top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Security operations management [[electronic resource] /] / Robert D. McCrie
Security operations management [[electronic resource] /] / Robert D. McCrie
Autore McCrie Robert D
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007
Descrizione fisica 1 online resource (411 p.)
Disciplina 363.289
658.47
Soggetto topico Private security services - Management
Security systems - Management
Soggetto genere / forma Electronic books.
ISBN 1-280-75202-5
9786610752027
0-08-046949-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Title page; Copyright page; Table of Contents; Preface; Acknowledgments; Part I: General Fundamentals and Competencies; Chapter 1: Security Operations in the Management Environment; ORGANIZATIONS AND MANAGERS; A POINT ABOUT TITLES; WHAT IS THE PURPOSE OF AN EXECUTIVE?; WHAT IS THE STRATEGY OF MANAGEMENT?; THE CHARACTERISTICS OF MODERN ORGANIZATIONS; HOW ORGANIZATIONS ARE STRUCTURED; GOVERNMENT SECURITY OPERATIONS; LAYERS OF MANAGEMENT; SECURITY IN THE ORGANIZATIONAL HIERARCHY; STRUCTURE OF A COMPLEX SECURITY DEPARTMENT; ETHICS AND SECURITY OPERATIONS; SUMMARY
DISCUSSION AND REVIEWENDNOTES; ADDITIONAL REFERENCES; Chapter 2: Core Competencies to Initiate Effective Protection Programs; CORE COMPETENCIES OF SECURITY OPERATIONS; HOW CONTEMPORARY SECURITY SERVICES HAVE EVOLVED; WHAT DRIVES SECURITY OPERATIONS?; A BRIEF HISTORY OF A GROWING FIELD; THE GROWTH OF THE MODERN PROTECTIVE INDUSTRY; HOW SECURITY EXECUTIVES RANK PRIORITIES; SPECIFIC CONCERNS FOR DIFFERENT INDUSTRIES; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 3: Staffing to Meet Protective Goals; PERSONNEL PLANNING; JOB DESCRIPTIONS; NEGLIGENT HIRING LITIGATION
THE VETTING PROCESSSUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 4: Training and Development for High Performance; WHY TRAIN, ANYHOW?; THE TRAINING MANAGER OF OFFICER; PLANNING TRAINING AND DEVELOPMENT REQUIREMENTS; THE ORIENTATION; TRAINING TECHNIQUES; FIREARMS TRAINING; ONGOING "IN-SERVICE" TRAINING; SECURITY TRAINING FOR NONSECURITY PERSONNEL; TRAINING FOR TRAINERS AND SUPERVISORS; DEVELOPMENT AND EDUCATION FOR MANAGERS AND EXECUTIVES; MEASURING EFFECTIVENESS; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES
Chapter 5: Supporting and Motivating Supervisors and StaffSUPPORTING SUPERVISORS AND STAFF; SAFETY AT WORK: THE RESPONSIBILITY OF SUPERVISORS; WHY BE A SUPERVISOR, ANYWAY?; DUTIES OF EMPLOYEES TO SUPERVISORS AND THE WORKPLACE; MOTIVATING SUPERVISORS AND STAFF; TIME MANAGEMENT FOR SUPERVISORS AND MANAGERS; THE COMPLEXITY OF MOTIVATION; THE LIMITATIONS OF MOTIVATION RESEARCH; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 6: Appraising and Promoting People in Security Programs; THE DIFFICULTIES OF PERFORMANCE APPRAISAL; WHO SHOULD BE APPRAISED AND WHEN?
