Security metrics management: how to measure the costs and benefits of security
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Elsevier Butterworth-Heinemann
2006
|
Schlagworte: | |
Online-Zugang: | Table of contents Klappentext Inhaltsverzeichnis |
Beschreibung: | Includes index. |
Beschreibung: | XXVIII, 323 S. Ill., graph. Darst. |
ISBN: | 0750678992 9780750678995 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV021293060 | ||
003 | DE-604 | ||
005 | 20060809 | ||
007 | t | ||
008 | 060116s2006 xxuad|| |||| 00||| eng d | ||
010 | |a 2005025565 | ||
020 | |a 0750678992 |c pbk. : alk. paper |9 0-7506-7899-2 | ||
020 | |a 9780750678995 |9 978-0-7506-7899-5 | ||
035 | |a (OCoLC)61499895 | ||
035 | |a (DE-599)BVBBV021293060 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-739 | ||
050 | 0 | |a HV8290 | |
082 | 0 | |a 658.4/70681 |2 22 | |
084 | |a QP 360 |0 (DE-625)141869: |2 rvk | ||
100 | 1 | |a Kovacich, Gerald L. |d 1944- |e Verfasser |0 (DE-588)122859278 |4 aut | |
245 | 1 | 0 | |a Security metrics management |b how to measure the costs and benefits of security |c by Gerald Kovacich and Edward Halibozek |
264 | 1 | |a Amsterdam [u.a.] |b Elsevier Butterworth-Heinemann |c 2006 | |
300 | |a XXVIII, 323 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index. | ||
650 | 4 | |a Private security services | |
650 | 4 | |a Security systems | |
650 | 4 | |a Corporations |x Security measures | |
650 | 4 | |a Corporations |x Security measures |x Costs | |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Industrieanlage |0 (DE-588)4026801-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Industrieanlage |0 (DE-588)4026801-9 |D s |
689 | 0 | 1 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | |C b |5 DE-604 | |
700 | 1 | |a Halibozek, Edward P. |e Verfasser |4 aut | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip0518/2005025565.html |3 Table of contents | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014613883&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014613883&sequence=000006&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014613883 |
Datensatz im Suchindex
_version_ | 1804135086440841216 |
---|---|
adam_text | Security Metrics Management offers straight-forward solutions to measure the
costs and benefits of an assets protection program. The book provides tools that
enable the
using this information to improve upon the system s overall effectiveness.
Some of the common questions posed to security
professionals by management include:
•
•
assets protection program?
•
•
more efficiently?
Security Metrics Management answers these questions and more, covering the essentials to
establishing a baseline to measure the costs, benefits, and effectiveness of an assets protection
program. Broken out into five sections, the book discusses such topics as Six Sigma, security
operations, physical security, outsourcing security, security awareness and training, information
security, contingency planning, personnel security, and a host of other considerations. In addition,
the book also addresses how to provide a security metrics brief to management, using trend
analyses to justify resources
With its thorough descriptions and concise explanations, Security Metrics Management provides the
information needed to establish, evaluate, and manage a cost-effective assets protection program.
