Atjaunināt sīkdatņu piekrišanu

E-grāmata: Security Risk Handbook: Assess, Survey, Audit

  • Formāts: 538 pages
  • Izdošanas datums: 23-Jan-2023
  • Izdevniecība: Routledge
  • Valoda: eng
  • ISBN-13: 9781000785586
  • Formāts - EPUB+DRM
  • Cena: 57,60 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 538 pages
  • Izdošanas datums: 23-Jan-2023
  • Izdevniecība: Routledge
  • Valoda: eng
  • ISBN-13: 9781000785586

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The Security Risk Handbook assists businesses that need to be able to carry out effective security risk assessments, security surveys, and security audits. It provides guidelines and standardised detailed processes and procedures for carrying out all three stages of the security journey: assess, survey, and audit.

Packed with tools and templates, the book is extremely practical. At the end of each explanatory chapter, a unique case study can be examined by the reader in the areas of risk assessment, security survey, and security audit. This book also highlights the commercial and reputational benefits of rigorous risk management procedures. It can be applied to corporate security, retail security, critical national infrastructure security, maritime security, aviation security, counter-terrorism, and executive and close protection.

This text is relevant to security professionals across all key sectors: corporate security, retail security, critical national infrastructure security, maritime security, aviation security, counter-terrorism, and executive and close protection. It will also be useful to health and safety managers, operations managers, facilities managers, and logistics professionals whose remit is to ensure security across an organisation or function.



The Security Risk Handbook provides clear and comprehensive guidelines and standardised detailed processes and procedures for carrying out all three stages of the security journey: assess, survey, audit. Packed with tools and templates, the book is supremely practical.

 

Opening statement x
Book aims xii
List of figures
xvi
List of tables
xviii
International Security Standards and Regulations xx
Glossary xxiii
Acknowledgements xxix
Foreword xxxi
Introduction 1(2)
What this book is all about
1(2)
Chapter 1 Risk and the Security Risk Assessment
3(1)
Chapter 2 The Security Survey
4(1)
Chapter 3 The Security Audit
4(438)
Conclusion
5(1)
The security review (for lack of a better term)
5(1)
Identification: What's in a title?
6(3)
1 Risk and the Security Risk Assessment
9(167)
The Risk Journey
10(1)
Risk
10(2)
Risk perception
12(2)
Risk component parts
14(23)
The Security Risk Assessment process
37(18)
Risk communication
55(7)
Security Risk Assessment of unique sectors
62(1)
Corporate security
62(14)
Publicly accessible locations (PAL)
76(13)
Retail security
89(10)
Critical national infrastructure security
99(8)
Maritime security
107(14)
Aviation security
121(19)
Hostile environment security
140(10)
Close protection
150(12)
Counter-terrorism
162(9)
Bibliography
171(5)
2 The Security Survey
176(266)
Defence in Depth (DiD)
177(1)
The customer
178(1)
Understanding customer needs
178(2)
The six steps
180(16)
Physical penetration test
196(8)
Integrated security and perimeter security
204(5)
Internal
209(12)
Manned guarding
221(2)
IDS
223(4)
Lighting
227(2)
Closed-circuit television (CCTV), often referred to today as video surveillance
229(11)
The Security Survey report
240(3)
Security Survey - unique sectors
243(25)
Publicly accessible locations (PAL)
268(24)
Retail security
292(16)
Critical national infrastructure
308(18)
Maritime security
326(27)
Aviation security
353(27)
Hostile environment security
380(27)
Close protection
407(28)
Bibliography
435(7)
3 The Security Audit
442(16)
The Security Audit
443(1)
Security
443(2)
The Security Auditor
445(1)
The Security Audit process
445(2)
The Security Audit report
447(1)
Unique sectors
447(1)
Corporate security
447(1)
Publicly accessible locations
448(2)
Retail security
450(2)
Critical national infrastructure security
452(1)
Maritime security
453(1)
Aviation security
454(1)
Hostile environment security
455(1)
Close protection
456(1)
Bibliography
457(1)
Conclusion 458(3)
Annexe A Security Risk Assessment Template 461(9)
Annexe B Security Survey Template 470(18)
Annexe C Security Audit Template 488(3)
Index 491
Charles Swanson is a professional security and risk management specialist and lecturer. He is a Chartered Security Professional, Fellow of the Security Institute, and currently the Senior Tutor on the MSc programme in Security and Risk Management with Linx International and the University of West London. He has lectured in risk management, counterterrorism, and information security (cyber) to a global audience. His first book published by Routledge was titled Professional Security Management: A Strategic Guide.