APPRAISAL FOR ALL LEVELS AND BY ALL LEVELSWHAT TYPES OF EVALUATION DO WORKERS PREFER?; WHAT NEEDS TO BE EVALUATED?; USING A FORMAL APPRAISAL DOCUMENT; JOB PERFORMANCE RATING; THE NEED FOR APPRAISAL DOCUMENTATION; OTHER WRITTEN APPRAISAL TECHNIQUES; THE APPRAISAL INTERVIEW; ASSESSING PERFORMANCE AMONG DIFFERENT EMPLOYMENT LEVELS; REVIEWING MANAGEMENT STRATEGY; PERFORMANCE REVIEWS FOR SENIOR MANAGEMENT; THE LIMITATIONS OF APPRAISALS; THE PROMOTION PROCESS; WHAT'S WRONG WITH PROMOTION?; WHY PROMOTIONS ARE IMPORTANT; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES
Part II: Special Issues in Security Management
Record Nr. UNINA-9910457300903321
McCrie Robert D  
Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security operations management [[electronic resource] /] / Robert D. McCrie
Security operations management [[electronic resource] /] / Robert D. McCrie
Autore McCrie Robert D
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007
Descrizione fisica 1 online resource (411 p.)
Disciplina 363.289
658.47
Soggetto topico Private security services - Management
Security systems - Management
ISBN 1-280-75202-5
9786610752027
0-08-046949-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Title page; Copyright page; Table of Contents; Preface; Acknowledgments; Part I: General Fundamentals and Competencies; Chapter 1: Security Operations in the Management Environment; ORGANIZATIONS AND MANAGERS; A POINT ABOUT TITLES; WHAT IS THE PURPOSE OF AN EXECUTIVE?; WHAT IS THE STRATEGY OF MANAGEMENT?; THE CHARACTERISTICS OF MODERN ORGANIZATIONS; HOW ORGANIZATIONS ARE STRUCTURED; GOVERNMENT SECURITY OPERATIONS; LAYERS OF MANAGEMENT; SECURITY IN THE ORGANIZATIONAL HIERARCHY; STRUCTURE OF A COMPLEX SECURITY DEPARTMENT; ETHICS AND SECURITY OPERATIONS; SUMMARY
DISCUSSION AND REVIEWENDNOTES; ADDITIONAL REFERENCES; Chapter 2: Core Competencies to Initiate Effective Protection Programs; CORE COMPETENCIES OF SECURITY OPERATIONS; HOW CONTEMPORARY SECURITY SERVICES HAVE EVOLVED; WHAT DRIVES SECURITY OPERATIONS?; A BRIEF HISTORY OF A GROWING FIELD; THE GROWTH OF THE MODERN PROTECTIVE INDUSTRY; HOW SECURITY EXECUTIVES RANK PRIORITIES; SPECIFIC CONCERNS FOR DIFFERENT INDUSTRIES; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 3: Staffing to Meet Protective Goals; PERSONNEL PLANNING; JOB DESCRIPTIONS; NEGLIGENT HIRING LITIGATION
THE VETTING PROCESSSUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 4: Training and Development for High Performance; WHY TRAIN, ANYHOW?; THE TRAINING MANAGER OF OFFICER; PLANNING TRAINING AND DEVELOPMENT REQUIREMENTS; THE ORIENTATION; TRAINING TECHNIQUES; FIREARMS TRAINING; ONGOING "IN-SERVICE" TRAINING; SECURITY TRAINING FOR NONSECURITY PERSONNEL; TRAINING FOR TRAINERS AND SUPERVISORS; DEVELOPMENT AND EDUCATION FOR MANAGERS AND EXECUTIVES; MEASURING EFFECTIVENESS; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES
Chapter 5: Supporting and Motivating Supervisors and StaffSUPPORTING SUPERVISORS AND STAFF; SAFETY AT WORK: THE RESPONSIBILITY OF SUPERVISORS; WHY BE A SUPERVISOR, ANYWAY?; DUTIES OF EMPLOYEES TO SUPERVISORS AND THE WORKPLACE; MOTIVATING SUPERVISORS AND STAFF; TIME MANAGEMENT FOR SUPERVISORS AND MANAGERS; THE COMPLEXITY OF MOTIVATION; THE LIMITATIONS OF MOTIVATION RESEARCH; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 6: Appraising and Promoting People in Security Programs; THE DIFFICULTIES OF PERFORMANCE APPRAISAL; WHO SHOULD BE APPRAISED AND WHEN?
