Security operations management [[electronic resource] /] / Robert D. McCrie |
Autore | McCrie Robert D |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007 |
Descrizione fisica | 1 online resource (411 p.) |
Disciplina |
363.289
658.47 |
Soggetto topico |
Private security services - Management
Security systems - Management |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-75202-5
9786610752027 0-08-046949-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Title page; Copyright page; Table of Contents; Preface; Acknowledgments; Part I: General Fundamentals and Competencies; Chapter 1: Security Operations in the Management Environment; ORGANIZATIONS AND MANAGERS; A POINT ABOUT TITLES; WHAT IS THE PURPOSE OF AN EXECUTIVE?; WHAT IS THE STRATEGY OF MANAGEMENT?; THE CHARACTERISTICS OF MODERN ORGANIZATIONS; HOW ORGANIZATIONS ARE STRUCTURED; GOVERNMENT SECURITY OPERATIONS; LAYERS OF MANAGEMENT; SECURITY IN THE ORGANIZATIONAL HIERARCHY; STRUCTURE OF A COMPLEX SECURITY DEPARTMENT; ETHICS AND SECURITY OPERATIONS; SUMMARY
DISCUSSION AND REVIEWENDNOTES; ADDITIONAL REFERENCES; Chapter 2: Core Competencies to Initiate Effective Protection Programs; CORE COMPETENCIES OF SECURITY OPERATIONS; HOW CONTEMPORARY SECURITY SERVICES HAVE EVOLVED; WHAT DRIVES SECURITY OPERATIONS?; A BRIEF HISTORY OF A GROWING FIELD; THE GROWTH OF THE MODERN PROTECTIVE INDUSTRY; HOW SECURITY EXECUTIVES RANK PRIORITIES; SPECIFIC CONCERNS FOR DIFFERENT INDUSTRIES; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 3: Staffing to Meet Protective Goals; PERSONNEL PLANNING; JOB DESCRIPTIONS; NEGLIGENT HIRING LITIGATION THE VETTING PROCESSSUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 4: Training and Development for High Performance; WHY TRAIN, ANYHOW?; THE TRAINING MANAGER OF OFFICER; PLANNING TRAINING AND DEVELOPMENT REQUIREMENTS; THE ORIENTATION; TRAINING TECHNIQUES; FIREARMS TRAINING; ONGOING "IN-SERVICE" TRAINING; SECURITY TRAINING FOR NONSECURITY PERSONNEL; TRAINING FOR TRAINERS AND SUPERVISORS; DEVELOPMENT AND EDUCATION FOR MANAGERS AND EXECUTIVES; MEASURING EFFECTIVENESS; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES Chapter 5: Supporting and Motivating Supervisors and StaffSUPPORTING SUPERVISORS AND STAFF; SAFETY AT WORK: THE RESPONSIBILITY OF SUPERVISORS; WHY BE A SUPERVISOR, ANYWAY?; DUTIES OF EMPLOYEES TO SUPERVISORS AND THE WORKPLACE; MOTIVATING SUPERVISORS AND STAFF; TIME MANAGEMENT FOR SUPERVISORS AND MANAGERS; THE COMPLEXITY OF MOTIVATION; THE LIMITATIONS OF MOTIVATION RESEARCH; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 6: Appraising and Promoting People in Security Programs; THE DIFFICULTIES OF PERFORMANCE APPRAISAL; WHO SHOULD BE APPRAISED AND WHEN? APPRAISAL FOR ALL LEVELS AND BY ALL LEVELSWHAT TYPES OF EVALUATION DO WORKERS PREFER?; WHAT NEEDS TO BE EVALUATED?; USING A FORMAL APPRAISAL DOCUMENT; JOB PERFORMANCE RATING; THE NEED FOR APPRAISAL DOCUMENTATION; OTHER WRITTEN APPRAISAL TECHNIQUES; THE APPRAISAL INTERVIEW; ASSESSING PERFORMANCE AMONG DIFFERENT EMPLOYMENT LEVELS; REVIEWING MANAGEMENT STRATEGY; PERFORMANCE REVIEWS FOR SENIOR MANAGEMENT; THE LIMITATIONS OF APPRAISALS; THE PROMOTION PROCESS; WHAT'S WRONG WITH PROMOTION?; WHY PROMOTIONS ARE IMPORTANT; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES Part II: Special Issues in Security Management |
Record Nr. | UNINA-9910457300903321 |
McCrie Robert D | ||
Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security operations management [[electronic resource] /] / Robert D. McCrie |
