Narrow your search
Listing 1 - 5 of 5
Sort by

Book
Personnel Protection : Executive Compensation and Fringe Benefits:Proven Practices
Authors: ---
ISBN: 0124172407 012417230X 1299821316 9781299821316 9780124172302 Year: 2014 Publisher: : Elsevier Science,

Loading...
Export citation

Choose an application

Bookmark

Abstract

According to IRS code, any property or service that an executive receives in lieu of or in addition to regular taxable wages is a fringe benefit that may be subject to taxation. There are exceptions to this rule, however, which may include security services provided. In Personnel Protection: Executive Compensation and Fringe Benefits, the factors necessary to exclude security-related expenses from the executive's taxable gross income are defined, and the benefits to both the executive and the company are discussed. This eight-minute video presentation of narrated slides is one of 11


Book
Security for business professionals : how to plan, implement, and manage your company's security program
Author:
ISBN: 0128006218 0128005653 1322053855 9780128006214 9780128005651 Year: 2014 Publisher: Waltham, Massachusetts ; Oxford, England : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an existing security program. The book provides an overview of the key security objectives and challenges that managers face, such as how to measure the effectiveness of a security program and balance the costs and benefits. It also shows how to develop security procedures that conform to key regulatory requirements, and how to asse


Book
Smart security : practices that increase business profits, proven practices
Author:
ISBN: 1322069069 0128009276 0128015152 9780128009277 Year: 2014 Publisher: Waltham, Massachusetts ; Oxford, England : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Smart Security: Practices that Increase Business Profits is a video presentation. Length: 58 minutes. Smart Security: Practices that Increase Business Profits offers proven concepts and practices for those seeking new and creative ways to understand and shape security that are tailored to the needs of their business or organization. In this 58-minute Proven Practices presentation, presenter J. David Quilter discusses how a fully integrated security program increases business profits while delivering smart security practices at the same time. The term ""smart security"" means to be simple,

Mergers and acquisitions security : corporate restructuring and security management
Authors: ---
ISBN: 0750678054 9786610964406 1280964405 0080470653 9780750678056 9780080470658 9781280964404 6610964408 Year: 2005 Publisher: Amsterdam ; London : Elsevier/Butterworth-Heinemann,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly reshape themselves continually exploring new markets and developing new products. When they can't expand into new markets or develop new products on their own, they seek alternatives. These alternatives include merging with or acquiring other companies to create a single more capable company. Companies acquire other companies for a wide variety of reasons. In some cases company survival may actually be the reason. W


Book
IT Security Management : IT Securiteers - Setting up an IT Security Function
Authors: ---
ISBN: 9048188814 9786613002648 1283002647 9048188822 Year: 2010 Publisher: Dordrecht : Springer Netherlands : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies’ executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them “securiteers”. They will add value to the business, improving the information security stance of organisations.

Keywords

Computer security -- Management. --- Corporations -- Security measures -- Management. --- Industries -- Security measures -- Management. --- Security systems. --- Computer security --- Business enterprises --- Engineering & Applied Sciences --- Commerce --- Business & Economics --- Marketing & Sales --- Computer Science --- Management --- Computer networks --- Security measures --- Management. --- Security measures. --- Computer Communication Networks. --- Information theory. --- Computer science. --- Data protection. --- Telecommunication. --- Information Systems. --- Theory of Computation. --- Computer Science, general. --- Systems and Data Security. --- Communications Engineering, Networks. --- Management of Computing and Information Systems. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Informatics --- Science --- Communication theory --- Cybernetics --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Computer communication systems. --- Computers. --- Electrical engineering. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Electric engineering --- Engineering --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Communication systems --- Distributed processing

Listing 1 - 5 of 5
Sort by