Listing 1 - 10 of 200 | << page >> |
Sort by
|
Choose an application
Discovering the Total Cost of Security to the Enterprise is a video presentation. Length: 29 minutes. In Discovering the Total Cost of Security to the Enterprise, presenter Richard Lefler discusses what security actually costs an organization in terms of operating, variable, and mandatory costs. Each of the three types of security costs are defined and expanded upon in this presentation. Lefler also explains how certain industry sectors have increasing variable and operating costs, along with the reasons behind these trends. The presentation also covers mandatory spend versus discretionary
Choose an application
Security systems --- Business enterprises --- Management. --- Security measures.
Choose an application
Annotation
Electronic security systems. --- Electronic locking devices.
Choose an application
The second edition of Security Operations Management continues as the seminal reference on corporate security management operations. Revised and updated, topics covered in depth include: access control, selling the security budget upgrades to senior management, the evolution of security standards since 9/11, designing buildings to be safer from terrorism, improving relations between the public and private sectors, enhancing security measures during acute emergencies, and, finally, the increased security issues surrounding the threats of terrorism and cybercrime. An ideal reference for
Private security services --- Security systems --- Management.
Choose an application
Electronic Security Systems is a book written to help the security professional understand the various electronic security functional components and the ways these components interconnect. Providing a holistic approach to solving security issues, this book discusses such topics as integrating electronic functions, developing a system, component philosophy, possible long-term issues, and the culture within a corporation. The book uses a corporate environment as its example; however, the basic issues can be applied to virtually any environment.For a security professional to be e
Electronic security systems. --- Office buildings --- Business enterprises --- Security measures.
Choose an application
From the anarchy of Somalia to the relative stability of Nepal, fragile and transitional situations represent a broad spectrum of contexts. However, they share some common features: these are risky environments – for the people who live there, for their governments, for neighbouring countries, and for those who seek to provide assistance. Positive outcomes are hard to achieve and the risk of regression in countries emerging from armed conflict is high. International engagement in these situations presents significant risks for donors and implementing partners, but also holds the potential for substantial rewards in terms of improved results and outcomes. Indeed, more often than not, the risks associated with not engaging in these contexts – both for the countries themselves and for the international community – outweigh most of the risks of engaging in the first place. The question therefore is not whether to engage but how to engage in ways that are context-specific and do not come at an unacceptable cost. This publication provides the evidence to help donors understand how to balance risks and opportunities in order to protect the integrity of their institutions while delivering better results to those who need it most.
Political systems --- Conditionality (International relations). --- Economic assistance. --- Economic development --- Economic policy. --- Violence --- Security systems. --- Prevention.
Choose an application
"Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--
International relations. Foreign policy --- Polemology --- anno 2000-2099 --- Industrial safety --- Risk management --- Security systems --- Terrorism --- Prevention --- Industries --- Security measures
Choose an application
Marketing --- Computer. Automation --- Law --- Security systems industry --- Industries --- Retail trade --- Security systems --- Systèmes de sécurité --- Industrie --- Commerce de détail --- Periodicals --- Security measures --- Etats-Unis --- Périodiques --- Sécurité --- Mesures --- Business, Economy and Management --- Information Technology --- Business Management --- Economics --- General and Others --- Trade and Commerce
Choose an application
Business management --- politie --- Police --- -Cops --- Gendarmes --- Law enforcement officers --- Officers, Law enforcement --- Officers, Police --- Police forces --- Police officers --- Police service --- Policemen --- Policing --- Criminal justice, Administration of --- Criminal justice personnel --- Peace officers --- Public safety --- Security systems --- Legal status, laws, etc. --- -Police
Choose an application
A critical look at the terrifying ways the police are used to control 'surplus' populations worldwide.
Social problems --- Criminology. Victimology --- Police. --- Cops --- Gendarmes --- Law enforcement officers --- Officers, Law enforcement --- Officers, Police --- Police forces --- Police --- Police officers --- Police service --- Policemen --- Criminal justice, Administration of --- Criminal justice personnel --- Peace officers --- Public safety --- Security systems --- Legal status, laws, etc.
Listing 1 - 10 of 200 | << page >> |
Sort by
|