Autore | McCrie Robert D |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007 |
Descrizione fisica | 1 online resource (411 p.) |
Disciplina |
363.289
658.47 |
Soggetto topico |
Private security services - Management
Security systems - Management |
ISBN |
1-280-75202-5
9786610752027 0-08-046949-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Title page; Copyright page; Table of Contents; Preface; Acknowledgments; Part I: General Fundamentals and Competencies; Chapter 1: Security Operations in the Management Environment; ORGANIZATIONS AND MANAGERS; A POINT ABOUT TITLES; WHAT IS THE PURPOSE OF AN EXECUTIVE?; WHAT IS THE STRATEGY OF MANAGEMENT?; THE CHARACTERISTICS OF MODERN ORGANIZATIONS; HOW ORGANIZATIONS ARE STRUCTURED; GOVERNMENT SECURITY OPERATIONS; LAYERS OF MANAGEMENT; SECURITY IN THE ORGANIZATIONAL HIERARCHY; STRUCTURE OF A COMPLEX SECURITY DEPARTMENT; ETHICS AND SECURITY OPERATIONS; SUMMARY
DISCUSSION AND REVIEWENDNOTES; ADDITIONAL REFERENCES; Chapter 2: Core Competencies to Initiate Effective Protection Programs; CORE COMPETENCIES OF SECURITY OPERATIONS; HOW CONTEMPORARY SECURITY SERVICES HAVE EVOLVED; WHAT DRIVES SECURITY OPERATIONS?; A BRIEF HISTORY OF A GROWING FIELD; THE GROWTH OF THE MODERN PROTECTIVE INDUSTRY; HOW SECURITY EXECUTIVES RANK PRIORITIES; SPECIFIC CONCERNS FOR DIFFERENT INDUSTRIES; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 3: Staffing to Meet Protective Goals; PERSONNEL PLANNING; JOB DESCRIPTIONS; NEGLIGENT HIRING LITIGATION THE VETTING PROCESSSUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 4: Training and Development for High Performance; WHY TRAIN, ANYHOW?; THE TRAINING MANAGER OF OFFICER; PLANNING TRAINING AND DEVELOPMENT REQUIREMENTS; THE ORIENTATION; TRAINING TECHNIQUES; FIREARMS TRAINING; ONGOING "IN-SERVICE" TRAINING; SECURITY TRAINING FOR NONSECURITY PERSONNEL; TRAINING FOR TRAINERS AND SUPERVISORS; DEVELOPMENT AND EDUCATION FOR MANAGERS AND EXECUTIVES; MEASURING EFFECTIVENESS; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES Chapter 5: Supporting and Motivating Supervisors and StaffSUPPORTING SUPERVISORS AND STAFF; SAFETY AT WORK: THE RESPONSIBILITY OF SUPERVISORS; WHY BE A SUPERVISOR, ANYWAY?; DUTIES OF EMPLOYEES TO SUPERVISORS AND THE WORKPLACE; MOTIVATING SUPERVISORS AND STAFF; TIME MANAGEMENT FOR SUPERVISORS AND MANAGERS; THE COMPLEXITY OF MOTIVATION; THE LIMITATIONS OF MOTIVATION RESEARCH; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 6: Appraising and Promoting People in Security Programs; THE DIFFICULTIES OF PERFORMANCE APPRAISAL; WHO SHOULD BE APPRAISED AND WHEN? APPRAISAL FOR ALL LEVELS AND BY ALL LEVELSWHAT TYPES OF EVALUATION DO WORKERS PREFER?; WHAT NEEDS TO BE EVALUATED?; USING A FORMAL APPRAISAL DOCUMENT; JOB PERFORMANCE RATING; THE NEED FOR APPRAISAL DOCUMENTATION; OTHER WRITTEN APPRAISAL TECHNIQUES; THE APPRAISAL INTERVIEW; ASSESSING PERFORMANCE AMONG DIFFERENT EMPLOYMENT LEVELS; REVIEWING MANAGEMENT STRATEGY; PERFORMANCE REVIEWS FOR SENIOR MANAGEMENT; THE LIMITATIONS OF APPRAISALS; THE PROMOTION PROCESS; WHAT'S WRONG WITH PROMOTION?; WHY PROMOTIONS ARE IMPORTANT; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES Part II: Special Issues in Security Management |
Record Nr. | UNINA-9910784363003321 |
McCrie Robert D | ||
Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security operations management [[electronic resource] /] / Robert D. McCrie |
Autore | McCrie Robert D |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007 |
