; Defining Cost and Cost-Benefit Analysis; Cost-Benefit Analysis; Best Practices; Codes and Ordinances; Summary Chapter 11: Security Measures: Deploying Physical Security |
Record Nr. | UNINA-9910819751403321 |
Vellani Karim H. <1971-> | ||
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|