Contents
Preface xiii
Acknowledgments xxi
Foreword xxiii
Introduction xxv
Section I: Introduction to the Role ofthe Security Professionals
and Security Metrics Managemen t 1
Chapter 1: The Security Profession and Its Role in Supporting
Business and Government Agency Assets Protection Needs 3
Introduction 3
The Need for Security Professionals in Business 5
Corporate Security Today 8
The Role of the Corporate Security Professional 8
The Required Skills of the Security Professional 9
What Kind of People Are Needed? 10
Why the Corporate Security Professional? 10
Where is Security s Place in the Corporation? 11
Summary 12
Chapter 2: Management and Security Metrics Management Foundation 13
Introduction 13
Security From an Executive Management Perspective 13
Summary 17
Chapter 3: Policies, Procedures, Processes, Plans and Projects 19
Introduction 19
Triad of Assets Protection and Security Functional Drivers 20
Part One of the Security Drivers Triad: Risk Management Drivers 20
Part Two of the Drivers Triad: Corporate Decisions Drivers 21
Part Three of the Drivers Triad: Laws, Regulations, Best Business Practices,
Ethics and Privacy Drivers 22
Summary of Drivers 24
CAPP-Related Policies 25
CAPP-Related Procedures 25
CAPP-Related Processes 26
ix
Process Management 27
Performance Management 28
CAPP-Related Plans 28
CAPP-Related Projects 29
Security Duties and Responsibilities 34
Corporate Assets Protection Program (CAPP) 34
Summary 35
Chapter 4: Security Metrics Management Program—An Overview 37
Introduction 37
First Steps in the Development of an SMMP 38
Security Metrics Management is not Rocket Science 40
Questions Concerning Data Collection 43
SMMP Chart Designs 44
Using Technology to Deliver Metrics Data 44
Quality and Oversight 45
Security Metrics and Processes 46
Cost-Avoidance Metrics 47
Using Metrics Charts for Management Briefings 47
Sequence of Assets Protection Charts for Management Briefings 48
Case Study: Metrics Data Collection Example—Badge-Making Process 50
SMMP and Executive Management 51
Case Study: Use of Metrics in Times of Downsizing Security Staff 52
More on SMMP and Downsizing 53
Case Study: Charting Assets Protection Infractions as
Part of an SMMP and Briefing Management on the Results 56
Case Study—Using Metrics to Determine Success 57
Summary 58
Chapter 5: Case Study: Measuring the Costs of Security 59
Introduction 59
IWC Assets Protection Survey Questionnaire 60
Examples of Some Metrics Charts 64
Summary 74
Chapter 6: Case Study: Six Sigma 75
Introduction 75
A Case Study—Another Approach to Security Metrics Management 75
Case Study—Patch Management 77
Conclusion 80
Sectionll: Administrative Security Metrics 81
Chapter 7: Information Security 83
Introduction 83
Three Basic Categories of Information 87
An Information Protection Philosophy 88
Business Information lypes and Examples 89
Security Drivers 90
Information Security Process Flowcharts 90
What, When, Who, Where, How of Data Collection 92
Sample Metrics Charts 93
A Case Study 95
Summary 97
Chapter 8: Personnel Security 99
Introduction 99
Pre-Employment and Background Investigations 100
Basics ofPre-EmploymentChecks 101
What Are Pre-Employment Background Investigations? 101
Pre-Employment and Background Investigations Drivers and Flowcharts 101
Sample Pre-Employment and Background Investigations Metrics Charts 103
WorkplaceViolence 109
Workplace Violence Prevention Program 110
Case Study 111
Summary 114
Chapter 9: Security Education and Awareness Training 115
Introduction 115
SEATP Organization 116
SEATP Drivers and Flowcharts 117
SEATP Metrics 118
Sample SEATP Metrics Charts 119
Data Collection And Metrics Management 122
SEATP Case Study 124
Summary 126
Chapter 10: Security Compliance Audits 127
Introduction 127
SCA Organization 127
SCA Drivers and Flowcharts 128
SCA Metrics 129
SCA Metrics Charts—A Sampling 131
The Who, How, Where, When, Why and What of SCA Metrics Tracking 134
SCA Case Study 135
SCA Summary 136
Chapter 11: Surveys and Risk Management 137
Introduction 137
SRM Drivers and Flowcharts 139
Sample SCA Metrics Charts 140
The Who, How, Where, When, Why and What of SRM Metrics Tracking 142
Case Study 143
Summary 152
Chapterl2: Corporate Assets Protection Program 153
Introduction 153
The CAPP and Other Drivers, Plans and Their Flowcharts 156
CAPP Data Collection and Security Metrics Management 157
Is the CAPP Working as Planned? 157
IsItEffective? 159
How Much Does It Cost? 159
How CanltBeDone Better? 161
HowCanltBeDoneCheaper? 161
Case Study 162
Summary 162
Chapter 13: Contingency Planning 163
Introduction 163