APPRAISAL FOR ALL LEVELS AND BY ALL LEVELSWHAT TYPES OF EVALUATION DO WORKERS PREFER?; WHAT NEEDS TO BE EVALUATED?; USING A FORMAL APPRAISAL DOCUMENT; JOB PERFORMANCE RATING; THE NEED FOR APPRAISAL DOCUMENTATION; OTHER WRITTEN APPRAISAL TECHNIQUES; THE APPRAISAL INTERVIEW; ASSESSING PERFORMANCE AMONG DIFFERENT EMPLOYMENT LEVELS; REVIEWING MANAGEMENT STRATEGY; PERFORMANCE REVIEWS FOR SENIOR MANAGEMENT; THE LIMITATIONS OF APPRAISALS; THE PROMOTION PROCESS; WHAT'S WRONG WITH PROMOTION?; WHY PROMOTIONS ARE IMPORTANT; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES
Part II: Special Issues in Security Management
Record Nr. UNINA-9910784363003321
McCrie Robert D  
Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security operations management [[electronic resource] /] / Robert D. McCrie
Security operations management [[electronic resource] /] / Robert D. McCrie
Autore McCrie Robert D
Edizione [2nd ed.]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007
Descrizione fisica 1 online resource (411 p.)
Disciplina 363.289
658.47
Soggetto topico Private security services - Management
Security systems - Management
ISBN 1-280-75202-5
9786610752027
0-08-046949-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover; Title page; Copyright page; Table of Contents; Preface; Acknowledgments; Part I: General Fundamentals and Competencies; Chapter 1: Security Operations in the Management Environment; ORGANIZATIONS AND MANAGERS; A POINT ABOUT TITLES; WHAT IS THE PURPOSE OF AN EXECUTIVE?; WHAT IS THE STRATEGY OF MANAGEMENT?; THE CHARACTERISTICS OF MODERN ORGANIZATIONS; HOW ORGANIZATIONS ARE STRUCTURED; GOVERNMENT SECURITY OPERATIONS; LAYERS OF MANAGEMENT; SECURITY IN THE ORGANIZATIONAL HIERARCHY; STRUCTURE OF A COMPLEX SECURITY DEPARTMENT; ETHICS AND SECURITY OPERATIONS; SUMMARY
DISCUSSION AND REVIEWENDNOTES; ADDITIONAL REFERENCES; Chapter 2: Core Competencies to Initiate Effective Protection Programs; CORE COMPETENCIES OF SECURITY OPERATIONS; HOW CONTEMPORARY SECURITY SERVICES HAVE EVOLVED; WHAT DRIVES SECURITY OPERATIONS?; A BRIEF HISTORY OF A GROWING FIELD; THE GROWTH OF THE MODERN PROTECTIVE INDUSTRY; HOW SECURITY EXECUTIVES RANK PRIORITIES; SPECIFIC CONCERNS FOR DIFFERENT INDUSTRIES; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 3: Staffing to Meet Protective Goals; PERSONNEL PLANNING; JOB DESCRIPTIONS; NEGLIGENT HIRING LITIGATION
THE VETTING PROCESSSUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 4: Training and Development for High Performance; WHY TRAIN, ANYHOW?; THE TRAINING MANAGER OF OFFICER; PLANNING TRAINING AND DEVELOPMENT REQUIREMENTS; THE ORIENTATION; TRAINING TECHNIQUES; FIREARMS TRAINING; ONGOING "IN-SERVICE" TRAINING; SECURITY TRAINING FOR NONSECURITY PERSONNEL; TRAINING FOR TRAINERS AND SUPERVISORS; DEVELOPMENT AND EDUCATION FOR MANAGERS AND EXECUTIVES; MEASURING EFFECTIVENESS; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES
Chapter 5: Supporting and Motivating Supervisors and StaffSUPPORTING SUPERVISORS AND STAFF; SAFETY AT WORK: THE RESPONSIBILITY OF SUPERVISORS; WHY BE A SUPERVISOR, ANYWAY?; DUTIES OF EMPLOYEES TO SUPERVISORS AND THE WORKPLACE; MOTIVATING SUPERVISORS AND STAFF; TIME MANAGEMENT FOR SUPERVISORS AND MANAGERS; THE COMPLEXITY OF MOTIVATION; THE LIMITATIONS OF MOTIVATION RESEARCH; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 6: Appraising and Promoting People in Security Programs; THE DIFFICULTIES OF PERFORMANCE APPRAISAL; WHO SHOULD BE APPRAISED AND WHEN?
