|
Showing 1 - 20 of
20 matches in All Departments
Poems of Life: From pre-birth, through life, death and beyond.
GERALD L. KOVACICH, poet, philosopher and observer of life Although
we are each unique beings, we share similar experiences- some of
the best and worst that life has to offer as well as the best and
the worst in each of us. We try to survive in this world which we
call Earth. Poems of Life: Thoughts of Human Experiences captures
some of the common and uncommon experiences of life's cycle from
prebirth to beyond death. It includes thoughts of life, death, and
how we live; the experiences of love's many emotions; and the
destruction we cause ourselves, each other, and the world. It also
addresses some of our jobs and lifestyles, looks at various aspects
of human existence, and includes some thoughts of other living
creatures. Poems of Life: Thoughts of Human Experiences is a
culmination of Gerald L. Kovacich's decades of observations,
experiences, and education in human behaviors, cultures, religions,
languages, and beliefs written in a unique form of what some may or
may not call poetry.
Security Metrics Management, Measuring the Effectiveness and
Efficiency of a Security Program, Second Edition details the
application of quantitative, statistical, and/or mathematical
analyses to measure security functional trends and workload,
tracking what each function is doing in terms of level of effort
(LOE), costs, and productivity. This fully updated guide is the
go-to reference for managing an asset protection program and
related security functions through the use of metrics. It supports
the security professional's position on budget matters, helping to
justify the cost-effectiveness of security-related decisions to
senior management and other key decision-makers. The book is
designed to provide easy-to-follow guidance, allowing security
professionals to confidently measure the costs of their assets
protection program - their security program - as well as its
successes and failures. It includes a discussion of how to use the
metrics to brief management, build budgets, and provide trend
analyses to develop a more efficient and effective asset protection
program.
This practical reference provides the basics for instituting a
corporate anti-fraud program that helps prepare corporate security
professionals and other corporate managers for fighting corporate
fraud from inside the company. It provides an exceptional
foundation for security professionals or business executives
involved in developing and implementing a corporate anti-fraud
program as part of a corporate assets protection program.
The author's intent is to provide the reader with a practitioner's
guide (a "how-to" book), augmented by some background information
to put it all in perspective. The approach used should enable the
readers to immediately put in place a useful anti-fraud program
under the leadership of the corporate security officer (CSO), or
other corporate professional.
* Shows professionals how to save their companies money.
* Provides a roadmap for developing an anti-fraud program.
* Allows security professionals to tailor their anti-fraud program
to their own corporate environment.
* Explains how fraud is costing corporations a competitive edge in
the global marketplace.
" The Corporate Security Professional's Handbook on Terrorism " is
a professional reference that clarifies the difference between
terrorism against corporations and their assets, versus terrorism
against government assets. It addresses the existing misconceptions
regarding how terrorism does or does not affect corporations, and
provides security professionals and business executives with a
better understanding of how terrorism may impact them.
Consisting three sections, Section I provides an explanation of
what terrorism is, its history, who engages in it, and why. Section
II focuses on helping the security professional develop and
implement an effective anti-terrorism program in order to better
protect the employees and assets of the corporation. Section III
discusses the future as it relates to the likelihood of having to
deal with terrorism.
The book provides the reader with a practitioner s guide, augmented
by a historical assessment of terrorism and its impact to
corporations, enabling them to immediately put in place useful
security processes and methods to protect their corporate interests
against potential acts of terror. This is guide is an essential
tool for preparing security professionals and company executives to
operate in an increasingly hostile global business environment.
- Features case studies involving acts of terror perpetrated
against corporate interests
- Provides coverage of the growing business practice of outsourcing
security
- Remains practical and straightforward in offering strategies on
physically securing premises, determining risk, protecting
employees, and implementing emergency planning"
This updated edition will help IT managers and assets protection
professionals to assure the protection and availability of vital
digital information and related information systems assets. It
contains major updates and three new chapters. The book uniquely
bridges the gap between information security, information systems
security and information warfare. It re-examines why organizations
need to take information assurance seriously.
Security metrics is the application of quantitative, statistical,
and/or mathematical analyses to measuring security functional
trends and workload. In other words, tracking what each function is
doing in terms of level of effort (LOE), costs, and productivity.
Security metrics management is the managing of an assets protection
program and related security functions through the use of metrics.
It can be used where managerial tasks must be supported for such
purposes as supporting the security professional's position on
budget matters, justifying the cost-effectiveness of decisions,
determining the impact of downsizing on service and support to
customers, etc.
Security Metrics Management is designed to provide basic guidance
to security professionals so that they can measure the costs of
their assets protection program - their security program - as well
as its successes and failures. It includes a discussion of how to
use the metrics to brief management, justify budget and use trend
analyses to develop a more efficient and effective assets
protection program.
