Listing 1 - 5 of 5 |
Sort by
|
Choose an application
According to IRS code, any property or service that an executive receives in lieu of or in addition to regular taxable wages is a fringe benefit that may be subject to taxation. There are exceptions to this rule, however, which may include security services provided. In Personnel Protection: Executive Compensation and Fringe Benefits, the factors necessary to exclude security-related expenses from the executive's taxable gross income are defined, and the benefits to both the executive and the company are discussed. This eight-minute video presentation of narrated slides is one of 11
Choose an application
Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an existing security program. The book provides an overview of the key security objectives and challenges that managers face, such as how to measure the effectiveness of a security program and balance the costs and benefits. It also shows how to develop security procedures that conform to key regulatory requirements, and how to asse
Corporations -- Security measures. --- Industries -- Security measures. --- Success in business. --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Industries --- Security measures --- Management. --- Industrial production --- Industry --- Economics --- Industries, Primitive
Choose an application
Smart Security: Practices that Increase Business Profits is a video presentation. Length: 58 minutes. Smart Security: Practices that Increase Business Profits offers proven concepts and practices for those seeking new and creative ways to understand and shape security that are tailored to the needs of their business or organization. In this 58-minute Proven Practices presentation, presenter J. David Quilter discusses how a fully integrated security program increases business profits while delivering smart security practices at the same time. The term ""smart security"" means to be simple,
Computer security. --- Corporations -- Security measures -- Costs. --- Corporations -- Security measures -- Management. --- Private security services. --- Risk management. --- Security systems. --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Corporations --- Security measures --- Management. --- Security measures. --- Business corporations --- C corporations --- Corporations, Business --- Corporations, Public --- Limited companies --- Publicly held corporations --- Publicly traded corporations --- Public limited companies --- Stock corporations --- Subchapter C corporations --- Business enterprises --- Corporate power --- Disincorporation --- Stocks --- Trusts, Industrial
Choose an application
In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly reshape themselves continually exploring new markets and developing new products. When they can't expand into new markets or develop new products on their own, they seek alternatives. These alternatives include merging with or acquiring other companies to create a single more capable company. Companies acquire other companies for a wide variety of reasons. In some cases company survival may actually be the reason. W
Consolidation and merger of corporations. --- Consolidation and merger of corporations. Corporate divestiture. Confidential business information. Security consultants. Corporations--Security measures. --- Security consultants. --- Consolidation and merger of corporations --- Corporate divestiture --- Confidential business information --- Security consultants --- Corporations --- Industrial Management --- Management --- Business & Economics --- Security measures --- Management. --- Business corporations --- C corporations --- Corporations, Business --- Corporations, Public --- Limited companies --- Publicly held corporations --- Publicly traded corporations --- Public limited companies --- Stock corporations --- Subchapter C corporations --- Acquisition of corporations --- Acquisitions and mergers --- Amalgamation of corporations --- Business combinations --- Business mergers --- Buyouts, Corporate --- Corporate acquisitions --- Corporate buyouts --- Corporate mergers --- Corporate takeovers --- Fusion of corporations --- Hostile takeovers of corporations --- M & A (Mergers and acquisitions of corporations) --- Merger of corporations --- Mergers and acquisitions of corporations --- Mergers, Corporate --- Takeovers, Corporate --- Consolidation --- Mergers --- Business enterprises --- Corporate power --- Disincorporation --- Stocks --- Trusts, Industrial --- Corporate reorganizations --- Golden parachutes (Executive compensation) --- Industrial concentration
Choose an application
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies’ executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them “securiteers”. They will add value to the business, improving the information security stance of organisations.
Computer security -- Management. --- Corporations -- Security measures -- Management. --- Industries -- Security measures -- Management. --- Security systems. --- Computer security --- Business enterprises --- Engineering & Applied Sciences --- Commerce --- Business & Economics --- Marketing & Sales --- Computer Science --- Management --- Computer networks --- Security measures --- Management. --- Security measures. --- Computer Communication Networks. --- Information theory. --- Computer science. --- Data protection. --- Telecommunication. --- Information Systems. --- Theory of Computation. --- Computer Science, general. --- Systems and Data Security. --- Communications Engineering, Networks. --- Management of Computing and Information Systems. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Informatics --- Science --- Communication theory --- Cybernetics --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Computer communication systems. --- Computers. --- Electrical engineering. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Electric engineering --- Engineering --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Communication systems --- Distributed processing
Listing 1 - 5 of 5 |
Sort by
|