APPRAISAL FOR ALL LEVELS AND BY ALL LEVELSWHAT TYPES OF EVALUATION DO WORKERS PREFER?; WHAT NEEDS TO BE EVALUATED?; USING A FORMAL APPRAISAL DOCUMENT; JOB PERFORMANCE RATING; THE NEED FOR APPRAISAL DOCUMENTATION; OTHER WRITTEN APPRAISAL TECHNIQUES; THE APPRAISAL INTERVIEW; ASSESSING PERFORMANCE AMONG DIFFERENT EMPLOYMENT LEVELS; REVIEWING MANAGEMENT STRATEGY; PERFORMANCE REVIEWS FOR SENIOR MANAGEMENT; THE LIMITATIONS OF APPRAISALS; THE PROMOTION PROCESS; WHAT'S WRONG WITH PROMOTION?; WHY PROMOTIONS ARE IMPORTANT; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES
Part II: Special Issues in Security Management
Record Nr. UNINA-9910816333203321
McCrie Robert D  
Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security risk assessment and management : a professional practice guide for protecting buildings and infrastructures / by Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor
Security risk assessment and management : a professional practice guide for protecting buildings and infrastructures / by Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor
Autore Biringer, Betty E.
Pubbl/distr/stampa Hoboken (NJ), : Wiley, 2007
Descrizione fisica XXVI, 358 p. ; 25 cm
Disciplina 658.4
658.47
Altri autori (Persone) Matalucci, Rudolph V.
O'Connor, Sharon L.
Soggetto topico Aziende - Gestione - Sicurezza
ISBN 0471793523
9780471793526
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISANNIO-NAP0499305
Biringer, Betty E.  
Hoboken (NJ), : Wiley, 2007
Materiale a stampa
Lo trovi qui: Univ. del Sannio
Opac: Controlla la disponibilità qui
Security risk management [[electronic resource] ] : building an information security risk management program from the ground up / / Evan Wheeler
Security risk management [[electronic resource] ] : building an information security risk management program from the ground up / / Evan Wheeler
Autore Wheeler Evan
Edizione [1st edition]
Pubbl/distr/stampa Waltham, MA, : Syngress, 2011
Descrizione fisica 1 online resource (361 pages)
Disciplina 005.8
658.4/7
658.47
Soggetto topico Computer networks - Security measures
Computer security
Soggetto genere / forma Electronic books.
