top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Security manager's guide to disasters : managing through emergencies, violence, and other workplace threats / / Anthony D. Manley
Security manager's guide to disasters : managing through emergencies, violence, and other workplace threats / / Anthony D. Manley
Autore Manley Anthony D. <1932, >
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2009
Descrizione fisica 1 online resource (410 p.)
Disciplina 658.477
Soggetto topico Emergency management
Crisis management
Industries - Security measures - Management
Soggetto genere / forma Electronic books.
ISBN 0-429-24475-4
1-282-29448-2
9786612294488
1-4398-0907-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Contents; Author's Note; Preface; Introduction; SECTION 1; Chapter 1. Loss Prevention; Chapter 2. The Emergency Procedure Plan; SECTION 2; Chapter 3. Speciic Threats and Emergencies; Chapter 4. Critical Business Threats That Cause Emergency Situations; Chapter 5. Terrorism; Chapter 6. Weapons of Mass Destruction of the First Class; Chapter 7. Weapons of Mass Destruction of the Second Class; Chapter 8. Combating Terrorism; Chapter 9. Bombs and Bomb Threats; Chapter 10. Other Serious Emergencies That Can Become Disasters; Chapter 11. Computer Theft and Sabotage
Chapter 12. The Protection of Proprietary InformationSECTION 3; Chapter 13. Natural, Accidental, and Intentional Occurrences; Chapter 14. Natural and Common Environmental Occurrences; Chapter 15. Accidental, Intentional, or Unintentional Acts; Chapter 16. Accidental Occurrences and Medical Emergencies; Chapter 17. Infectious and Health Hazards; Chapter 18. Fire Emergency40; Chapter 19. Fire Science and Fire Classification; Chapter 20. Fire Safety Procedures and Guidelines; SECTION 4; Chapter 21. The Disaster Management Process; Chapter 22. Disaster Management of the Incident; SECTION 5
Chapter 23. Terrorism and ViolenceChapter 24. Violence in the Workplace; Chapter 25. The Documentation of Poopr Performance or Abnormal Behavior; Chapter 26. Strkes65; Chapter 27. Civil Disturbances; SECTION 6; Chapter 28. Familiarization with Criminal and Civil Litigation67; Chapter 29. Criminal Law; Chapter 30. Civil Law69; Chapter 31. Possible Criminal and Civil Liability that Loss-Prevention Personnel May Encounter; Chapter 32. Premises Liability; Chapter 33. Vicarious Liability; Chapter 34. Product Liability; Chapter 35. Contractual Liability
Chapter 36. The Criminal and Civil Litigation Process70Chapter 37. Privacy Rights and Civil Rights Violations; Chapter 38. Right To Privacy; Chapter 39. The Invasion of Privacy and Defamation; Chapter 40. Incident Investigation; Appendix A; Appendix B; Appendix C; Appendix D; Endnotes; Glossary; Bibliography; Index; Back cover
Record Nr. UNINA-9910454892503321
Manley Anthony D. <1932, >  
Boca Raton, Fla. : , : CRC Press, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security manager's guide to disasters : managing through emergencies, violence, and other workplace threats / / Anthony D. Manley
Security manager's guide to disasters : managing through emergencies, violence, and other workplace threats / / Anthony D. Manley
Autore Manley Anthony D. <1932, >
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2009
Descrizione fisica 1 online resource (410 p.)