Descrizione fisica | 1 online resource (411 p.) |
Disciplina |
363.289
658.47 |
Soggetto topico |
Private security services - Management
Security systems - Management |
ISBN |
1-280-75202-5
9786610752027 0-08-046949-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Title page; Copyright page; Table of Contents; Preface; Acknowledgments; Part I: General Fundamentals and Competencies; Chapter 1: Security Operations in the Management Environment; ORGANIZATIONS AND MANAGERS; A POINT ABOUT TITLES; WHAT IS THE PURPOSE OF AN EXECUTIVE?; WHAT IS THE STRATEGY OF MANAGEMENT?; THE CHARACTERISTICS OF MODERN ORGANIZATIONS; HOW ORGANIZATIONS ARE STRUCTURED; GOVERNMENT SECURITY OPERATIONS; LAYERS OF MANAGEMENT; SECURITY IN THE ORGANIZATIONAL HIERARCHY; STRUCTURE OF A COMPLEX SECURITY DEPARTMENT; ETHICS AND SECURITY OPERATIONS; SUMMARY
DISCUSSION AND REVIEWENDNOTES; ADDITIONAL REFERENCES; Chapter 2: Core Competencies to Initiate Effective Protection Programs; CORE COMPETENCIES OF SECURITY OPERATIONS; HOW CONTEMPORARY SECURITY SERVICES HAVE EVOLVED; WHAT DRIVES SECURITY OPERATIONS?; A BRIEF HISTORY OF A GROWING FIELD; THE GROWTH OF THE MODERN PROTECTIVE INDUSTRY; HOW SECURITY EXECUTIVES RANK PRIORITIES; SPECIFIC CONCERNS FOR DIFFERENT INDUSTRIES; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 3: Staffing to Meet Protective Goals; PERSONNEL PLANNING; JOB DESCRIPTIONS; NEGLIGENT HIRING LITIGATION THE VETTING PROCESSSUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 4: Training and Development for High Performance; WHY TRAIN, ANYHOW?; THE TRAINING MANAGER OF OFFICER; PLANNING TRAINING AND DEVELOPMENT REQUIREMENTS; THE ORIENTATION; TRAINING TECHNIQUES; FIREARMS TRAINING; ONGOING "IN-SERVICE" TRAINING; SECURITY TRAINING FOR NONSECURITY PERSONNEL; TRAINING FOR TRAINERS AND SUPERVISORS; DEVELOPMENT AND EDUCATION FOR MANAGERS AND EXECUTIVES; MEASURING EFFECTIVENESS; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES Chapter 5: Supporting and Motivating Supervisors and StaffSUPPORTING SUPERVISORS AND STAFF; SAFETY AT WORK: THE RESPONSIBILITY OF SUPERVISORS; WHY BE A SUPERVISOR, ANYWAY?; DUTIES OF EMPLOYEES TO SUPERVISORS AND THE WORKPLACE; MOTIVATING SUPERVISORS AND STAFF; TIME MANAGEMENT FOR SUPERVISORS AND MANAGERS; THE COMPLEXITY OF MOTIVATION; THE LIMITATIONS OF MOTIVATION RESEARCH; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES; Chapter 6: Appraising and Promoting People in Security Programs; THE DIFFICULTIES OF PERFORMANCE APPRAISAL; WHO SHOULD BE APPRAISED AND WHEN? APPRAISAL FOR ALL LEVELS AND BY ALL LEVELSWHAT TYPES OF EVALUATION DO WORKERS PREFER?; WHAT NEEDS TO BE EVALUATED?; USING A FORMAL APPRAISAL DOCUMENT; JOB PERFORMANCE RATING; THE NEED FOR APPRAISAL DOCUMENTATION; OTHER WRITTEN APPRAISAL TECHNIQUES; THE APPRAISAL INTERVIEW; ASSESSING PERFORMANCE AMONG DIFFERENT EMPLOYMENT LEVELS; REVIEWING MANAGEMENT STRATEGY; PERFORMANCE REVIEWS FOR SENIOR MANAGEMENT; THE LIMITATIONS OF APPRAISALS; THE PROMOTION PROCESS; WHAT'S WRONG WITH PROMOTION?; WHY PROMOTIONS ARE IMPORTANT; SUMMARY; DISCUSSION AND REVIEW; ENDNOTES; ADDITIONAL REFERENCES Part II: Special Issues in Security Management |
Record Nr. | UNINA-9910816333203321 |
McCrie Robert D | ||
Amsterdam ; ; Boston, : Butterworth-Heinemann, an imprint of Elsevier, 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security risk assessment and management : a professional practice guide for protecting buildings and infrastructures / by Betty E. Biringer, Rudolph V. Matalucci, Sharon L. O'Connor |