ISBN 1-283-52639-5
9786613838841
1-59749-616-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Security Risk Management: Building an InformationSecurity Risk Management Program from the Ground Up; Copyright; Table of Contents; Preface; Intended Audience; Organization of This Book; Acknowledgments; About the Author; About the Technical Editor; Part I: Introduction to Risk Management; Chapter 1. The Security Evolution; Introduction; How We Got Here; A Risk-Focused Future; Information Security Fundamentals; The Death of Information Security; Summary; References; Chapter 2. Risky Business; Introduction; Applying Risk Management to Information Security
Business-Driven Security ProgramSecurity as an Investment; Qualitative versus Quantitative; Summary; References; Chapter 3. The Risk Management Lifecycle; Introduction; Stages of the Risk Management Lifecycle; Business Impact Assessment; A Vulnerability Assessment Is Not a Risk Assessment; Making Risk Decisions; Mitigation Planning and Long-Term Strategy; Process Ownership; Summary; Part II: Risk Assessment and AnalysisTechniques; Chapter 4. Risk Profiling; Introduction; How Risk Sensitivity Is Measured; Asking the Right Questions; Assessing Risk Appetite; Summary; Reference
Chapter 5. Formulating a RiskIntroduction; Breaking Down a Risk; Who or What Is the Threat?; Summary; References; Chapter 6. Risk Exposure Factors; Introduction; Qualitative Risk Measures; Risk Assessment; Summary; Reference; Chapter 7. Security Controls and Services; Introduction; Fundamental Security Services; Recommended Controls; Summary; Reference; Chapter 8. Risk Evaluation and Mitigation Strategies; Introduction; Risk Evaluation; Risk Mitigation Planning; Policy Exceptions and Risk Acceptance; Summary; Chapter 9. Reports and Consulting; Introduction; Risk Management Artifacts
A Consultant's PerspectiveWriting Audit Responses; Summary; References; Chapter 10. Risk Assessment Techniques; Introduction; Operational Assessments; Project-Based Assessments; Third-Party Assessments; Summary; References; Part III: Building and Running a Risk Management Program; Chapter 11. Threat and Vulnerability Management; Introduction; Building Blocks; Threat Identification; Advisories and Testing; An Efficient Workflow; The FAIR Approach; Summary; References; Chapter 12. Security Risk Reviews; Introduction; Assessing the State of Compliance; Implementing a Process
Process Optimization: A Review of Key PointsThe NIST Approach; Summary; References; Chapter 13. A Blueprint for Security; Introduction; Risk in the Development Lifecycle; Security Architecture; Patterns and Baselines; Architectural Risk Analysis; Summary; Reference; Chapter 14. Building a Program from Scratch; Introduction; Designing a Risk Program; Prerequisites for a Risk Management Program; Risk at the Enterprise Level; Linking the Program Components; Program Roadmap; Summary; Reference; Appendix A: Sample Security Risk Profile; A. General Information; B. Information Sensitivity
C Regulatory Requirements
Record Nr. UNINA-9910459692903321
Wheeler Evan  
Waltham, MA, : Syngress, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security risk management [[electronic resource] ] : building an information security risk management program from the ground up / / Evan Wheeler
Security risk management [[electronic resource] ] : building an information security risk management program from the ground up / / Evan Wheeler
Autore Wheeler Evan
Edizione [1st edition]
Pubbl/distr/stampa Waltham, MA, : Syngress, 2011
Descrizione fisica 1 online resource (361 pages)
Disciplina 005.8
658.4/7
658.47
Soggetto topico Computer networks - Security measures
Computer security
ISBN 1-283-52639-5
9786613838841
1-59749-616-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Security Risk Management: Building an InformationSecurity Risk Management Program from the Ground Up; Copyright; Table of Contents; Preface; Intended Audience; Organization of This Book; Acknowledgments; About the Author; About the Technical Editor; Part I: Introduction to Risk Management; Chapter 1. The Security Evolution; Introduction; How We Got Here; A Risk-Focused Future; Information Security Fundamentals; The Death of Information Security; Summary; References; Chapter 2. Risky Business; Introduction; Applying Risk Management to Information Security
