Contemporary security management:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Butterworth-Heinemann
©2011
|
Ausgabe: | Third edition |
Schlagworte: | |
Online-Zugang: | DE-1046 Volltext |
Beschreibung: | Includes bibliographical references and index Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a r |
Beschreibung: | 1 Online-Ressource (xvii, 461 Seiten) Illustrationen |
ISBN: | 9780123819512 |
DOI: | 10.1016/C2009-0-63072-5 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV044387538 | ||
003 | DE-604 | ||
005 | 20250121 | ||
007 | cr|uuu---uuuuu | ||
008 | 170630s2011 xx a||| o|||| 00||| eng d | ||
020 | |a 9780123819512 |c Online |9 978-0-12-381951-2 | ||
024 | 7 | |a 10.1016/C2009-0-63072-5 |2 doi | |
035 | |a (ZDB-33-ESD)ocn689007674 | ||
035 | |a (OCoLC)689007674 | ||
035 | |a (DE-599)BVBBV044387538 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-83 | ||
082 | 0 | |a 658.4/7 |2 22 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Fay, John |e Verfasser |4 aut | |
245 | 1 | 0 | |a Contemporary security management |c John J. Fay |
250 | |a Third edition | ||
264 | 1 | |a Burlington, MA |b Butterworth-Heinemann |c ©2011 | |
300 | |a 1 Online-Ressource (xvii, 461 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a r | ||
650 | 4 | |a Industries | |
650 | 4 | |a Security measures | |
650 | 4 | |a Business | |
650 | 4 | |a Social Science | |
650 | 7 | |a BUSINESS & ECONOMICS / Workplace Culture |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Governance |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Leadership |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Development |2 bisacsh | |
650 | 7 | |a Industries / Security measures |2 fast | |
650 | 7 | |a Personnel management |2 fast | |
650 | 7 | |a Private security services |2 fast | |
650 | 4 | |a Führung | |
650 | 4 | |a Industrie | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Private security services | |
650 | 4 | |a Industries |x Security measures | |
650 | 4 | |a Personnel management | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-0-12-381549-1 |
856 | 4 | 0 | |u https://doi.org/10.1016/C2009-0-63072-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
912 | |a ZDB-33-EBS | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029789759 | |
966 | e | |u https://www.sciencedirect.com/book/9780123815491 |l DE-1046 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext | |
966 | e | |u https://www.sciencedirect.com/book/9780123815491 |l DE-1046 |p ZDB-33-ESD |q FAW_Textbooks_EBETEC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1821871128082120704 |
---|---|
adam_text | |
any_adam_object | |
author | Fay, John |
author_facet | Fay, John |
author_role | aut |
author_sort | Fay, John |
author_variant | j f jf |
building | Verbundindex |
bvnumber | BV044387538 |
classification_rvk | ST 277 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-ESD)ocn689007674 (OCoLC)689007674 (DE-599)BVBBV044387538 |
dewey-full | 658.4/7 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/7 |
dewey-search | 658.4/7 |
dewey-sort | 3658.4 17 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.1016/C2009-0-63072-5 |
edition | Third edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV044387538</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20250121</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170630s2011 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123819512</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-12-381951-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/C2009-0-63072-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn689007674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)689007674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044387538</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/7</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fay, John</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Contemporary security management</subfield><subfield code="c">John J. Fay</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Butterworth-Heinemann</subfield><subfield code="c">©2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 461 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a r</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industries</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social Science</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Workplace Culture</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Governance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Leadership</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Development</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Industries / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Personnel management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Private security services</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Führung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Private security services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industries</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Personnel management</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-0-12-381549-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/C2009-0-63072-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029789759</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.sciencedirect.com/book/9780123815491</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.sciencedirect.com/book/9780123815491</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_Textbooks_EBETEC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044387538 |
illustrated | Illustrated |
indexdate | 2025-01-21T15:01:42Z |
institution | BVB |
isbn | 9780123819512 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029789759 |
oclc_num | 689007674 |
open_access_boolean | |
owner | DE-1046 DE-83 |
owner_facet | DE-1046 DE-83 |
physical | 1 Online-Ressource (xvii, 461 Seiten) Illustrationen |
psigel | ZDB-33-ESD ZDB-33-EBS ZDB-33-ESD FAW_PDA_ESD ZDB-33-ESD FAW_Textbooks_EBETEC |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Butterworth-Heinemann |
record_format | marc |
spelling | Fay, John Verfasser aut Contemporary security management John J. Fay Third edition Burlington, MA Butterworth-Heinemann ©2011 1 Online-Ressource (xvii, 461 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a r Industries Security measures Business Social Science BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Industries / Security measures fast Personnel management fast Private security services fast Führung Industrie Wirtschaft Private security services Industries Security measures Personnel management Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Druck-Ausgabe 978-0-12-381549-1 https://doi.org/10.1016/C2009-0-63072-5 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Fay, John Contemporary security management Industries Security measures Business Social Science BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Industries / Security measures fast Personnel management fast Private security services fast Führung Industrie Wirtschaft Private security services Industries Security measures Personnel management Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Contemporary security management |
title_auth | Contemporary security management |
title_exact_search | Contemporary security management |
title_full | Contemporary security management John J. Fay |
title_fullStr | Contemporary security management John J. Fay |
title_full_unstemmed | Contemporary security management John J. Fay |
title_short | Contemporary security management |
title_sort | contemporary security management |
topic | Industries Security measures Business Social Science BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Industries / Security measures fast Personnel management fast Private security services fast Führung Industrie Wirtschaft Private security services Industries Security measures Personnel management Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Industries Security measures Business Social Science BUSINESS & ECONOMICS / Workplace Culture BUSINESS & ECONOMICS / Corporate Governance BUSINESS & ECONOMICS / Leadership BUSINESS & ECONOMICS / Organizational Development Industries / Security measures Personnel management Private security services Führung Industrie Wirtschaft Industries Security measures Computersicherheit |
url | https://doi.org/10.1016/C2009-0-63072-5 |
work_keys_str_mv | AT fayjohn contemporarysecuritymanagement |