Atjaunināt sīkdatņu piekrišanu

PSI Handbook of Business Security [ 2 volumes] [Hardback]

  • Formāts: Hardback, 760 pages, 2 hardbacks
  • Sērija : Praeger Security International
  • Izdošanas datums: 30-Dec-2007
  • Izdevniecība: Praeger Publishers Inc
  • ISBN-10: 0275993949
  • ISBN-13: 9780275993948
Citas grāmatas par šo tēmu:
  • Formāts: Hardback, 760 pages, 2 hardbacks
  • Sērija : Praeger Security International
  • Izdošanas datums: 30-Dec-2007
  • Izdevniecība: Praeger Publishers Inc
  • ISBN-10: 0275993949
  • ISBN-13: 9780275993948
Citas grāmatas par šo tēmu:
In the most comprehensive, practical handbook on business security to date, security and subject-matter experts show how organizations can prevent or manage crises, protect employees overseas, control privacy issues, deal with natural disasters, keep electronic communication safe from prying eyes or malice, avoid workplace violence and acts of terror, assess risk, train employees in security issues, and manage dozens of other things prudent managers need to know to protect their organizations from the unthinkable. Two volumes cover everything necessary to keep people, infrastructure, and systems safer: Volume 1: Securing the Enterprise Volume 2: Securing People and Processes Covering all dimensions of security in the twenty-first century, the PSI Handbook of Business Security offers case examples, practical checklists/templates, sidebars, a glossary, resources, and primary documentsall designed to keep both employees and infrastructure safe when trouble strikes. And strike it will, making this essential reading for security experts, senior executives, line and HR managers, and anyone else with a corporate responsibility for infrastructure, processes, or other people.

Recenzijas

"The chapters are written in a clear, authoritative, straightforward style. This reference provides useful information for researchers, students, and laypersons. It is recommended for public, community college, corporate, and academic libraries." - ARBA

Papildus informācija

Security management and prevention experts show how businesses can keep their infrastructure and people safe from threats ranging from natural disasters to outright terrorism.
Preface ix
Information (Cyber) Protection
Information Security
1(5)
Security Models
6(7)
Security Documentation
13(7)
Developing, Publishing, and Maintaining Information Security Policies and Standards
20(12)
Internet and E-mail Use Policies
32(6)
Portable Device Security
38(2)
Insider Threat
40(2)
Suspicious Cyber Activities
42(1)
Social Engineering: Exploiting the Weakest Link
43(8)
Data Backup
51(3)
US-CERT (United States Computer Emergency Readiness Team)
54(5)
Terrorism as a Business Security and Safety Concern
Terrorism
59(3)
Ecoterrorism
62(3)
Agroterrorism
65(8)
Strategic Partnership Program Agroterrorism (SPPA)
73(2)
Food Security
75(2)
Terrorism and Chemical Facilities
77(4)
Customs-Trade Partnership Against Terrorism (C-TPAT)
81(4)
General Safety Concerns
Benefits of Emergency Management
85(5)
Emergency Preparedness and Response Component
90(8)
Community Emergency Response Team
98(1)
Emergency Response Training and Testing: Filling the Gap
99(5)
Disaster Recovery Management
104(16)
Business Continuity
120(12)
Risk Management
132(4)
Risk Communication
136(5)
Vulnerability Assessment Team
141(9)
Types of Risk
150(2)
Crisis Management
152(12)
Types of Crises
164(16)
Crisis Communications: External and Internal
180(7)
Crisis Sensing Mechanism
187(7)
Crisis Management Plan
194(6)
Crisis Management Team
200(3)
Crisis Spokesperson
203(6)
Uncommon Business Security Concerns
Corruption as a Business Security Concern
209(8)
Competitive Intelligence
217(6)
Ethics as a Business Security Concern
223(4)
Ethical Conduct Audit
227(15)
Employee Theft and Fraud
242(2)
Reputation Management
244(7)
Physical Protection
Physical Security
251(4)
Security Guards/Officers
255(2)
Workplace Violence Prevention and Policies
257(15)
Workplace Aggression
272(6)
Contributors to Workplace Aggression
278(2)
Employee Background Screening and Drug Testing
280(8)
Video Surveillance
288(2)
Countersurveillance
290(2)
Radio Frequency Identity
292(2)
Biometrics
294(2)
Shelter-in-Place
296(2)
Evacuation in Large and Multiple Tenant Buildings
298(2)
Integrating Physical and Information Security
300(3)
Security on a Global Scale
Pandemics
303(9)
Pandemic Communication
312(9)
Outsourcing and Security
321(2)
Supply Chain Security
323(4)
Supply Chain Continuity
327(8)
Travel Overseas
335(3)
Corporate or Industrial Espionage
338(5)
Enhancing the Human Side of Security and Safety
Improving Team Effectiveness
343(3)
Avoiding the Silo Effect to Improve Business Security
346(7)
Winning Acceptance for Security or Other New Programs
353(3)
Managing Organizational Culture and Change Acceptance
356(3)
Culture of Integrity
359(2)
Exercise and Training Basics
361(16)
Guidance Appendix 377(28)
Resource Appendix 405(20)
Document Appendix 425(272)
Glossary 697(16)
Index 713(16)
About the Editor and Contributors 729


W. Timothy Coombs is an Associate Professor in Communication Studies at Eastern Illinois University. The author of two textbooks and dozens of articles, he consults on issues of crisis management, communication, and PR for clients in the petrochemical, construction/engineering, and healthcare industries. His most recent book is Code Red in the Boardroom (Praeger, 2006).