Business-Driven Security ProgramSecurity as an Investment; Qualitative versus Quantitative; Summary; References; Chapter 3. The Risk Management Lifecycle; Introduction; Stages of the Risk Management Lifecycle; Business Impact Assessment; A Vulnerability Assessment Is Not a Risk Assessment; Making Risk Decisions; Mitigation Planning and Long-Term Strategy; Process Ownership; Summary; Part II: Risk Assessment and AnalysisTechniques; Chapter 4. Risk Profiling; Introduction; How Risk Sensitivity Is Measured; Asking the Right Questions; Assessing Risk Appetite; Summary; Reference
Chapter 5. Formulating a RiskIntroduction; Breaking Down a Risk; Who or What Is the Threat?; Summary; References; Chapter 6. Risk Exposure Factors; Introduction; Qualitative Risk Measures; Risk Assessment; Summary; Reference; Chapter 7. Security Controls and Services; Introduction; Fundamental Security Services; Recommended Controls; Summary; Reference; Chapter 8. Risk Evaluation and Mitigation Strategies; Introduction; Risk Evaluation; Risk Mitigation Planning; Policy Exceptions and Risk Acceptance; Summary; Chapter 9. Reports and Consulting; Introduction; Risk Management Artifacts
A Consultant's PerspectiveWriting Audit Responses; Summary; References; Chapter 10. Risk Assessment Techniques; Introduction; Operational Assessments; Project-Based Assessments; Third-Party Assessments; Summary; References; Part III: Building and Running a Risk Management Program; Chapter 11. Threat and Vulnerability Management; Introduction; Building Blocks; Threat Identification; Advisories and Testing; An Efficient Workflow; The FAIR Approach; Summary; References; Chapter 12. Security Risk Reviews; Introduction; Assessing the State of Compliance; Implementing a Process
Process Optimization: A Review of Key PointsThe NIST Approach; Summary; References; Chapter 13. A Blueprint for Security; Introduction; Risk in the Development Lifecycle; Security Architecture; Patterns and Baselines; Architectural Risk Analysis; Summary; Reference; Chapter 14. Building a Program from Scratch; Introduction; Designing a Risk Program; Prerequisites for a Risk Management Program; Risk at the Enterprise Level; Linking the Program Components; Program Roadmap; Summary; Reference; Appendix A: Sample Security Risk Profile; A. General Information; B. Information Sensitivity
C Regulatory Requirements
Record Nr. UNINA-9910790090303321
Wheeler Evan  
Waltham, MA, : Syngress, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security risk management [[electronic resource] ] : building an information security risk management program from the ground up / / Evan Wheeler
Security risk management [[electronic resource] ] : building an information security risk management program from the ground up / / Evan Wheeler
Autore Wheeler Evan
Edizione [1st edition]
Pubbl/distr/stampa Waltham, MA, : Syngress, 2011
Descrizione fisica 1 online resource (361 pages)
Disciplina 005.8
658.4/7
658.47
Soggetto topico Computer networks - Security measures
Computer security
ISBN 1-283-52639-5
9786613838841
1-59749-616-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Security Risk Management: Building an InformationSecurity Risk Management Program from the Ground Up; Copyright; Table of Contents; Preface; Intended Audience; Organization of This Book; Acknowledgments; About the Author; About the Technical Editor; Part I: Introduction to Risk Management; Chapter 1. The Security Evolution; Introduction; How We Got Here; A Risk-Focused Future; Information Security Fundamentals; The Death of Information Security; Summary; References; Chapter 2. Risky Business; Introduction; Applying Risk Management to Information Security
Business-Driven Security ProgramSecurity as an Investment; Qualitative versus Quantitative; Summary; References; Chapter 3. The Risk Management Lifecycle; Introduction; Stages of the Risk Management Lifecycle; Business Impact Assessment; A Vulnerability Assessment Is Not a Risk Assessment; Making Risk Decisions; Mitigation Planning and Long-Term Strategy; Process Ownership; Summary; Part II: Risk Assessment and AnalysisTechniques; Chapter 4. Risk Profiling; Introduction; How Risk Sensitivity Is Measured; Asking the Right Questions; Assessing Risk Appetite; Summary; Reference
Chapter 5. Formulating a RiskIntroduction; Breaking Down a Risk; Who or What Is the Threat?; Summary; References; Chapter 6. Risk Exposure Factors; Introduction; Qualitative Risk Measures; Risk Assessment; Summary; Reference; Chapter 7. Security Controls and Services; Introduction; Fundamental Security Services; Recommended Controls; Summary; Reference; Chapter 8. Risk Evaluation and Mitigation Strategies; Introduction; Risk Evaluation; Risk Mitigation Planning; Policy Exceptions and Risk Acceptance; Summary; Chapter 9. Reports and Consulting; Introduction; Risk Management Artifacts
