Physical security strategy and process playbook:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Oxford
Elsevier
2013
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | The Physical Security Strategy and Process Playbook is a concise yet comprehensive treatment of physical security management in the business context. It can be used as an educational tool, help a security manager define security requirements, and serve as a reference for future planning. This book is organized into six component parts around the central theme that physical security is part of sound business management. These components include an introduction to and explanation of basic physical security concepts; a description of the probable security risks for more than 40 functional areas in business; security performance guidelines along with a variety of supporting mitigation strategies; performance specifications for each of the recommended mitigation strategies; guidance on selecting, implementing, and evaluating a security system; and lists of available physical security resources. The Physical Security Strategy and Process Playbook is an essential resource for anyone who makes security-related decisions within an organization, and can be used as an instructional guide for corporate training or in the classroom. Chapters are categorized by issues and cover the fundamental concepts of physical security up to high-level program procedures Emphasizes performance guidelines (rather than standards) that describe the basic levels of performance to be achieved. Discusses the typical security risks that occur in more than 40 functional areas of an organization, along with security performance guidelines and specifications for each. Covers the selection, implementation, and evaluation of a robust security system Includes bibliographical references |
Beschreibung: | 1 Online-Ressource |
ISBN: | 1299926991 9781299926998 9780124172272 012417227X |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043216073 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151216s2013 |||| o||u| ||||||eng d | ||
020 | |a 1299926991 |c electronic bk. |9 1-299-92699-1 | ||
020 | |a 9781299926998 |c electronic bk. |9 978-1-299-92699-8 | ||
020 | |a 9780124172272 |c electronic bk. |9 978-0-12-417227-2 | ||
020 | |a 012417227X |c electronic bk. |9 0-12-417227-X | ||
035 | |a (OCoLC)859388621 | ||
035 | |a (DE-599)BVBBV043216073 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 658.4/7 |2 23 | |
100 | 1 | |a Kingsley-Hefty, John |e Verfasser |4 aut | |
245 | 1 | 0 | |a Physical security strategy and process playbook |c John Kingsley-Hefty |
264 | 1 | |a Oxford |b Elsevier |c 2013 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a The Physical Security Strategy and Process Playbook is a concise yet comprehensive treatment of physical security management in the business context. It can be used as an educational tool, help a security manager define security requirements, and serve as a reference for future planning. This book is organized into six component parts around the central theme that physical security is part of sound business management. These components include an introduction to and explanation of basic physical security concepts; a description of the probable security risks for more than 40 functional areas in business; security performance guidelines along with a variety of supporting mitigation strategies; performance specifications for each of the recommended mitigation strategies; guidance on selecting, implementing, and evaluating a security system; and lists of available physical security resources. The Physical Security Strategy and Process Playbook is an essential resource for anyone who makes security-related decisions within an organization, and can be used as an instructional guide for corporate training or in the classroom. Chapters are categorized by issues and cover the fundamental concepts of physical security up to high-level program procedures Emphasizes performance guidelines (rather than standards) that describe the basic levels of performance to be achieved. Discusses the typical security risks that occur in more than 40 functional areas of an organization, along with security performance guidelines and specifications for each. Covers the selection, implementation, and evaluation of a robust security system | ||
500 | |a Includes bibliographical references | ||
650 | 7 | |a Management |2 fast | |
650 | 7 | |a Office buildings / Security measures |2 fast | |
650 | 7 | |a Security systems |2 fast | |
650 | 4 | |a Security systems | |
650 | 4 | |a Management | |
650 | 4 | |a Office buildings |x Security measures | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124172272 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028639097 |
Datensatz im Suchindex
_version_ | 1804175720608432128 |
---|---|
any_adam_object | |
author | Kingsley-Hefty, John |
author_facet | Kingsley-Hefty, John |
author_role | aut |
author_sort | Kingsley-Hefty, John |
author_variant | j k h jkh |
building | Verbundindex |
bvnumber | BV043216073 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)859388621 (DE-599)BVBBV043216073 |
dewey-full | 658.4/7 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/7 |
dewey-search | 658.4/7 |
