Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 20 of 20 matches in All Departments
" The Corporate Security Professional's Handbook on Terrorism " is
a professional reference that clarifies the difference between
terrorism against corporations and their assets, versus terrorism
against government assets. It addresses the existing misconceptions
regarding how terrorism does or does not affect corporations, and
provides security professionals and business executives with a
better understanding of how terrorism may impact them.
Security metrics is the application of quantitative, statistical,
and/or mathematical analyses to measuring security functional
trends and workload. In other words, tracking what each function is
doing in terms of level of effort (LOE), costs, and productivity.
Security metrics management is the managing of an assets protection
program and related security functions through the use of metrics.
It can be used where managerial tasks must be supported for such
purposes as supporting the security professional's position on
budget matters, justifying the cost-effectiveness of decisions,
determining the impact of downsizing on service and support to
customers, etc.
Kovacich and Halibozek offer you the benefit of more than 55 years
of combined experience in government and corporate security.
Throughout the book, the authors use a fictional global corporation
as a model to provide continual real-world challenges and
solutions. New and experienced managers alike will find a wealth of
information and practical advice to help you develop strategic and
tactical plans and manage your daily operations.
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer. The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.
Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels. These sweeping changes have nearly annihilated privacy anywhere in the world and have also affected how global information warfare is waged and what must be done to counter its attacks. In light of increased attacks since 2002, Global Information Warfare: The New Digital Battlefield, Second Edition provides a critical update on the nature and approaches to global information warfare. It focuses on threats, vulnerabilities, attacks, and defenses from the perspectives of various players such as governments, corporations, terrorists, and private citizens. Upgrades to the Second Edition Include: Revised discussions of changes and impacts of global information warfare since 2002 Updated analyses of the capabilities of several nation-states as well as nonstate actors A comprehensive list of incidents that have occurred in the past year to show the scope of the problem of GIW Discussions of post-9/11 governmental changes and shifting priorities with clearer hindsight than was possible in the first edition The book underscores how hostile countries, business competitors, terrorists, and others are waging information warfare against adversaries, even from across the globe. It describes attacks on information systems through theft, Internet espionage, deception, and sabotage, and illustrates countermeasures used to defeat these threats. The second edition of Global Information Warfare contains a wealth of information and detailed analyses of capabilities of contemporary information technology and the capabilities of the individuals and groups who employ it in their respective digital wars. It is a crucial source for gaining the best understanding of the current state of information warfare and the most effective ways to counter it.
This practical reference provides the basics for instituting a
corporate anti-fraud program that helps prepare corporate security
professionals and other corporate managers for fighting corporate
fraud from inside the company. It provides an exceptional
foundation for security professionals or business executives
involved in developing and implementing a corporate anti-fraud
program as part of a corporate assets protection program.
The Manager's Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, Second Edition, guides readers through today's dynamic security industry, covering the multifaceted functions of corporate security and providing managers with advice on how to grow not only their own careers, but also the careers of those they manage on a daily basis. This accessible, updated edition provides an implementation plan for establishing a corporate security program, especially for those who have little or no knowledge on the topic. It also includes information for intermediate and advanced professionals who are interested in learning more about general security, information systems security, and information warfare.
Security Metrics Management, Measuring the Effectiveness and Efficiency of a Security Program, Second Edition details the application of quantitative, statistical, and/or mathematical analyses to measure security functional trends and workload, tracking what each function is doing in terms of level of effort (LOE), costs, and productivity. This fully updated guide is the go-to reference for managing an asset protection program and related security functions through the use of metrics. It supports the security professional's position on budget matters, helping to justify the cost-effectiveness of security-related decisions to senior management and other key decision-makers. The book is designed to provide easy-to-follow guidance, allowing security professionals to confidently measure the costs of their assets protection program - their security program - as well as its successes and failures. It includes a discussion of how to use the metrics to brief management, build budgets, and provide trend analyses to develop a more efficient and effective asset protection program.