Contingency Planning Organization 165
Contingency Planning Drivers and Flowcharts 165
Examples of Contingency Planning Metrics Measurement Tools 171
Contingency Planning Case Study 175
Summary 175
Section III: Physical Security Metrics 177
Chapter 14: The Guard Force 181
Introduction 181
Guard Force Security Organization 183
Guard Force Security Drivers and Flowcharts 183
Guard Force Metrics Charts Examples 184
Guard Force Case Study 186
Guard Force Summary 188
Chapter 15: Technical Security Systems 189
Introduction 189
Technical Security Systems Organization 189
Technical Security Systems Flowcharts 190
Technical Security Systems Metrics 192
Technical Security Systems Case Study 199
Summary 200
Chapter 16: Locksand Keys 201
Introduction 201
Locks and Keys Organization 202
Locks and Keys Drivers and Flowcharts 202
Locks and Keys Examples of Security Metrics 203
Lock and Key Case Study 206
Summary 207
Chapter 17: Fire Protection 209
Introduction 209
Fire Protection Organization 210
Fire Protection Drivers and Flowcharts 211
Fire Prevention And Suppression Metrics Examples 213
Case Study—Outsourcing Fire Prevention and/or Suppression 216
Summary 216
Chapter 18: Executive Protection 217
Introduction 217
Executive Protection Organization 219
Executive Protection Drivers and Flowcharts 220
Executive Protection Examples of Metrics 221
Executive Protection Case Study 223
Summary 223
Chapter 19: Event Security 225
Introduction 225
Event Security Organization 225
Event Security Drivers and Flowcharts 226
Event Security Metrics 227
Event Security Case Study 229
Event Security Summary 229
SectionlV: Security Opemtions Metrics 231
Chapter 20: Investigations and Noncompliance Inquiries 233
Introduction 233
Investigations and NCI Organization 233
Investigations and NCI Drivers and Flowcharts 234
Investigations and NCI Examples of Metrics 235
Investigations and NCI Case Study 241
Investigations and NCI Summary 243
Chapter 21: Government Security 245
Introduction 245
IWC s Government Security Organization 247
Government Security Drivers and Flowcharts 248
Government Security Examples of Metrics 249
Government Security Case Study 251
Government Security Summary 253
Chapter22: Information Systems Security 255
Introduction 255
Infosec Organization 256
Infosec Drivers and Flowcharts 258
Infosec ExamplesofMetrics 262
Infosec Case Study 264
Infosec Summary 264
Chapter 23: Mergers, Acquisitions or Divestitures Security 265
Introduction 265
MAD-Related Security Organization 266
MAD Security Drivers Flowcharts and Checklists 268
MAD—ExamplesofMetrics 269
Checklists 270
MAD Case Study 273
MAD Summary 274
Chapter 24: Outsourcing 275
Introduction 275
Outsourcing Organization 277
Outsourcing Drivers and Flowcharts 278
Outsourcing Examples of Metrics 278
Post-ContractAward 280
Outsourcing Case Study 281
Outsourcing Summary 282
Section V: The Security Profession and Metrics Management in the Future 283
Chapter 25: Security Metrics Management Technology of the Future
and How to Prepare Now to Use It 285
Introduction 285
New Technology 286
Applying High Technology to the Security Metrics Management Program 287
Application Software Tools For Today 289
Evaluating Current And Future Data Collection Needs 289
Current and Future— Tools —Hardware and Software to Support an SMMP 291
Summary 294
Appendix: Security Benchmarking Group Survey 295
About the Authors 317
Index 319
|
adam_txt |
Security Metrics Management offers straight-forward solutions to measure the
costs and benefits of an assets protection program. The book provides tools that
enable the
using this information to improve upon the system's overall effectiveness.
Some of the common questions posed to security
professionals by management include:
•
•
assets protection program?
•
•
more efficiently?
Security Metrics Management answers these questions and more, covering the essentials to
establishing a baseline to measure the costs, benefits, and effectiveness of an assets protection
program. Broken out into five sections, the book discusses such topics as Six Sigma, security
operations, physical security, outsourcing security, security awareness and training, information
security, contingency planning, personnel security, and a host of other considerations. In addition,
the book also addresses how to provide a security metrics brief to management, using trend
analyses to justify resources
With its thorough descriptions and concise explanations, Security Metrics Management provides the
information needed to establish, evaluate, and manage a cost-effective assets protection program.
Contents
Preface xiii
Acknowledgments xxi
Foreword xxiii
Introduction xxv
Section I: Introduction to the Role ofthe Security Professionals
and Security Metrics Managemen t 1
Chapter 1: The Security Profession and Its Role in Supporting
Business and Government Agency Assets Protection Needs 3
Introduction 3
The Need for Security Professionals in Business 5
Corporate Security Today 8
The Role of the Corporate Security Professional 8
The Required Skills of the Security Professional 9
What Kind of People Are Needed? 10
Why the Corporate Security Professional? 10
Where is Security's Place in the Corporation? 11
Summary 12
Chapter 2: Management and Security Metrics Management Foundation 13
Introduction 13
Security From an Executive Management Perspective 13
Summary 17
Chapter 3: Policies, Procedures, Processes, Plans and Projects 19
Introduction 19
Triad of Assets Protection and Security Functional Drivers 20
Part One of the Security Drivers' Triad: Risk Management Drivers 20
Part Two of the Drivers' Triad: Corporate Decisions' Drivers 21
Part Three of the Drivers' Triad: Laws, Regulations, Best Business Practices,
Ethics and Privacy Drivers 22
Summary of Drivers 24
CAPP-Related Policies 25
CAPP-Related Procedures 25
CAPP-Related Processes 26
ix
Process Management 27
Performance Management 28
CAPP-Related Plans 28
CAPP-Related Projects 29
Security Duties and Responsibilities 34
Corporate Assets Protection Program (CAPP) 34
Summary 35
Chapter 4: Security Metrics Management Program—An Overview 37
Introduction 37
First Steps in the Development of an SMMP 38
Security Metrics Management is not Rocket Science 40
Questions Concerning Data Collection 43
SMMP Chart Designs 44
Using Technology to Deliver Metrics Data 44
Quality and Oversight 45
Security Metrics and Processes 46
Cost-Avoidance Metrics 47
Using Metrics Charts for Management Briefings 47
Sequence of Assets Protection Charts for Management Briefings 48
Case Study: Metrics Data Collection Example—Badge-Making Process 50
SMMP and Executive Management 51
Case Study: Use of Metrics in Times of Downsizing Security Staff 52
More on SMMP and Downsizing 53
Case Study: Charting Assets Protection Infractions as
Part of an SMMP and Briefing Management on the Results 56
Case Study—Using Metrics to Determine Success 57
Summary 58
Chapter 5: Case Study: Measuring the Costs of Security 59
Introduction 59
IWC Assets Protection Survey Questionnaire 60
Examples of Some Metrics Charts 64
Summary 74
Chapter 6: Case Study: Six Sigma 75
Introduction 75
A Case Study—Another Approach to Security Metrics Management 75
Case Study—Patch Management 77
Conclusion 80
Sectionll: Administrative Security Metrics 81
Chapter 7: Information Security 83
Introduction 83
Three Basic Categories of Information 87
An Information Protection Philosophy 88
Business Information lypes and Examples 89
Security Drivers 90
Information Security Process Flowcharts 90
What, When, Who, Where, How of Data Collection 92
Sample Metrics Charts 93
A Case Study 95
Summary 97
Chapter 8: Personnel Security 99
Introduction 99
Pre-Employment and Background Investigations 100
Basics ofPre-EmploymentChecks 101
What Are Pre-Employment Background Investigations? 101
Pre-Employment and Background Investigations Drivers and Flowcharts 101
Sample Pre-Employment and Background Investigations Metrics Charts 103
WorkplaceViolence 109
Workplace Violence Prevention Program 110
Case Study 111
Summary 114
Chapter 9: Security Education and Awareness Training 115
Introduction 115
SEATP Organization 116
SEATP Drivers and Flowcharts 117
SEATP Metrics 118
Sample SEATP Metrics Charts 119
Data Collection And Metrics Management 122
SEATP Case Study 124
Summary 126
Chapter 10: Security Compliance Audits 127
Introduction 127
SCA Organization 127
SCA Drivers and Flowcharts 128
SCA Metrics 129
SCA Metrics Charts—A Sampling 131
The Who, How, Where, When, Why and What of SCA Metrics Tracking 134
SCA Case Study 135
SCA Summary 136
Chapter 11: Surveys and Risk Management 137
Introduction 137
SRM Drivers and Flowcharts 139
Sample SCA Metrics Charts 140
The Who, How, Where, When, Why and What of SRM Metrics Tracking 142
Case Study 143
Summary 152
Chapterl2: Corporate Assets Protection Program 153
Introduction 153
The CAPP and Other Drivers, Plans and Their Flowcharts 156
CAPP Data Collection and Security Metrics Management 157
Is the CAPP Working as Planned? 157
IsItEffective? 159
How Much Does It Cost? 159
How CanltBeDone Better? 161
HowCanltBeDoneCheaper? 161
Case Study 162
Summary 162
Chapter 13: Contingency Planning 163
Introduction 163
Contingency Planning Organization 165
Contingency Planning Drivers and Flowcharts 165
Examples of Contingency Planning Metrics' Measurement Tools 171
Contingency Planning Case Study 175
Summary 175
Section III: Physical Security Metrics 177
Chapter 14: The Guard Force 181
Introduction 181
Guard Force Security Organization 183
Guard Force Security Drivers and Flowcharts 183