Disciplina 658.477
Soggetto topico Emergency management
Crisis management
Industries - Security measures - Management
ISBN 0-429-24475-4
1-282-29448-2
9786612294488
1-4398-0907-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Contents; Author's Note; Preface; Introduction; SECTION 1; Chapter 1. Loss Prevention; Chapter 2. The Emergency Procedure Plan; SECTION 2; Chapter 3. Speciic Threats and Emergencies; Chapter 4. Critical Business Threats That Cause Emergency Situations; Chapter 5. Terrorism; Chapter 6. Weapons of Mass Destruction of the First Class; Chapter 7. Weapons of Mass Destruction of the Second Class; Chapter 8. Combating Terrorism; Chapter 9. Bombs and Bomb Threats; Chapter 10. Other Serious Emergencies That Can Become Disasters; Chapter 11. Computer Theft and Sabotage
Chapter 12. The Protection of Proprietary InformationSECTION 3; Chapter 13. Natural, Accidental, and Intentional Occurrences; Chapter 14. Natural and Common Environmental Occurrences; Chapter 15. Accidental, Intentional, or Unintentional Acts; Chapter 16. Accidental Occurrences and Medical Emergencies; Chapter 17. Infectious and Health Hazards; Chapter 18. Fire Emergency40; Chapter 19. Fire Science and Fire Classification; Chapter 20. Fire Safety Procedures and Guidelines; SECTION 4; Chapter 21. The Disaster Management Process; Chapter 22. Disaster Management of the Incident; SECTION 5
Chapter 23. Terrorism and ViolenceChapter 24. Violence in the Workplace; Chapter 25. The Documentation of Poopr Performance or Abnormal Behavior; Chapter 26. Strkes65; Chapter 27. Civil Disturbances; SECTION 6; Chapter 28. Familiarization with Criminal and Civil Litigation67; Chapter 29. Criminal Law; Chapter 30. Civil Law69; Chapter 31. Possible Criminal and Civil Liability that Loss-Prevention Personnel May Encounter; Chapter 32. Premises Liability; Chapter 33. Vicarious Liability; Chapter 34. Product Liability; Chapter 35. Contractual Liability
Chapter 36. The Criminal and Civil Litigation Process70Chapter 37. Privacy Rights and Civil Rights Violations; Chapter 38. Right To Privacy; Chapter 39. The Invasion of Privacy and Defamation; Chapter 40. Incident Investigation; Appendix A; Appendix B; Appendix C; Appendix D; Endnotes; Glossary; Bibliography; Index; Back cover
Record Nr. UNINA-9910778328403321
Manley Anthony D. <1932, >  
Boca Raton, Fla. : , : CRC Press, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security manager's guide to disasters : managing through emergencies, violence, and other workplace threats / / Anthony D. Manley
Security manager's guide to disasters : managing through emergencies, violence, and other workplace threats / / Anthony D. Manley
Autore Manley Anthony D. <1932, >
Edizione [1st ed.]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2009
Descrizione fisica 1 online resource (410 p.)
Disciplina 658.477
Soggetto topico Emergency management
Crisis management
Industries - Security measures - Management
ISBN 0-429-24475-4
1-282-29448-2
9786612294488
1-4398-0907-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Contents; Author's Note; Preface; Introduction; SECTION 1; Chapter 1. Loss Prevention; Chapter 2. The Emergency Procedure Plan; SECTION 2; Chapter 3. Speciic Threats and Emergencies; Chapter 4. Critical Business Threats That Cause Emergency Situations; Chapter 5. Terrorism; Chapter 6. Weapons of Mass Destruction of the First Class; Chapter 7. Weapons of Mass Destruction of the Second Class; Chapter 8. Combating Terrorism; Chapter 9. Bombs and Bomb Threats; Chapter 10. Other Serious Emergencies That Can Become Disasters; Chapter 11. Computer Theft and Sabotage
Chapter 12. The Protection of Proprietary InformationSECTION 3; Chapter 13. Natural, Accidental, and Intentional Occurrences; Chapter 14. Natural and Common Environmental Occurrences; Chapter 15. Accidental, Intentional, or Unintentional Acts; Chapter 16. Accidental Occurrences and Medical Emergencies; Chapter 17. Infectious and Health Hazards; Chapter 18. Fire Emergency40; Chapter 19. Fire Science and Fire Classification; Chapter 20. Fire Safety Procedures and Guidelines; SECTION 4; Chapter 21. The Disaster Management Process; Chapter 22. Disaster Management of the Incident; SECTION 5
Chapter 23. Terrorism and ViolenceChapter 24. Violence in the Workplace; Chapter 25. The Documentation of Poopr Performance or Abnormal Behavior; Chapter 26. Strkes65; Chapter 27. Civil Disturbances; SECTION 6; Chapter 28. Familiarization with Criminal and Civil Litigation67; Chapter 29. Criminal Law; Chapter 30. Civil Law69; Chapter 31. Possible Criminal and Civil Liability that Loss-Prevention Personnel May Encounter; Chapter 32. Premises Liability; Chapter 33. Vicarious Liability; Chapter 34. Product Liability; Chapter 35. Contractual Liability
