Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
Physical Security and The Inspection Process illustrates the basic
concepts and procedures for development, implementation, and
management of a physical security inspection program. It provides
personnel with a model inspection procedure that can be
specifically tailored to meet any company's reasonable minimum
standards. With detailed checklists broken down by security subject
area, the reader will be able to develop site-specific checklists
to meet organizational needs. Physical Security and the Inspection
Process is an important reference for security managers, physical
security inspection team chiefs, team members, and others
responsible for physical security.
Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage as practiced by a range of nations from around the world-focusing on the mass scale in which information is being taken for China's growth and development. Supplying a current look at espionage, the book details the specific types of information China has targeted for its collection efforts in the past. It explains what China does to prepare for its massive collection efforts and describes what has been learned about China's efforts during various Congressional hearings, with expert advice and details from both the FBI and other government agencies. This book is the product of hundreds of hours of research, with material, both primary and secondary, reviewed, studied, and gleaned from numerous sources, including White House documentation and various government agencies. Within the text, you will learn the rationale and techniques used to obtain information in the past. You will see a bit of history over centuries where espionage has played a role in the economy of various countries and view some cases that have come to light when individuals were caught. The book supplies an understanding of how the economy of a nation can prosper or suffer, depending on whether that nation is protecting its intellectual property, or whether it is stealing such property for its own use. The text concludes by outlining specific measures that corporations and their employees can practice to protect their information and assets, both at home and abroad.
This book describes the risk management methodology as a specific
process, a theory, or a procedure for determining your assets,
vulnerabilities, and threats and how security professionals can
protect them. Risk management is essentially a process methodology that will
provide a cost-benefit payback factor to senior management.
This book is the only one available on security training for all
level of personnel. Chief Security Officers (CSOs), security
managers, and heads of security forces often have to design
training programs themselves from scratch or rely on outside
vendors and outside training companies to provide training which is
often dry, stilted, and not always applicable to a specific
corporate or government setting. This title addresses the theories
of sound security training and awareness, then shows the reader how
to put the theories into practice when developing or presenting any
form of security education, training, motivation or awareness.
|
You may like...
|