Risk analysis and the security survey:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, Mass.
Butterworth-Heinemann
2012
|
Ausgabe: | 4th ed |
Schlagworte: | |
Beschreibung: | Includes index |
Beschreibung: | xx, 348 p. |
ISBN: | 9780123822338 9780123822345 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044160599 | ||
003 | DE-604 | ||
005 | 20170830 | ||
007 | cr|uuu---uuuuu | ||
008 | 170217s2012 |||| o||u| ||||||eng d | ||
020 | |a 9780123822338 |9 978-0-12-382233-8 | ||
020 | |a 9780123822345 |c Online |9 978-0-12-382234-5 | ||
035 | |a (ZDB-30-PAD)EBC829965 | ||
035 | |a (ZDB-89-EBL)EBL829965 | ||
035 | |a (OCoLC)769344345 | ||
035 | |a (DE-599)BVBBV044160599 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.4/7 |2 23 | |
100 | 1 | |a Broder, James F. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Risk analysis and the security survey |c James F. Broder, Eugene Tucker |
250 | |a 4th ed | ||
264 | 1 | |a Waltham, Mass. |b Butterworth-Heinemann |c 2012 | |
300 | |a xx, 348 p. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
505 | 0 | |a Machine generated contents note: Part I: The Treatment and Analysis of Risk Chapter 1: Risk Chapter 2: Vulnerability and Threat Identification Chapter 3: Risk Measurement Chapter 4: Quantifying and Prioritizing Loss Potential Chapter 5: Cost/Benefit Analysis Chapter 6: Other Risk Analysis Methodologies Chapter 7: The Security Survey: An Overview Chapter 8: Management Audit Techniques and the Preliminary Survey Chapter 9: The Survey Report Chapter 10: Crime Prediction Chapter 11: Determining Insurance Requirements Part II: Emergency Management and Business Continuity Planning Chapter 12: Emergency Management: A Brief Introduction Chapter 13: Emergency Response Planning Chapter 14: Business Continuity Planning Chapter 15: Business Impact Analysis Chapter 16: Plan Documentation Chapter 17: Crisis Management Chapter 18: Monitoring Safeguards Chapter 19: The Security Consultant | |
650 | 4 | |a Industrie | |
650 | 4 | |a Industries |x Security measures | |
650 | 4 | |a Risk management | |
650 | 4 | |a Crime prevention surveys | |
650 | 4 | |a Assistance in emergencies |x Planning | |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsmaßnahme |0 (DE-588)4181167-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikoanalyse |0 (DE-588)4137042-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | 2 | |a Risikoanalyse |0 (DE-588)4137042-9 |D s |
689 | 0 | 3 | |a Sicherheitsmaßnahme |0 (DE-588)4181167-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Tucker, Eugene |e Sonstige |4 oth | |
912 | |a ZDB-30-PAD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029567444 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804177271330701313 |
---|---|
any_adam_object | |
author | Broder, James F. |
author_facet | Broder, James F. |
author_role | aut |
author_sort | Broder, James F. |
author_variant | j f b jf jfb |
building | Verbundindex |
bvnumber | BV044160599 |
collection | ZDB-30-PAD |
contents | Machine generated contents note: Part I: The Treatment and Analysis of Risk Chapter 1: Risk Chapter 2: Vulnerability and Threat Identification Chapter 3: Risk Measurement Chapter 4: Quantifying and Prioritizing Loss Potential Chapter 5: Cost/Benefit Analysis Chapter 6: Other Risk Analysis Methodologies Chapter 7: The Security Survey: An Overview Chapter 8: Management Audit Techniques and the Preliminary Survey Chapter 9: The Survey Report Chapter 10: Crime Prediction Chapter 11: Determining Insurance Requirements Part II: Emergency Management and Business Continuity Planning Chapter 12: Emergency Management: A Brief Introduction Chapter 13: Emergency Response Planning Chapter 14: Business Continuity Planning Chapter 15: Business Impact Analysis Chapter 16: Plan Documentation Chapter 17: Crisis Management Chapter 18: Monitoring Safeguards Chapter 19: The Security Consultant |
ctrlnum | (ZDB-30-PAD)EBC829965 (ZDB-89-EBL)EBL829965 (OCoLC)769344345 (DE-599)BVBBV044160599 |
dewey-full | 658.4/7 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/7 |
dewey-search | 658.4/7 |
dewey-sort | 3658.4 17 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | 4th ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02700nmm a2200529zc 4500</leader><controlfield tag="001">BV044160599</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170830 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170217s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123822338</subfield><subfield code="9">978-0-12-382233-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123822345</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-12-382234-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC829965</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL829965</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)769344345</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044160599</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/7</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Broder, James F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Risk analysis and the security survey</subfield><subfield code="c">James F. Broder, Eugene Tucker</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4th ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Mass.</subfield><subfield code="b">Butterworth-Heinemann</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 348 p.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Machine generated contents note: Part I: The Treatment and Analysis of Risk Chapter 1: Risk Chapter 2: Vulnerability and Threat Identification Chapter 3: Risk Measurement Chapter 4: Quantifying and Prioritizing Loss Potential Chapter 5: Cost/Benefit Analysis Chapter 6: Other Risk Analysis Methodologies Chapter 7: The Security Survey: An Overview Chapter 8: Management Audit Techniques and the Preliminary Survey Chapter 9: The Survey Report Chapter 10: Crime Prediction Chapter 11: Determining Insurance Requirements Part II: Emergency Management and Business Continuity Planning Chapter 12: Emergency Management: A Brief Introduction Chapter 13: Emergency Response Planning Chapter 14: Business Continuity Planning Chapter 15: Business Impact Analysis Chapter 16: Plan Documentation Chapter 17: Crisis Management Chapter 18: Monitoring Safeguards Chapter 19: The Security Consultant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industries</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crime prevention surveys</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Assistance in emergencies</subfield><subfield code="x">Planning</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tucker, Eugene</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PAD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029567444</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV044160599 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:45:25Z |
institution | BVB |
isbn | 9780123822338 9780123822345 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029567444 |
oclc_num | 769344345 |
open_access_boolean | |
physical | xx, 348 p. |
psigel | ZDB-30-PAD |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Butterworth-Heinemann |
record_format | marc |
spelling | Broder, James F. Verfasser aut Risk analysis and the security survey James F. Broder, Eugene Tucker 4th ed Waltham, Mass. Butterworth-Heinemann 2012 xx, 348 p. txt rdacontent c rdamedia cr rdacarrier Includes index Machine generated contents note: Part I: The Treatment and Analysis of Risk Chapter 1: Risk Chapter 2: Vulnerability and Threat Identification Chapter 3: Risk Measurement Chapter 4: Quantifying and Prioritizing Loss Potential Chapter 5: Cost/Benefit Analysis Chapter 6: Other Risk Analysis Methodologies Chapter 7: The Security Survey: An Overview Chapter 8: Management Audit Techniques and the Preliminary Survey Chapter 9: The Survey Report Chapter 10: Crime Prediction Chapter 11: Determining Insurance Requirements Part II: Emergency Management and Business Continuity Planning Chapter 12: Emergency Management: A Brief Introduction Chapter 13: Emergency Response Planning Chapter 14: Business Continuity Planning Chapter 15: Business Impact Analysis Chapter 16: Plan Documentation Chapter 17: Crisis Management Chapter 18: Monitoring Safeguards Chapter 19: The Security Consultant Industrie Industries Security measures Risk management Crime prevention surveys Assistance in emergencies Planning Risikomanagement (DE-588)4121590-4 gnd rswk-swf Sicherheitsmaßnahme (DE-588)4181167-7 gnd rswk-swf Risikoanalyse (DE-588)4137042-9 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Unternehmen (DE-588)4061963-1 s Risikomanagement (DE-588)4121590-4 s Risikoanalyse (DE-588)4137042-9 s Sicherheitsmaßnahme (DE-588)4181167-7 s 1\p DE-604 Tucker, Eugene Sonstige oth 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Broder, James F. Risk analysis and the security survey Machine generated contents note: Part I: The Treatment and Analysis of Risk Chapter 1: Risk Chapter 2: Vulnerability and Threat Identification Chapter 3: Risk Measurement Chapter 4: Quantifying and Prioritizing Loss Potential Chapter 5: Cost/Benefit Analysis Chapter 6: Other Risk Analysis Methodologies Chapter 7: The Security Survey: An Overview Chapter 8: Management Audit Techniques and the Preliminary Survey Chapter 9: The Survey Report Chapter 10: Crime Prediction Chapter 11: Determining Insurance Requirements Part II: Emergency Management and Business Continuity Planning Chapter 12: Emergency Management: A Brief Introduction Chapter 13: Emergency Response Planning Chapter 14: Business Continuity Planning Chapter 15: Business Impact Analysis Chapter 16: Plan Documentation Chapter 17: Crisis Management Chapter 18: Monitoring Safeguards Chapter 19: The Security Consultant Industrie Industries Security measures Risk management Crime prevention surveys Assistance in emergencies Planning Risikomanagement (DE-588)4121590-4 gnd Sicherheitsmaßnahme (DE-588)4181167-7 gnd Risikoanalyse (DE-588)4137042-9 gnd Unternehmen (DE-588)4061963-1 gnd |
subject_GND | (DE-588)4121590-4 (DE-588)4181167-7 (DE-588)4137042-9 (DE-588)4061963-1 |
title | Risk analysis and the security survey |
title_auth | Risk analysis and the security survey |
title_exact_search | Risk analysis and the security survey |
title_full | Risk analysis and the security survey James F. Broder, Eugene Tucker |
title_fullStr | Risk analysis and the security survey James F. Broder, Eugene Tucker |
title_full_unstemmed | Risk analysis and the security survey James F. Broder, Eugene Tucker |
title_short | Risk analysis and the security survey |
title_sort | risk analysis and the security survey |
topic | Industrie Industries Security measures Risk management Crime prevention surveys Assistance in emergencies Planning Risikomanagement (DE-588)4121590-4 gnd Sicherheitsmaßnahme (DE-588)4181167-7 gnd Risikoanalyse (DE-588)4137042-9 gnd Unternehmen (DE-588)4061963-1 gnd |
topic_facet | Industrie Industries Security measures Risk management Crime prevention surveys Assistance in emergencies Planning Risikomanagement Sicherheitsmaßnahme Risikoanalyse Unternehmen |
work_keys_str_mv | AT broderjamesf riskanalysisandthesecuritysurvey AT tuckereugene riskanalysisandthesecuritysurvey |