Chapter 36. The Criminal and Civil Litigation Process70Chapter 37. Privacy Rights and Civil Rights Violations; Chapter 38. Right To Privacy; Chapter 39. The Invasion of Privacy and Defamation; Chapter 40. Incident Investigation; Appendix A; Appendix B; Appendix C; Appendix D; Endnotes; Glossary; Bibliography; Index; Back cover
Record Nr. UNINA-9910811021403321
Manley Anthony D. <1932, >  
Boca Raton, Fla. : , : CRC Press, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Strategic security management [[electronic resource] ] : a risk assessment guide for decision makers / / Karim H. Vellani
Strategic security management [[electronic resource] ] : a risk assessment guide for decision makers / / Karim H. Vellani
Autore Vellani Karim H. <1971->
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Descrizione fisica 1 online resource (413 p.)
Disciplina 658.403
658.478
Soggetto topico Industries - Security measures - Management
Risk assessment
Information technology - Security measures
Management information systems - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-280-70767-4
9786610707676
0-08-046596-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Title page; Copyright page; Table of contents; About the Author; Contributing Authors; Acknowledgments; Introduction; Chapter 1: Data-Driven Security; Data-Driven Security; Security Metrics; SMART Metrics; Data-Driven Assessments; Chapter 2: Asset Identification and Security Inventory; Definitions; Asset Classification; Identifying Critical Assets; Target Selection; Consequence Analysis; Countermeasure Inventory; Security Assessments; Chapter 3: Threat Assessments; Threat Formula; Threat Identification and Classification; Threat Information Sources; Assessing Threats
Emerging ThreatsThreat Dynamics; The Homeland Security Advisory System; Chapter 4: Crime Analysis; Statistics for Security Management; Crime Triangle; Purpose of Crime Analysis; Data Sources; Law Enforcement Data versus Social Disorder Models; Advantages of Law Enforcement Data; Geographic Levels; Methodology; Return on Security Investment (ROSI); Chapter 5: Vulnerability Assessments; Definition; Vulnerability Assessments; Scope of Vulnerability Assessments; The Vulnerability Assessment Team; Asset-Based and Scenario-Based Vulnerability Assessments; Vulnerability Assessment Steps
Vulnerability Rating ScaleThe Security Survey Report; The Vulnerability Assessment Report; Chapter 6: Risk Assessments; Definition; Risk Assessments; Qualitative Risk Assessments; Quantitative Risk Assessments; Specialized Risk Assessment Methodologies; Risk Mitigation; Risk Assessment Report; Chapter 7: Information Technology Risk Management; Why Information Technology Security Is Important to Traditional Security Decision Makers; Information Technology Risk Management; Asset Identification; Information Technology Risk Assessment; Information Technology System Characterization
Threat AssessmentVulnerability Assessment; Control Evaluation; Likelihood Determination; Impact Analysis; Risk Determination; Control Recommendations; Results Documentation; Risk Mitigation; Control Implementation Methodology; Control Categories; Cost-Benefit Analysis; Residual Risk; Evaluation and Refinement; Chapter 8: Prevention; The Need and Practical Application of Theoretical Study; Situational Crime Prevention; Rational Choice; Routine Activity; Crime Prevention Through Environmental Design (CPTED); Crime Displacement and Diffusion of Benefits; Prevention Measures
Chapter 9: Security Measures: Policies and ProceduresSecurity Awareness; Security Plan; Emergency Management Plan; Conclusion; Chapter 10: Security Measures: Physical Security; Introduction; Types of Physical Security Countermeasures; Integration of Multiple Physical Security Countermeasures; Integration of Physical Security Countermeasures with Personnel and Policies and Procedures Countermeasures; Determining Physical Security Countermeasure Needs; Matching Product to Need; Defining Cost and Cost-Benefit Analysis; Cost-Benefit Analysis; Best Practices; Codes and Ordinances; Summary
Chapter 11: Security Measures: Deploying Physical Security
Record Nr. UNINA-9910458593103321
Vellani Karim H. <1971->  
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Strategic security management [[electronic resource] ] : a risk assessment guide for decision makers / / Karim H. Vellani
Strategic security management [[electronic resource] ] : a risk assessment guide for decision makers / / Karim H. Vellani
Autore Vellani Karim H. <1971->
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Descrizione fisica 1 online resource (413 p.)