A Consultant's PerspectiveWriting Audit Responses; Summary; References; Chapter 10. Risk Assessment Techniques; Introduction; Operational Assessments; Project-Based Assessments; Third-Party Assessments; Summary; References; Part III: Building and Running a Risk Management Program; Chapter 11. Threat and Vulnerability Management; Introduction; Building Blocks; Threat Identification; Advisories and Testing; An Efficient Workflow; The FAIR Approach; Summary; References; Chapter 12. Security Risk Reviews; Introduction; Assessing the State of Compliance; Implementing a Process
Process Optimization: A Review of Key PointsThe NIST Approach; Summary; References; Chapter 13. A Blueprint for Security; Introduction; Risk in the Development Lifecycle; Security Architecture; Patterns and Baselines; Architectural Risk Analysis; Summary; Reference; Chapter 14. Building a Program from Scratch; Introduction; Designing a Risk Program; Prerequisites for a Risk Management Program; Risk at the Enterprise Level; Linking the Program Components; Program Roadmap; Summary; Reference; Appendix A: Sample Security Risk Profile; A. General Information; B. Information Sensitivity
C Regulatory Requirements
Record Nr. UNINA-9910820765503321
Wheeler Evan  
Waltham, MA, : Syngress, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
La sécurité privée : le phénomène, la controverse, l'avenir / / Maurice Cusson
La sécurité privée : le phénomène, la controverse, l'avenir / / Maurice Cusson
Autore Cusson Maurice
Pubbl/distr/stampa Chicoutimi : , : J.-M. Tremblay, , 2006
Descrizione fisica 1 online resource
Disciplina 658.47
Collana Classiques des sciences sociales
Soggetto topico Security systems
Private security services - Management
ISBN 1-4123-5068-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione fre
Nota di contenuto Introduction -- Le phénomène -- Définition -- Les fonctions -- Le marché et la dynamique de la sécurité privée -- Inquiétudes et controverses -- Big brother ? -- Intérêt particulier, déplacement et bien commun -- Une protection réservée aux riches ? -- Des gardes au-dessus de tout soupçon ? -- L'avenir : deux tendances -- L'intégration des technologies -- Une expertise fondée sur l'intelligence des problèmes.
Altri titoli varianti La sécurité privée
Record Nr. UNINA-9910131175103321
Cusson Maurice  
Chicoutimi : , : J.-M. Tremblay, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Space-Air-Ground Integrated Network Security [[electronic resource] /] / by Jianwei Liu, Lin Bai, Chunxiao Jiang, Wei Zhang
Space-Air-Ground Integrated Network Security [[electronic resource] /] / by Jianwei Liu, Lin Bai, Chunxiao Jiang, Wei Zhang
Autore Liu Jianwei
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (435 pages)
Disciplina 658.47
Soggetto topico Computer networks - Security measures
Data protection
Security systems
Mobile and Network Security
Data and Information Security
Security Science and Technology
ISBN 981-9911-25-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 Introduction to SAGIN Security -- Chapter 2 Theory Foundation of SAGIN Security -- Chapter 3 Ground Network Security -- Chapter 4 Airborne Network Security -- Chapter 5 Space Network Security -- Chapter 6 Future Trend of Network Security.
Record Nr. UNINA-9910731484603321
Liu Jianwei  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Space-Air-Ground Integrated Network Security [[electronic resource] /] / by Jianwei Liu, Lin Bai, Chunxiao Jiang, Wei Zhang
Space-Air-Ground Integrated Network Security [[electronic resource] /] / by Jianwei Liu, Lin Bai, Chunxiao Jiang, Wei Zhang
Autore Liu Jianwei
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (435 pages)
Disciplina 658.47
Soggetto topico Computer networks - Security measures
Data protection
Security systems
Mobile and Network Security
Data and Information Security
Security Science and Technology
ISBN 981-9911-25-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1 Introduction to SAGIN Security -- Chapter 2 Theory Foundation of SAGIN Security -- Chapter 3 Ground Network Security -- Chapter 4 Airborne Network Security -- Chapter 5 Space Network Security -- Chapter 6 Future Trend of Network Security.
Record Nr. UNISA-996546842003316
Liu Jianwei  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui