Narrow your search
Listing 1 - 10 of 205 << page
of 21
>>
Sort by

Multi
Discovering the total cost of security to the enterprise : proven practices
Author:
ISBN: 132209764X 9781322097640 9780128009215 0128009217 9780128020807 0128020806 Year: 2015 Publisher: Oxfordshire, [England] ; Waltham, Massachusetts : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Discovering the Total Cost of Security to the Enterprise is a video presentation. Length: 29 minutes. In Discovering the Total Cost of Security to the Enterprise, presenter Richard Lefler discusses what security actually costs an organization in terms of operating, variable, and mandatory costs. Each of the three types of security costs are defined and expanded upon in this presentation. Lefler also explains how certain industry sectors have increasing variable and operating costs, along with the reasons behind these trends. The presentation also covers mandatory spend versus discretionary


Book
Донбас у системі інформаційної безпеки держави : регіональні особливості, зовнішні виклики, інструменти боротьби з антиукраїнською пропа?
Author:
Year: 2015 Publisher: Ukraine : Інститут політичних і етнонаціональних досліджень ім. І. Ф. Кураса НАН України,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The analytical report was prepared by the results of the research work "Donbass in the information security system of the state: regional distinctions, external challenges, tools of struggle against anti-Ukrainian propaganda", which was performed at the I.F. Kuras Institute of Political and Ethnic Studies of the National Academy of Sciences of Ukraine in 2015. As a result of a project completion, the regional distinctions of Donbass, external challenges, tools of struggle against anti-Ukrainian propaganda in the information security system of the state were examined.


Book
Biometric security
Authors: --- --- ---
ISBN: 144387499X 9781443874991 1322889546 9781322889542 1443871834 9781443871839 9781443871839 Year: 2015 Publisher: Newcastle upon Tyne, England : Cambridge Scholars Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Modern biometrics delivers an enhanced level of security by means of a ""proof of property"". The design and deployment of a biometric system, however, hide many pitfalls, which, when underestimated, can lead to major security weaknesses and privacy threats. Issues of concern include biometric identity theft and privacy invasion because of the strong connection between a user and his identity. This book showcases a collection of comprehensive references on the advances of biometric security technology. It compiles a total of fourteen articles, all contributed by thirty-two eminent researchers


Book
Industrial security : managing security in the 21st century
Authors: ---
ISBN: 1119028426 1119028434 111902840X 9781119028420 9781119028437 9781119028406 Year: 2015 Publisher: Hoboken, New Jersey : Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--


Book
Becoming a global chief security executive officer
Author:
ISBN: 0128027819 0128027827 9780128027813 9780128027820 Year: 2015 Publisher: Amsterdam

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Industrial security : managing security in the 21st century
Authors: ---
ISBN: 9781118194638 9781119028406 Year: 2015 Publisher: Hoboken, N.J. Wiley

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--


Book
Building security rating system : checklists to assess risks, consequences, and security countermeasures
Authors: --- ---
ISBN: 1680157418 0784478384 Year: 2015 Publisher: Reston, Virginia : American Society of Civil Engineers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Prepared by the Building Rating Security Committee (BRSC) of the Architectural Engineering Institute of ASCE. This Manual of Practice presents a building security rating system (BSRS) that can be used to improve the security of buildings and occupants subjected to violent attack. The BSRS offers a comprehensive method to account for threats and hazards, consequences and impacts, and vulnerability and mitigation as related to building security. In doing so, it provides a quantifiable measure of building security status. Multidisciplinary in scope, the BSRS uses a rigorous risk-based system that first identifies physical and operational criteria that enhance building security and then evaluates the extent to which a building meets these criteria. The BSRS has three elements: building classification, security countermeasures, and a rating system. MOP 128 presents the risk-based tools for classifying a building by its hazards and consequences, as well as identifying vulnerabilities to be addressed with security countermeasures. The rating system designates a building's security level in five categories: rated, bronze, silver, gold, and platinum. Appendixes present extensive commentary on the factors for building classification and security countermeasures for each level of the rating system. Ten years in development, the BSRS is now publicly available for the first time. Architects, designers, structural engineers, planners, building owners, security professionals, and government officials will rely on MOP 128 as the essential reference for implementing improved, cost-effective building security.


Book
The science and technology of counterterrorism : measuring physical and electronic security risk
Author:
ISBN: 0124200613 0124200567 9780124200616 9780124200562 Year: 2015 Publisher: Waltham, [Massachusetts] ; : Kidlington, Oxford,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiologic


Book
Designing and building a security operations center
Authors: ---
ISBN: 0128010967 0128008997 1322292876 9780128010969 9780128008997 9780128008997 Year: 2015 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers' information. Designing and Building a Security Operations Center will show you how to develop t


Book
Infosec management fundamentals
Author:
ISBN: 0128041870 0128041722 9780128041871 9780128041727 9780128041727 Year: 2015 Publisher: Waltham, MA

Loading...
Export citation

Choose an application

Bookmark

Abstract

Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the fundamental concepts of Information Security and how it impacts their business decisions and daily activities. Teaches ISO/IEC 27000 best practices on information security management Discusses risks and controls within the context of an overall information security management system (ISMS) Provides foundational information for experienced professionals as well as those new to the industry.

Listing 1 - 10 of 205 << page
of 21
>>
Sort by