Disciplina 658.403
658.478
Soggetto topico Industries - Security measures - Management
Risk assessment
Information technology - Security measures
Management information systems - Security measures
ISBN 1-280-70767-4
9786610707676
0-08-046596-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Title page; Copyright page; Table of contents; About the Author; Contributing Authors; Acknowledgments; Introduction; Chapter 1: Data-Driven Security; Data-Driven Security; Security Metrics; SMART Metrics; Data-Driven Assessments; Chapter 2: Asset Identification and Security Inventory; Definitions; Asset Classification; Identifying Critical Assets; Target Selection; Consequence Analysis; Countermeasure Inventory; Security Assessments; Chapter 3: Threat Assessments; Threat Formula; Threat Identification and Classification; Threat Information Sources; Assessing Threats
Emerging ThreatsThreat Dynamics; The Homeland Security Advisory System; Chapter 4: Crime Analysis; Statistics for Security Management; Crime Triangle; Purpose of Crime Analysis; Data Sources; Law Enforcement Data versus Social Disorder Models; Advantages of Law Enforcement Data; Geographic Levels; Methodology; Return on Security Investment (ROSI); Chapter 5: Vulnerability Assessments; Definition; Vulnerability Assessments; Scope of Vulnerability Assessments; The Vulnerability Assessment Team; Asset-Based and Scenario-Based Vulnerability Assessments; Vulnerability Assessment Steps
Vulnerability Rating ScaleThe Security Survey Report; The Vulnerability Assessment Report; Chapter 6: Risk Assessments; Definition; Risk Assessments; Qualitative Risk Assessments; Quantitative Risk Assessments; Specialized Risk Assessment Methodologies; Risk Mitigation; Risk Assessment Report; Chapter 7: Information Technology Risk Management; Why Information Technology Security Is Important to Traditional Security Decision Makers; Information Technology Risk Management; Asset Identification; Information Technology Risk Assessment; Information Technology System Characterization
Threat AssessmentVulnerability Assessment; Control Evaluation; Likelihood Determination; Impact Analysis; Risk Determination; Control Recommendations; Results Documentation; Risk Mitigation; Control Implementation Methodology; Control Categories; Cost-Benefit Analysis; Residual Risk; Evaluation and Refinement; Chapter 8: Prevention; The Need and Practical Application of Theoretical Study; Situational Crime Prevention; Rational Choice; Routine Activity; Crime Prevention Through Environmental Design (CPTED); Crime Displacement and Diffusion of Benefits; Prevention Measures
Chapter 9: Security Measures: Policies and ProceduresSecurity Awareness; Security Plan; Emergency Management Plan; Conclusion; Chapter 10: Security Measures: Physical Security; Introduction; Types of Physical Security Countermeasures; Integration of Multiple Physical Security Countermeasures; Integration of Physical Security Countermeasures with Personnel and Policies and Procedures Countermeasures; Determining Physical Security Countermeasure Needs; Matching Product to Need; Defining Cost and Cost-Benefit Analysis; Cost-Benefit Analysis; Best Practices; Codes and Ordinances; Summary
Chapter 11: Security Measures: Deploying Physical Security
Record Nr. UNINA-9910784654003321
Vellani Karim H. <1971->  
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Strategic security management : a risk assessment guide for decision makers / / Karim H. Vellani
Strategic security management : a risk assessment guide for decision makers / / Karim H. Vellani
Autore Vellani Karim H. <1971->
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Descrizione fisica 1 online resource (413 p.)
Disciplina 658.403
658.478
Soggetto topico Industries - Security measures - Management
Risk assessment
Information technology - Security measures
Management information systems - Security measures
ISBN 9786610707676
9781280707674
1280707674
9780080465968
008046596X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Title page; Copyright page; Table of contents; About the Author; Contributing Authors; Acknowledgments; Introduction; Chapter 1: Data-Driven Security; Data-Driven Security; Security Metrics; SMART Metrics; Data-Driven Assessments; Chapter 2: Asset Identification and Security Inventory; Definitions; Asset Classification; Identifying Critical Assets; Target Selection; Consequence Analysis; Countermeasure Inventory; Security Assessments; Chapter 3: Threat Assessments; Threat Formula; Threat Identification and Classification; Threat Information Sources; Assessing Threats
Emerging ThreatsThreat Dynamics; The Homeland Security Advisory System; Chapter 4: Crime Analysis; Statistics for Security Management; Crime Triangle; Purpose of Crime Analysis; Data Sources; Law Enforcement Data versus Social Disorder Models; Advantages of Law Enforcement Data; Geographic Levels; Methodology; Return on Security Investment (ROSI); Chapter 5: Vulnerability Assessments; Definition; Vulnerability Assessments; Scope of Vulnerability Assessments; The Vulnerability Assessment Team; Asset-Based and Scenario-Based Vulnerability Assessments; Vulnerability Assessment Steps
Vulnerability Rating ScaleThe Security Survey Report; The Vulnerability Assessment Report; Chapter 6: Risk Assessments; Definition; Risk Assessments; Qualitative Risk Assessments; Quantitative Risk Assessments; Specialized Risk Assessment Methodologies; Risk Mitigation; Risk Assessment Report; Chapter 7: Information Technology Risk Management; Why Information Technology Security Is Important to Traditional Security Decision Makers; Information Technology Risk Management; Asset Identification; Information Technology Risk Assessment; Information Technology System Characterization
Threat AssessmentVulnerability Assessment; Control Evaluation; Likelihood Determination; Impact Analysis; Risk Determination; Control Recommendations; Results Documentation; Risk Mitigation; Control Implementation Methodology; Control Categories; Cost-Benefit Analysis; Residual Risk; Evaluation and Refinement; Chapter 8: Prevention; The Need and Practical Application of Theoretical Study; Situational Crime Prevention; Rational Choice; Routine Activity; Crime Prevention Through Environmental Design (CPTED); Crime Displacement and Diffusion of Benefits; Prevention Measures
Chapter 9: Security Measures: Policies and ProceduresSecurity Awareness; Security Plan; Emergency Management Plan; Conclusion; Chapter 10: Security Measures: Physical Security; Introduction; Types of Physical Security Countermeasures; Integration of Multiple Physical Security Countermeasures; Integration of Physical Security Countermeasures with Personnel and Policies and Procedures Countermeasures; Determining Physical Security Countermeasure Needs; Matching Product to Need; Defining Cost and Cost-Benefit Analysis; Cost-Benefit Analysis; Best Practices; Codes and Ordinances; Summary
Chapter 11: Security Measures: Deploying Physical Security
Record Nr. UNINA-9910819751403321
Vellani Karim H. <1971->  
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui