Strategic security management: a risk assessment guide for decision makers
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Butterworth-Heinemann
c2007
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes bibliographical references (p. 357-373) and index Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organizations assets, giving decision makers the foundation needed to climb the next step up the corporate ladder. Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures. Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald. * Provides clear direction on how to meet new business demands on the security professional * Guides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the program * Covers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each |
Beschreibung: | 1 Online-Ressource (xxi, 389 p.) |
ISBN: | 9780080465968 008046596X 9780123708977 0123708974 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314252 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2007 |||| o||u| ||||||eng d | ||
020 | |a 9780080465968 |c electronic bk. |9 978-0-08-046596-8 | ||
020 | |a 008046596X |c electronic bk. |9 0-08-046596-X | ||
020 | |a 9780123708977 |9 978-0-12-370897-7 | ||
020 | |a 0123708974 |9 0-12-370897-4 | ||
035 | |a (ZDB-33-EBS)ocn714802818 | ||
035 | |a (OCoLC)714802818 | ||
035 | |a (DE-599)BVBBV042314252 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 658.4/78 |2 22 | |
100 | 1 | |a Vellani, Karim H. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Strategic security management |b a risk assessment guide for decision makers |c Karim H. Vellani |
264 | 1 | |a Amsterdam |b Butterworth-Heinemann |c c2007 | |
300 | |a 1 Online-Ressource (xxi, 389 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 357-373) and index | ||
500 | |a Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organizations assets, giving decision makers the foundation needed to climb the next step up the corporate ladder. Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures. Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald. * Provides clear direction on how to meet new business demands on the security professional * Guides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the program * Covers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each | ||
650 | 7 | |a BUSINESS & ECONOMICS / Workplace Culture |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Governance |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Leadership |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Development |2 bisacsh | |
650 | 7 | |a Industries / Security measures / Management |2 local | |
650 | 7 | |a Risk assessment |2 local | |
650 | 7 | |a Information technology / Security measures |2 local | |
650 | 7 | |a Management information systems / Security measures |2 local | |
650 | 4 | |a Führung | |
650 | 4 | |a Industrie | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Industries |x Security measures |x Management | |
650 | 4 | |a Risk assessment | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Management information systems |x Security measures | |
653 | |a Electronic books | ||
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780123708977 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027751243 |
Datensatz im Suchindex
_version_ | 1804152907208065024 |
---|---|
any_adam_object | |
author | Vellani, Karim H. |
author_facet | Vellani, Karim H. |
author_role | aut |
author_sort | Vellani, Karim H. |
author_variant | k h v kh khv |
building | Verbundindex |
bvnumber | BV042314252 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn714802818 (OCoLC)714802818 (DE-599)BVBBV042314252 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03915nmm a2200577zc 4500</leader><controlfield tag="001">BV042314252</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080465968</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-046596-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008046596X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-046596-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123708977</subfield><subfield code="9">978-0-12-370897-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123708974</subfield><subfield code="9">0-12-370897-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn714802818</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)714802818</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314252</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vellani, Karim H.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Strategic security management</subfield><subfield code="b">a risk assessment guide for decision makers</subfield><subfield code="c">Karim H. Vellani</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Butterworth-Heinemann</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 389 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 357-373) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organizations assets, giving decision makers the foundation needed to climb the next step up the corporate ladder. Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures. Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald. * Provides clear direction on how to meet new business demands on the security professional * Guides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the program * Covers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Workplace Culture</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Governance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Leadership</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Development</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Industries / Security measures / Management</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Risk assessment</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Management information systems / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Führung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industries</subfield><subfield code="x">Security measures</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk assessment</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780123708977</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751243</subfield></datafield></record></collection> |
id | DE-604.BV042314252 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9780080465968 008046596X 9780123708977 0123708974 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751243 |
oclc_num | 714802818 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxi, 389 p.) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Butterworth-Heinemann |
record_format | marc |
spelling | Vellani, Karim H. Verfasser aut Strategic security management a risk assessment guide for decision makers Karim H. Vellani Amsterdam Butterworth-Heinemann c2007 1 Online-Ressource (xxi, 389 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (p. 357-373) and index Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organizations assets, giving decision makers the foundation needed to climb the next step up the corporate ladder. Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures. Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald. * Provides clear direction on how to meet new business demands on the security professional * Guides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the program * Covers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Industries / Security measures / Management local Risk assessment local Information technology / Security measures local Management information systems / Security measures local Führung Industrie Wirtschaft Industries Security measures Management Risk assessment Information technology Security measures Management information systems Security measures Electronic books http://www.sciencedirect.com/science/book/9780123708977 Verlag Volltext |
spellingShingle | Vellani, Karim H. Strategic security management a risk assessment guide for decision makers BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Industries / Security measures / Management local Risk assessment local Information technology / Security measures local Management information systems / Security measures local Führung Industrie Wirtschaft Industries Security measures Management Risk assessment Information technology Security measures Management information systems Security measures |
title | Strategic security management a risk assessment guide for decision makers |
title_auth | Strategic security management a risk assessment guide for decision makers |
title_exact_search | Strategic security management a risk assessment guide for decision makers |
title_full | Strategic security management a risk assessment guide for decision makers Karim H. Vellani |
title_fullStr | Strategic security management a risk assessment guide for decision makers Karim H. Vellani |
title_full_unstemmed | Strategic security management a risk assessment guide for decision makers Karim H. Vellani |
title_short | Strategic security management |
title_sort | strategic security management a risk assessment guide for decision makers |
title_sub | a risk assessment guide for decision makers |
topic | BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Industries / Security measures / Management local Risk assessment local Information technology / Security measures local Management information systems / Security measures local Führung Industrie Wirtschaft Industries Security measures Management Risk assessment Information technology Security measures Management information systems Security measures |
topic_facet | BUSINESS & ECONOMICS / Workplace Culture BUSINESS & ECONOMICS / Corporate Governance BUSINESS & ECONOMICS / Leadership BUSINESS & ECONOMICS / Organizational Development Industries / Security measures / Management Risk assessment Information technology / Security measures Management information systems / Security measures Führung Industrie Wirtschaft Industries Security measures Management Information technology Security measures Management information systems Security measures |
url | http://www.sciencedirect.com/science/book/9780123708977 |
work_keys_str_mv | AT vellanikarimh strategicsecuritymanagementariskassessmentguidefordecisionmakers |