Guard Force Metrics Charts Examples 184
Guard Force Case Study 186
Guard Force Summary 188
Chapter 15: Technical Security Systems 189
Introduction 189
Technical Security Systems Organization 189
Technical Security Systems Flowcharts 190
Technical Security Systems Metrics 192
Technical Security Systems Case Study 199
Summary 200
Chapter 16: Locksand Keys 201
Introduction 201
Locks and Keys Organization 202
Locks and Keys Drivers and Flowcharts 202
Locks and Keys Examples of Security Metrics 203
Lock and Key Case Study 206
Summary 207
Chapter 17: Fire Protection 209
Introduction 209
Fire Protection Organization 210
Fire Protection Drivers and Flowcharts 211
Fire Prevention And Suppression Metrics Examples 213
Case Study—Outsourcing Fire Prevention and/or Suppression 216
Summary 216
Chapter 18: Executive Protection 217
Introduction 217
Executive Protection Organization 219
Executive Protection Drivers and Flowcharts 220
Executive Protection Examples of Metrics 221
Executive Protection Case Study 223
Summary 223
Chapter 19: Event Security 225
Introduction 225
Event Security Organization 225
Event Security Drivers and Flowcharts 226
Event Security Metrics 227
Event Security Case Study 229
Event Security Summary 229
SectionlV: Security Opemtions Metrics 231
Chapter 20: Investigations and Noncompliance Inquiries 233
Introduction 233
Investigations and NCI Organization 233
Investigations and NCI Drivers and Flowcharts 234
Investigations and NCI Examples of Metrics 235
Investigations and NCI Case Study 241
Investigations and NCI Summary 243
Chapter 21: Government Security 245
Introduction 245
IWC's Government Security Organization 247
Government Security Drivers and Flowcharts 248
Government Security Examples of Metrics 249
Government Security Case Study 251
Government Security Summary 253
Chapter22: Information Systems Security 255
Introduction 255
Infosec Organization 256
Infosec Drivers and Flowcharts 258
Infosec ExamplesofMetrics 262
Infosec Case Study 264
Infosec Summary 264
Chapter 23: Mergers, Acquisitions or Divestitures Security 265
Introduction 265
MAD-Related Security Organization 266
MAD Security Drivers Flowcharts and Checklists 268
MAD—ExamplesofMetrics 269
Checklists 270
MAD Case Study 273
MAD Summary 274
Chapter 24: Outsourcing 275
Introduction 275
Outsourcing Organization 277
Outsourcing Drivers and Flowcharts 278
Outsourcing Examples of Metrics 278
Post-ContractAward 280
Outsourcing Case Study 281
Outsourcing Summary 282
Section V: The Security Profession and Metrics Management in the Future 283
Chapter 25: Security Metrics Management Technology of the Future
and How to Prepare Now to Use It 285
Introduction 285
New Technology 286
Applying High Technology to the Security Metrics Management Program 287
Application Software Tools For Today 289
Evaluating Current And Future Data Collection Needs 289
Current and Future—"Tools"—Hardware and Software to Support an SMMP 291
Summary 294
Appendix: Security Benchmarking Group Survey 295
About the Authors 317
Index 319 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Kovacich, Gerald L. 1944- Halibozek, Edward P. |
author_GND | (DE-588)122859278 |
author_facet | Kovacich, Gerald L. 1944- Halibozek, Edward P. |
author_role | aut aut |
author_sort | Kovacich, Gerald L. 1944- |
author_variant | g l k gl glk e p h ep eph |
building | Verbundindex |
bvnumber | BV021293060 |
callnumber-first | H - Social Science |
callnumber-label | HV8290 |
callnumber-raw | HV8290 |
callnumber-search | HV8290 |
callnumber-sort | HV 48290 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | QP 360 |
ctrlnum | (OCoLC)61499895 (DE-599)BVBBV021293060 |
dewey-full | 658.4/70681 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/70681 |
dewey-search | 658.4/70681 |
dewey-sort | 3658.4 570681 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02166nam a2200493zc 4500</leader><controlfield tag="001">BV021293060</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060809 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">060116s2006 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2005025565</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0750678992</subfield><subfield code="c">pbk. : alk. paper</subfield><subfield code="9">0-7506-7899-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780750678995</subfield><subfield code="9">978-0-7506-7899-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)61499895</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021293060</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV8290</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/70681</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 360</subfield><subfield code="0">(DE-625)141869:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kovacich, Gerald L.