Security convergence :: managing enterprise security risk /
Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of imple...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London :
Butterworth-Heinemann,
©2007.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how organizations and corporations will protect their assets. * A high-level, manager's overview of the movement in corporations to combine the physical and IT Security functions * Details the challenges and benefits of convergence with an assessment of the future outlook for this growing industry trend * Contains case examples that detail how convergence can be implemented to save money and improve efficiencies. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (xv, 215 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780080546261 0080546269 9780750684255 0750684259 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn173273521 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 070925s2007 enka ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d AU@ |d OCLCQ |d EBLCP |d OCLCQ |d OCLCF |d OCLCO |d OCLCQ |d NLGGC |d DEBSZ |d OCLCQ |d COCUF |d AGLDB |d ZCU |d MERUC |d U3W |d OCLCQ |d VTS |d ICG |d INT |d OCLCQ |d STF |d DKC |d OCLCQ |d M8D |d OL$ |d OCLCQ |d AJS |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 271382555 | ||
020 | |a 9780080546261 |q (electronic bk.) | ||
020 | |a 0080546269 |q (electronic bk.) | ||
020 | |a 9780750684255 |q (print) | ||
020 | |a 0750684259 |q (print) | ||
035 | |a (OCoLC)173273521 |z (OCoLC)271382555 | ||
050 | 4 | |a HD61.5 |b .T97 2007eb | |
072 | 7 | |a BUS |x 097000 |2 bisacsh | |
072 | 7 | |a BUS |x 104000 |2 bisacsh | |
072 | 7 | |a BUS |x 071000 |2 bisacsh | |
072 | 7 | |a BUS |x 103000 |2 bisacsh | |
072 | 7 | |a TK |2 lcco | |
072 | 7 | |a QA |2 lcco | |
082 | 7 | |a 658.47 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Tyson, Dave. | |
245 | 1 | 0 | |a Security convergence : |b managing enterprise security risk / |c Dave Tyson. |
260 | |a London : |b Butterworth-Heinemann, |c ©2007. | ||
300 | |a 1 online resource (xv, 215 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Introduction; What Is Security Convergence?; Trends, Reality and Benefits; Cultural Differences; The Changing Security Environment; The Changing Business Model; The Ever-Advancing Micro Chip; Leveraging Technology; Disruptive Technology and Other Bumps in the Road; How Things Stay the Same; Cyber Crime: a Pervasive Threat; How Risk Groups and Other Functions Can Work Together; How to Implement Change; The Process Approach; Organizational Size Approach; Methodological Approach; Potential Benefits; Security Convergence as a Strategic Differentiator; Resistance; Human Resources; Integrated Threat and Event Reporting; Change Management; Lessons Learned about Convergence; The Business Case for Convergence; A Model for Moving Forward. | |
520 | |a Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how organizations and corporations will protect their assets. * A high-level, manager's overview of the movement in corporations to combine the physical and IT Security functions * Details the challenges and benefits of convergence with an assessment of the future outlook for this growing industry trend * Contains case examples that detail how convergence can be implemented to save money and improve efficiencies. | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh95010367 | |
650 | 0 | |a Security systems. |0 http://id.loc.gov/authorities/subjects/sh85119483 | |
650 | 6 | |a Systèmes de sécurité. | |
650 | 7 | |a security systems. |2 aat | |
650 | 7 | |a BUSINESS & ECONOMICS |x Workplace Culture. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Corporate Governance. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Leadership. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Development. |2 bisacsh | |
650 | 7 | |a Business enterprises |x Computer networks |x Security measures |2 fast | |
650 | 7 | |a Security systems |2 fast | |
758 | |i has work: |a Security convergence (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYX3b8KjVXg9fQHDKXGTYd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Tyson, Dave. |t Security convergence. |d London : Butterworth-Heinemann, ©2007 |z 9780750684255 |z 0750684259 |w (OCoLC)170030691 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=199204 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL299507 | ||
938 | |a EBSCOhost |b EBSC |n 199204 | ||
938 | |a YBP Library Services |b YANK |n 2614761 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn173273521 |
---|---|
_version_ | 1816881653510832128 |
adam_text | |
any_adam_object | |
author | Tyson, Dave |
author_facet | Tyson, Dave |
author_role | |
author_sort | Tyson, Dave |
author_variant | d t dt |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD61 |
callnumber-raw | HD61.5 .T97 2007eb |
callnumber-search | HD61.5 .T97 2007eb |
callnumber-sort | HD 261.5 T97 42007EB |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-4-EBA |