dewey-sort | 3658.4 17 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03065nmm a2200433zc 4500</leader><controlfield tag="001">BV043216073</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151216s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299926991</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-299-92699-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299926998</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-299-92699-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124172272</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-417227-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">012417227X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-417227-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)859388621</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043216073</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/7</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kingsley-Hefty, John</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Physical security strategy and process playbook</subfield><subfield code="c">John Kingsley-Hefty</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">Elsevier</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The Physical Security Strategy and Process Playbook is a concise yet comprehensive treatment of physical security management in the business context. It can be used as an educational tool, help a security manager define security requirements, and serve as a reference for future planning. This book is organized into six component parts around the central theme that physical security is part of sound business management. These components include an introduction to and explanation of basic physical security concepts; a description of the probable security risks for more than 40 functional areas in business; security performance guidelines along with a variety of supporting mitigation strategies; performance specifications for each of the recommended mitigation strategies; guidance on selecting, implementing, and evaluating a security system; and lists of available physical security resources. The Physical Security Strategy and Process Playbook is an essential resource for anyone who makes security-related decisions within an organization, and can be used as an instructional guide for corporate training or in the classroom. Chapters are categorized by issues and cover the fundamental concepts of physical security up to high-level program procedures Emphasizes performance guidelines (rather than standards) that describe the basic levels of performance to be achieved. Discusses the typical security risks that occur in more than 40 functional areas of an organization, along with security performance guidelines and specifications for each. Covers the selection, implementation, and evaluation of a robust security system</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Office buildings / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Security systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Office buildings</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124172272</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028639097</subfield></datafield></record></collection> |
id | DE-604.BV043216073 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:46Z |
institution | BVB |
isbn | 1299926991 9781299926998 9780124172272 012417227X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028639097 |
oclc_num | 859388621 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource |
psigel | ZDB-33-ESD ZDB-33-EBS FLA_PDA_ESD |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Elsevier |
record_format | marc |
spelling | Kingsley-Hefty, John Verfasser aut Physical security strategy and process playbook John Kingsley-Hefty Oxford Elsevier 2013 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier The Physical Security Strategy and Process Playbook is a concise yet comprehensive treatment of physical security management in the business context. It can be used as an educational tool, help a security manager define security requirements, and serve as a reference for future planning. This book is organized into six component parts around the central theme that physical security is part of sound business management. These components include an introduction to and explanation of basic physical security concepts; a description of the probable security risks for more than 40 functional areas in business; security performance guidelines along with a variety of supporting mitigation strategies; performance specifications for each of the recommended mitigation strategies; guidance on selecting, implementing, and evaluating a security system; and lists of available physical security resources. The Physical Security Strategy and Process Playbook is an essential resource for anyone who makes security-related decisions within an organization, and can be used as an instructional guide for corporate training or in the classroom. Chapters are categorized by issues and cover the fundamental concepts of physical security up to high-level program procedures Emphasizes performance guidelines (rather than standards) that describe the basic levels of performance to be achieved. Discusses the typical security risks that occur in more than 40 functional areas of an organization, along with security performance guidelines and specifications for each. Covers the selection, implementation, and evaluation of a robust security system Includes bibliographical references Management fast Office buildings / Security measures fast Security systems fast Security systems Management Office buildings Security measures http://www.sciencedirect.com/science/book/9780124172272 Verlag Volltext |
spellingShingle | Kingsley-Hefty, John Physical security strategy and process playbook Management fast Office buildings / Security measures fast Security systems fast Security systems Management Office buildings Security measures |
title | Physical security strategy and process playbook |
title_auth | Physical security strategy and process playbook |
title_exact_search | Physical security strategy and process playbook |
title_full | Physical security strategy and process playbook John Kingsley-Hefty |
title_fullStr | Physical security strategy and process playbook John Kingsley-Hefty |
title_full_unstemmed | Physical security strategy and process playbook John Kingsley-Hefty |
title_short | Physical security strategy and process playbook |
title_sort | physical security strategy and process playbook |
topic | Management fast Office buildings / Security measures fast Security systems fast Security systems Management Office buildings Security measures |
topic_facet | Management Office buildings / Security measures Security systems Office buildings Security measures |
url | http://www.sciencedirect.com/science/book/9780124172272 |
work_keys_str_mv | AT kingsleyheftyjohn physicalsecuritystrategyandprocessplaybook |