Autore | Biringer, Betty E. |
Pubbl/distr/stampa | Hoboken (NJ), : Wiley, 2007 |
Descrizione fisica | XXVI, 358 p. ; 25 cm |
Disciplina |
658.4
658.47 |
Altri autori (Persone) |
Matalucci, Rudolph V.
O'Connor, Sharon L. |
Soggetto topico | Aziende - Gestione - Sicurezza |
ISBN |
0471793523
9780471793526 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISANNIO-NAP0499305 |
Biringer, Betty E. | ||
Hoboken (NJ), : Wiley, 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. del Sannio | ||
|
Security risk management [[electronic resource] ] : building an information security risk management program from the ground up / / Evan Wheeler |
Autore | Wheeler Evan |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, MA, : Syngress, 2011 |
Descrizione fisica | 1 online resource (361 pages) |
Disciplina |
005.8
658.4/7 658.47 |
Soggetto topico |
Computer networks - Security measures
Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-52639-5
9786613838841 1-59749-616-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Security Risk Management: Building an InformationSecurity Risk Management Program from the Ground Up; Copyright; Table of Contents; Preface; Intended Audience; Organization of This Book; Acknowledgments; About the Author; About the Technical Editor; Part I: Introduction to Risk Management; Chapter 1. The Security Evolution; Introduction; How We Got Here; A Risk-Focused Future; Information Security Fundamentals; The Death of Information Security; Summary; References; Chapter 2. Risky Business; Introduction; Applying Risk Management to Information Security
Business-Driven Security ProgramSecurity as an Investment; Qualitative versus Quantitative; Summary; References; Chapter 3. The Risk Management Lifecycle; Introduction; Stages of the Risk Management Lifecycle; Business Impact Assessment; A Vulnerability Assessment Is Not a Risk Assessment; Making Risk Decisions; Mitigation Planning and Long-Term Strategy; Process Ownership; Summary; Part II: Risk Assessment and AnalysisTechniques; Chapter 4. Risk Profiling; Introduction; How Risk Sensitivity Is Measured; Asking the Right Questions; Assessing Risk Appetite; Summary; Reference Chapter 5. Formulating a RiskIntroduction; Breaking Down a Risk; Who or What Is the Threat?; Summary; References; Chapter 6. Risk Exposure Factors; Introduction; Qualitative Risk Measures; Risk Assessment; Summary; Reference; Chapter 7. Security Controls and Services; Introduction; Fundamental Security Services; Recommended Controls; Summary; Reference; Chapter 8. Risk Evaluation and Mitigation Strategies; Introduction; Risk Evaluation; Risk Mitigation Planning; Policy Exceptions and Risk Acceptance; Summary; Chapter 9. Reports and Consulting; Introduction; Risk Management Artifacts A Consultant's PerspectiveWriting Audit Responses; Summary; References; Chapter 10. Risk Assessment Techniques; Introduction; Operational Assessments; Project-Based Assessments; Third-Party Assessments; Summary; References; Part III: Building and Running a Risk Management Program; Chapter 11. Threat and Vulnerability Management; Introduction; Building Blocks; Threat Identification; Advisories and Testing; An Efficient Workflow; The FAIR Approach; Summary; References; Chapter 12. Security Risk Reviews; Introduction; Assessing the State of Compliance; Implementing a Process Process Optimization: A Review of Key PointsThe NIST Approach; Summary; References; Chapter 13. A Blueprint for Security; Introduction; Risk in the Development Lifecycle; Security Architecture; Patterns and Baselines; Architectural Risk Analysis; Summary; Reference; Chapter 14. Building a Program from Scratch; Introduction; Designing a Risk Program; Prerequisites for a Risk Management Program; Risk at the Enterprise Level; Linking the Program Components; Program Roadmap; Summary; Reference; Appendix A: Sample Security Risk Profile; A. General Information; B. Information Sensitivity C Regulatory Requirements |