</subfield><subfield code="d">1944-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)122859278</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security metrics management</subfield><subfield code="b">how to measure the costs and benefits of security</subfield><subfield code="c">by Gerald Kovacich and Edward Halibozek</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Elsevier Butterworth-Heinemann</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVIII, 323 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Private security services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Corporations</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Corporations</subfield><subfield code="x">Security measures</subfield><subfield code="x">Costs</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Industrieanlage</subfield><subfield code="0">(DE-588)4026801-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Industrieanlage</subfield><subfield code="0">(DE-588)4026801-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Halibozek, Edward P.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip0518/2005025565.html</subfield><subfield code="3">Table of contents</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014613883&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014613883&sequence=000006&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014613883</subfield></datafield></record></collection> |
id | DE-604.BV021293060 |
illustrated | Illustrated |
index_date | 2024-07-02T13:50:25Z |
indexdate | 2024-07-09T20:34:55Z |
institution | BVB |
isbn | 0750678992 9780750678995 |
language | English |
lccn | 2005025565 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014613883 |
oclc_num | 61499895 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | XXVIII, 323 S. Ill., graph. Darst. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Elsevier Butterworth-Heinemann |
record_format | marc |
spelling | Kovacich, Gerald L. 1944- Verfasser (DE-588)122859278 aut Security metrics management how to measure the costs and benefits of security by Gerald Kovacich and Edward Halibozek Amsterdam [u.a.] Elsevier Butterworth-Heinemann 2006 XXVIII, 323 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes index. Private security services Security systems Corporations Security measures Corporations Security measures Costs Risikomanagement (DE-588)4121590-4 gnd rswk-swf Industrieanlage (DE-588)4026801-9 gnd rswk-swf Industrieanlage (DE-588)4026801-9 s Risikomanagement (DE-588)4121590-4 s b DE-604 Halibozek, Edward P. Verfasser aut http://www.loc.gov/catdir/toc/ecip0518/2005025565.html Table of contents Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014613883&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Klappentext HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014613883&sequence=000006&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kovacich, Gerald L. 1944- Halibozek, Edward P. Security metrics management how to measure the costs and benefits of security Private security services Security systems Corporations Security measures Corporations Security measures Costs Risikomanagement (DE-588)4121590-4 gnd Industrieanlage (DE-588)4026801-9 gnd |
subject_GND | (DE-588)4121590-4 (DE-588)4026801-9 |
title | Security metrics management how to measure the costs and benefits of security |
title_auth | Security metrics management how to measure the costs and benefits of security |
title_exact_search | Security metrics management how to measure the costs and benefits of security |
title_exact_search_txtP | Security metrics management how to measure the costs and benefits of security |
title_full | Security metrics management how to measure the costs and benefits of security by Gerald Kovacich and Edward Halibozek |
title_fullStr | Security metrics management how to measure the costs and benefits of security by Gerald Kovacich and Edward Halibozek |
title_full_unstemmed | Security metrics management how to measure the costs and benefits of security by Gerald Kovacich and Edward Halibozek |
title_short | Security metrics management |
title_sort | security metrics management how to measure the costs and benefits of security |
title_sub | how to measure the costs and benefits of security |
topic | Private security services Security systems Corporations Security measures Corporations Security measures Costs Risikomanagement (DE-588)4121590-4 gnd Industrieanlage (DE-588)4026801-9 gnd |
topic_facet | Private security services Security systems Corporations Security measures Corporations Security measures Costs Risikomanagement Industrieanlage |
url | http://www.loc.gov/catdir/toc/ecip0518/2005025565.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014613883&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014613883&sequence=000006&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kovacichgeraldl securitymetricsmanagementhowtomeasurethecostsandbenefitsofsecurity AT halibozekedwardp securitymetricsmanagementhowtomeasurethecostsandbenefitsofsecurity |