contents | Introduction; What Is Security Convergence?; Trends, Reality and Benefits; Cultural Differences; The Changing Security Environment; The Changing Business Model; The Ever-Advancing Micro Chip; Leveraging Technology; Disruptive Technology and Other Bumps in the Road; How Things Stay the Same; Cyber Crime: a Pervasive Threat; How Risk Groups and Other Functions Can Work Together; How to Implement Change; The Process Approach; Organizational Size Approach; Methodological Approach; Potential Benefits; Security Convergence as a Strategic Differentiator; Resistance; Human Resources; Integrated Threat and Event Reporting; Change Management; Lessons Learned about Convergence; The Business Case for Convergence; A Model for Moving Forward. |
ctrlnum | (OCoLC)173273521 |
dewey-full | 658.47 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.47 |
dewey-search | 658.47 |
dewey-sort | 3658.47 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04919cam a2200637 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn173273521</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">070925s2007 enka ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OL$</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">271382555</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080546261</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080546269</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780750684255</subfield><subfield code="q">(print)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0750684259</subfield><subfield code="q">(print)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)173273521</subfield><subfield code="z">(OCoLC)271382555</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD61.5</subfield><subfield code="b">.T97 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">097000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">104000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">071000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">103000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TK</subfield><subfield code="2">lcco</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">QA</subfield><subfield code="2">lcco</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.47</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tyson, Dave.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security convergence :</subfield><subfield code="b">managing enterprise security risk /</subfield><subfield code="c">Dave Tyson.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">London :</subfield><subfield code="b">Butterworth-Heinemann,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xv, 215 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction; What Is Security Convergence?; Trends, Reality and Benefits; Cultural Differences; The Changing Security Environment; The Changing Business Model; The Ever-Advancing Micro Chip; Leveraging Technology; Disruptive Technology and Other Bumps in the Road; How Things Stay the Same; Cyber Crime: a Pervasive Threat; How Risk Groups and Other Functions Can Work Together; How to Implement Change; The Process Approach; Organizational Size Approach; Methodological Approach; Potential Benefits; Security Convergence as a Strategic Differentiator; Resistance; Human Resources; Integrated Threat and Event Reporting; Change Management; Lessons Learned about Convergence; The Business Case for Convergence; A Model for Moving Forward.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how organizations and corporations will protect their assets. * A high-level, manager's overview of the movement in corporations to combine the physical and IT Security functions * Details the challenges and benefits of convergence with an assessment of the future outlook for this growing industry trend * Contains case examples that detail how convergence can be implemented to save money and improve efficiencies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95010367</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Security systems.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85119483</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes de sécurité.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">security systems.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Workplace Culture.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Corporate Governance.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Leadership.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Organizational Development.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Security systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Security convergence (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYX3b8KjVXg9fQHDKXGTYd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Tyson, Dave.</subfield><subfield code="t">Security convergence.</subfield><subfield code="d">London : Butterworth-Heinemann, ©2007</subfield><subfield code="z">9780750684255</subfield><subfield code="z">0750684259</subfield><subfield code="w">(OCoLC)170030691</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=199204</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL299507</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">199204</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2614761</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn173273521 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:08Z |
institution | BVB |
isbn | 9780080546261 0080546269 9780750684255 0750684259 |
language | English |
oclc_num | 173273521 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xv, 215 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Butterworth-Heinemann, |
record_format | marc |
spelling | Tyson, Dave. Security convergence : managing enterprise security risk / Dave Tyson. London : Butterworth-Heinemann, ©2007. 1 online resource (xv, 215 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes index. Print version record. Includes bibliographical references and index. Introduction; What Is Security Convergence?; Trends, Reality and Benefits; Cultural Differences; The Changing Security Environment; The Changing Business Model; The Ever-Advancing Micro Chip; Leveraging Technology; Disruptive Technology and Other Bumps in the Road; How Things Stay the Same; Cyber Crime: a Pervasive Threat; How Risk Groups and Other Functions Can Work Together; How to Implement Change; The Process Approach; Organizational Size Approach; Methodological Approach; Potential Benefits; Security Convergence as a Strategic Differentiator; Resistance; Human Resources; Integrated Threat and Event Reporting; Change Management; Lessons Learned about Convergence; The Business Case for Convergence; A Model for Moving Forward. Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how organizations and corporations will protect their assets. * A high-level, manager's overview of the movement in corporations to combine the physical and IT Security functions * Details the challenges and benefits of convergence with an assessment of the future outlook for this growing industry trend * Contains case examples that detail how convergence can be implemented to save money and improve efficiencies. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Security systems. http://id.loc.gov/authorities/subjects/sh85119483 Systèmes de sécurité. security systems. aat BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Business enterprises Computer networks Security measures fast Security systems fast has work: Security convergence (Text) https://id.oclc.org/worldcat/entity/E39PCYX3b8KjVXg9fQHDKXGTYd https://id.oclc.org/worldcat/ontology/hasWork Print version: Tyson, Dave. Security convergence. London : Butterworth-Heinemann, ©2007 9780750684255 0750684259 (OCoLC)170030691 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=199204 Volltext |
spellingShingle | Tyson, Dave Security convergence : managing enterprise security risk / Introduction; What Is Security Convergence?; Trends, Reality and Benefits; Cultural Differences; The Changing Security Environment; The Changing Business Model; The Ever-Advancing Micro Chip; Leveraging Technology; Disruptive Technology and Other Bumps in the Road; How Things Stay the Same; Cyber Crime: a Pervasive Threat; How Risk Groups and Other Functions Can Work Together; How to Implement Change; The Process Approach; Organizational Size Approach; Methodological Approach; Potential Benefits; Security Convergence as a Strategic Differentiator; Resistance; Human Resources; Integrated Threat and Event Reporting; Change Management; Lessons Learned about Convergence; The Business Case for Convergence; A Model for Moving Forward. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Security systems. http://id.loc.gov/authorities/subjects/sh85119483 Systèmes de sécurité. security systems. aat BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Business enterprises Computer networks Security measures fast Security systems fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh95010367 http://id.loc.gov/authorities/subjects/sh85119483 |
title | Security convergence : managing enterprise security risk / |
title_auth | Security convergence : managing enterprise security risk / |
title_exact_search | Security convergence : managing enterprise security risk / |
title_full | Security convergence : managing enterprise security risk / Dave Tyson. |
title_fullStr | Security convergence : managing enterprise security risk / Dave Tyson. |
title_full_unstemmed | Security convergence : managing enterprise security risk / Dave Tyson. |
title_short | Security convergence : |
title_sort | security convergence managing enterprise security risk |
title_sub | managing enterprise security risk / |
topic | Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Security systems. http://id.loc.gov/authorities/subjects/sh85119483 Systèmes de sécurité. security systems. aat BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Business enterprises Computer networks Security measures fast Security systems fast |
topic_facet | Business enterprises Computer networks Security measures. Security systems. Systèmes de sécurité. security systems. BUSINESS & ECONOMICS Workplace Culture. BUSINESS & ECONOMICS Corporate Governance. BUSINESS & ECONOMICS Leadership. BUSINESS & ECONOMICS Organizational Development. Business enterprises Computer networks Security measures Security systems |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=199204 |
work_keys_str_mv | AT tysondave securityconvergencemanagingenterprisesecurityrisk |