Record Nr. | UNINA-9910459692903321 |
Wheeler Evan | ||
Waltham, MA, : Syngress, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security risk management [[electronic resource] ] : building an information security risk management program from the ground up / / Evan Wheeler |
Autore | Wheeler Evan |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, MA, : Syngress, 2011 |
Descrizione fisica | 1 online resource (361 pages) |
Disciplina |
005.8
658.4/7 658.47 |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN |
1-283-52639-5
9786613838841 1-59749-616-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Security Risk Management: Building an InformationSecurity Risk Management Program from the Ground Up; Copyright; Table of Contents; Preface; Intended Audience; Organization of This Book; Acknowledgments; About the Author; About the Technical Editor; Part I: Introduction to Risk Management; Chapter 1. The Security Evolution; Introduction; How We Got Here; A Risk-Focused Future; Information Security Fundamentals; The Death of Information Security; Summary; References; Chapter 2. Risky Business; Introduction; Applying Risk Management to Information Security
Business-Driven Security ProgramSecurity as an Investment; Qualitative versus Quantitative; Summary; References; Chapter 3. The Risk Management Lifecycle; Introduction; Stages of the Risk Management Lifecycle; Business Impact Assessment; A Vulnerability Assessment Is Not a Risk Assessment; Making Risk Decisions; Mitigation Planning and Long-Term Strategy; Process Ownership; Summary; Part II: Risk Assessment and AnalysisTechniques; Chapter 4. Risk Profiling; Introduction; How Risk Sensitivity Is Measured; Asking the Right Questions; Assessing Risk Appetite; Summary; Reference Chapter 5. Formulating a RiskIntroduction; Breaking Down a Risk; Who or What Is the Threat?; Summary; References; Chapter 6. Risk Exposure Factors; Introduction; Qualitative Risk Measures; Risk Assessment; Summary; Reference; Chapter 7. Security Controls and Services; Introduction; Fundamental Security Services; Recommended Controls; Summary; Reference; Chapter 8. Risk Evaluation and Mitigation Strategies; Introduction; Risk Evaluation; Risk Mitigation Planning; Policy Exceptions and Risk Acceptance; Summary; Chapter 9. Reports and Consulting; Introduction; Risk Management Artifacts A Consultant's PerspectiveWriting Audit Responses; Summary; References; Chapter 10. Risk Assessment Techniques; Introduction; Operational Assessments; Project-Based Assessments; Third-Party Assessments; Summary; References; Part III: Building and Running a Risk Management Program; Chapter 11. Threat and Vulnerability Management; Introduction; Building Blocks; Threat Identification; Advisories and Testing; An Efficient Workflow; The FAIR Approach; Summary; References; Chapter 12. Security Risk Reviews; Introduction; Assessing the State of Compliance; Implementing a Process Process Optimization: A Review of Key PointsThe