Poems of Life: From pre-birth, through life, death and beyond. GERALD L. KOVACICH, poet, philosopher and observer of life Although we are each unique beings, we share similar experiences- some of the best and worst that life has to offer as well as the best and the worst in each of us. We try to survive in this world which we call Earth. Poems of Life: Thoughts of Human Experiences captures some of the common and uncommon experiences of life's cycle from prebirth to beyond death. It includes thoughts of life, death, and how we live; the experiences of love's many emotions; and the destruction we cause ourselves, each other, and the world. It also addresses some of our jobs and lifestyles, looks at various aspects of human existence, and includes some thoughts of other living creatures. Poems of Life: Thoughts of Human Experiences is a culmination of Gerald L. Kovacich's decades of observations, experiences, and education in human behaviors, cultures, religions, languages, and beliefs written in a unique form of what some may or may not call poetry.
Poems of Life: From pre-birth, through life, death and beyond. GERALD L. KOVACICH, poet, philosopher and observer of life Although we are each unique beings, we share similar experiences- some of the best and worst that life has to offer as well as the best and the worst in each of us. We try to survive in this world which we call Earth. Poems of Life: Thoughts of Human Experiences captures some of the common and uncommon experiences of life's cycle from prebirth to beyond death. It includes thoughts of life, death, and how we live; the experiences of love's many emotions; and the destruction we cause ourselves, each other, and the world. It also addresses some of our jobs and lifestyles, looks at various aspects of human existence, and includes some thoughts of other living creatures. Poems of Life: Thoughts of Human Experiences is a culmination of Gerald L. Kovacich's decades of observations, experiences, and education in human behaviors, cultures, religions, languages, and beliefs written in a unique form of what some may or may not call poetry.
This updated edition will help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets. It contains major updates and three new chapters. The book uniquely bridges the gap between information security, information systems security and information warfare. It re-examines why organizations need to take information assurance seriously.
The high-technology crime investigator's profession is one of the
fastest growing professions in the world today, as information
security issues and crimes related to them are growing in number
and magnitude at an ever-increasing pace. "High-Technology Crime
Investigator's Handbook, Second Edition," informs professionals of
the potential risks of computer crimes, and serves as a guide to
establishing and managing a high-technology crime investigative
program. Each chapter is updated with the latest information and
guidance, including added coverage of computer forensics and
additional metrics to measure organizational performance. In
addition, nine new chapters cover emerging trends in the field, and
offer invaluable guidance on becoming a successful high-technology
crime investigator.
In reaction to the continually changing business climate companies
develop many business strategies to increase their competitiveness
and improve profitability. Companies regularly reshape themselves
continually exploring new markets and developing new products. When
they can't expand into new markets or develop new products on their
own, they seek alternatives. These alternatives include merging
with or acquiring other companies to create a single more capable
company. Companies acquire other companies for a wide variety of
reasons. In some cases company survival may actually be the reason.
What does this condition mean to the security professional? In the
course of mergers and acquisitions, security plays a vital role in
helping to make the endeavor successful. There are numerous titles
on the business aspects of M&A such as the ones listed below.
However, this unique book focuses on the role security plays in
helping to make a merger, acquisition or divestiture successful. It
addresses the fundamental security elements that are required to
support the effort. In addition, it provides an integrated "how to"
approach to implementing M&A security complete with methods and
processes that have been quickly and cost-effectively implemented.
I-Way Robbery is for security, investigative, law enforcement, and
other criminal justice professionals, offering a unique look at the
Internet as the new crime environment for the 21st century. The
book provides an overview of the Internet, its impact on nations,
societies, criminals, security officers, and law enforcement
professionals, and includes recommended basic, protective measures.
I-Way Robbery: Crime on the Internet, uniquely approaches the
much talked about topic of Internet Crime and security. It is
written for anyone who wants a basic understanding of the Internet
crime environment now and into the 21st Century. It covers related
Internet business, government, global, laws, politics and privacy
issues; techniques being used to commit crimes; what can be done
about it; and what challenges the future may hold including topics
such as information warfare.
|
You may like...
Cornetto Trilogy - The World's End / Hot…
Simon Pegg, Nick Frost, …
Blu-ray disc
(1)
The Hobbit: The Desolation of Smaug
Martin Freeman, Ian McKellen, …
Blu-ray disc
(2)
|