NIST Approach; Summary; References; Chapter 13. A Blueprint for Security; Introduction; Risk in the Development Lifecycle; Security Architecture; Patterns and Baselines; Architectural Risk Analysis; Summary; Reference; Chapter 14. Building a Program from Scratch; Introduction; Designing a Risk Program; Prerequisites for a Risk Management Program; Risk at the Enterprise Level; Linking the Program Components; Program Roadmap; Summary; Reference; Appendix A: Sample Security Risk Profile; A. General Information; B. Information Sensitivity C Regulatory Requirements |
Record Nr. | UNINA-9910790090303321 |
Wheeler Evan | ||
Waltham, MA, : Syngress, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security risk management [[electronic resource] ] : building an information security risk management program from the ground up / / Evan Wheeler |
Autore | Wheeler Evan |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, MA, : Syngress, 2011 |
Descrizione fisica | 1 online resource (361 pages) |
Disciplina |
005.8
658.4/7 658.47 |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN |
1-283-52639-5
9786613838841 1-59749-616-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Security Risk Management: Building an InformationSecurity Risk Management Program from the Ground Up; Copyright; Table of Contents; Preface; Intended Audience; Organization of This Book; Acknowledgments; About the Author; About the Technical Editor; Part I: Introduction to Risk Management; Chapter 1. The Security Evolution; Introduction; How We Got Here; A Risk-Focused Future; Information Security Fundamentals; The Death of Information Security; Summary; References; Chapter 2. Risky Business; Introduction; Applying Risk Management to Information Security
Business-Driven Security ProgramSecurity as an Investment; Qualitative versus Quantitative; Summary; References; Chapter 3. The Risk Management Lifecycle; Introduction; Stages of the Risk Management Lifecycle; Business Impact Assessment; A Vulnerability Assessment Is Not a Risk Assessment; Making Risk Decisions; Mitigation Planning and Long-Term Strategy; Process Ownership; Summary; Part II: Risk Assessment and AnalysisTechniques; Chapter 4. Risk Profiling; Introduction; How Risk Sensitivity Is Measured; Asking the Right Questions; Assessing Risk Appetite; Summary; Reference Chapter 5. Formulating a RiskIntroduction; Breaking Down a Risk; Who or What Is the Threat?; Summary; References; Chapter 6. Risk Exposure Factors; Introduction; Qualitative Risk Measures; Risk Assessment; Summary; Reference; Chapter 7. Security Controls and Services; Introduction; Fundamental Security Services; Recommended Controls; Summary; Reference; Chapter 8. Risk Evaluation and Mitigation Strategies; Introduction; Risk Evaluation; Risk Mitigation Planning; Policy Exceptions and Risk Acceptance; Summary; Chapter 9. Reports and Consulting; Introduction; Risk Management Artifacts A Consultant's PerspectiveWriting Audit Responses; Summary; References; Chapter 10. Risk Assessment Techniques; Introduction; Operational Assessments; Project-Based Assessments; Third-Party Assessments; Summary; References; Part III: Building and Running a Risk Management Program; Chapter 11. Threat and Vulnerability Management; Introduction; Building Blocks; Threat Identification; Advisories and Testing; An Efficient Workflow; The FAIR Approach; Summary; References; Chapter 12. Security Risk Reviews; Introduction; Assessing the State of Compliance; Implementing a Process Process Optimization: A Review of Key PointsThe NIST Approach; Summary; References; Chapter 13. A Blueprint for Security; Introduction; Risk in the Development Lifecycle; Security Architecture; Patterns and Baselines; Architectural Risk Analysis; Summary; Reference; Chapter 14. Building a Program from Scratch; Introduction; Designing a Risk Program; Prerequisites for a Risk Management Program; Risk at the Enterprise Level; Linking the Program Components; Program Roadmap; Summary; Reference; Appendix A: Sample Security Risk Profile; A. General Information; B. Information Sensitivity C Regulatory Requirements |
Record Nr. | UNINA-9910820765503321 |
Wheeler Evan | ||
Waltham, MA, : Syngress, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
La sécurité privée : le phénomène, la controverse, l'avenir / / Maurice Cusson |
Autore | Cusson Maurice |
Pubbl/distr/stampa | Chicoutimi : , : J.-M. Tremblay, , 2006 |
Descrizione fisica | 1 online resource |
Disciplina | 658.47 |
Collana | Classiques des sciences sociales |
Soggetto topico |
Security systems
Private security services - Management |
ISBN | 1-4123-5068-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | fre |
Nota di contenuto | Introduction -- Le phénomène -- Définition -- Les fonctions -- Le marché et la dynamique de la sécurité privée -- Inquiétudes et controverses -- Big brother ? -- Intérêt particulier, déplacement et bien commun -- Une protection réservée aux riches ? -- Des gardes au-dessus de tout soupçon ? -- L'avenir : deux tendances -- L'intégration des technologies -- Une expertise fondée sur l'intelligence des problèmes. |
Altri titoli varianti | La sécurité privée |
Record Nr. | UNINA-9910131175103321 |
Cusson Maurice | ||
Chicoutimi : , : J.-M. Tremblay, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Space-Air-Ground Integrated Network Security [[electronic resource] /] / by Jianwei Liu, Lin Bai, Chunxiao Jiang, Wei Zhang |
Autore | Liu Jianwei |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (435 pages) |
Disciplina | 658.47 |
Soggetto topico |
Computer networks - Security measures
Data protection Security systems Mobile and Network Security Data and Information Security Security Science and Technology |
ISBN | 981-9911-25-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1 Introduction to SAGIN Security -- Chapter 2 Theory Foundation of SAGIN Security -- Chapter 3 Ground Network Security -- Chapter 4 Airborne Network Security -- Chapter 5 Space Network Security -- Chapter 6 Future Trend of Network Security. |
Record Nr. | UNINA-9910731484603321 |
Liu Jianwei | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Space-Air-Ground Integrated Network Security [[electronic resource] /] / by Jianwei Liu, Lin Bai, Chunxiao Jiang, Wei Zhang |
Autore | Liu Jianwei |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (435 pages) |
Disciplina | 658.47 |
Soggetto topico |
Computer networks - Security measures
Data protection Security systems Mobile and Network Security Data and Information Security Security Science and Technology |
ISBN | 981-9911-25-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1 Introduction to SAGIN Security -- Chapter 2 Theory Foundation of SAGIN Security -- Chapter 3 Ground Network Security -- Chapter 4 Airborne Network Security -- Chapter 5 Space Network Security -- Chapter 6 Future Trend of Network Security. |
Record Nr. | UNISA-996546842003316 |
Liu Jianwei | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|