- Over 100 checklists, flowcharts, and other illustrations depict
examples of security metrics and how to use them
- Drawings, model processes, model procedures and forms enable the
reader to immediately put concepts to use in a practical
application
- Provides clear direction on how to meet new business demands on
the Security Professional
Kovacich and Halibozek offer you the benefit of more than 55 years
of combined experience in government and corporate security.
Throughout the book, the authors use a fictional global corporation
as a model to provide continual real-world challenges and
solutions. New and experienced managers alike will find a wealth of
information and practical advice to help you develop strategic and
tactical plans and manage your daily operations.
* Contains real case examples to illustrate practical application
of concepts
* Thoroughly covers the integration of physical, computer and
information security goals for complete security awareness
* A handy reference for managers to quickly find and implement the
security solutions they need
The Information Systems Security Officer's Guide: Establishing and
Managing a Cyber Security Program, Third Edition, provides users
with information on how to combat the ever-changing myriad of
threats security professionals face. This entirely updated edition
presents practical advice on establishing, managing, and evaluating
a successful information protection program in a corporation or
government agency, covering everything from effective communication
to career guidance for the information security officer. The book
outlines how to implement a new plan or evaluate an existing one,
and is especially targeted to those who are new to the topic. It is
the definitive resource for learning the key characteristics of an
effective information systems security officer (ISSO), and paints a
comprehensive portrait of an ISSO's duties, their challenges, and
working environments, from handling new technologies and threats,
to performing information security duties in a national security
environment.
Since the turn of the century much has happened in politics,
governments, spying, technology, global business, mobile
communications, and global competition on national and corporate
levels. These sweeping changes have nearly annihilated privacy
anywhere in the world and have also affected how global information
warfare is waged and what must be done to counter its attacks. In
light of increased attacks since 2002, Global Information Warfare:
The New Digital Battlefield, Second Edition provides a critical
update on the nature and approaches to global information warfare.
It focuses on threats, vulnerabilities, attacks, and defenses from
the perspectives of various players such as governments,
corporations, terrorists, and private citizens. Upgrades to the
Second Edition Include: Revised discussions of changes and impacts
of global information warfare since 2002 Updated analyses of the
capabilities of several nation-states as well as nonstate actors A
comprehensive list of incidents that have occurred in the past year
to show the scope of the problem of GIW Discussions of post-9/11
governmental changes and shifting priorities with clearer hindsight
than was possible in the first edition The book underscores how
hostile countries, business competitors, terrorists, and others are
waging information warfare against adversaries, even from across
the globe. It describes attacks on information systems through
theft, Internet espionage, deception, and sabotage, and illustrates
countermeasures used to defeat these threats. The second edition of
Global Information Warfare contains a wealth of information and
detailed analyses of capabilities of contemporary information
technology and the capabilities of the individuals and groups who
employ it in their respective digital wars. It is a crucial source
for gaining the best understanding of the current state of
information warfare and the most effective ways to counter it.
The Manager's Handbook for Corporate Security: Establishing and
Managing a Successful Assets Protection Program, Second Edition,
guides readers through today's dynamic security industry, covering
the multifaceted functions of corporate security and providing
managers with advice on how to grow not only their own careers, but
also the careers of those they manage on a daily basis. This
accessible, updated edition provides an implementation plan for
establishing a corporate security program, especially for those who
have little or no knowledge on the topic. It also includes
information for intermediate and advanced professionals who are
interested in learning more about general security, information
systems security, and information warfare.
Poems of Life: From pre-birth, through life, death and beyond.
GERALD L. KOVACICH, poet, philosopher and observer of life Although
we are each unique beings, we share similar experiences- some of
the best and worst that life has to offer as well as the best and
the worst in each of us. We try to survive in this world which we
call Earth. Poems of Life: Thoughts of Human Experiences captures
some of the common and uncommon experiences of life's cycle from
prebirth to beyond death. It includes thoughts of life, death, and
how we live; the experiences of love's many emotions; and the
destruction we cause ourselves, each other, and the world. It also
addresses some of our jobs and lifestyles, looks at various aspects
of human existence, and includes some thoughts of other living
creatures. Poems of Life: Thoughts of Human Experiences is a
culmination of Gerald L. Kovacich's decades of observations,
experiences, and education in human behaviors, cultures, religions,
languages, and beliefs written in a unique form of what some may or
may not call poetry.
The high-technology crime investigator's profession is one of the
fastest growing professions in the world today, as information
security issues and crimes related to them are growing in number
and magnitude at an ever-increasing pace. "High-Technology Crime
Investigator's Handbook, Second Edition," informs professionals of
the potential risks of computer crimes, and serves as a guide to
establishing and managing a high-technology crime investigative
program. Each chapter is updated with the latest information and
guidance, including added coverage of computer forensics and
additional metrics to measure organizational performance. In
addition, nine new chapters cover emerging trends in the field, and
offer invaluable guidance on becoming a successful high-technology
crime investigator.
* Provides an understanding of the global information environment
and its threats
* Explains how to establish a high-technology crime investigations
unit and prevention program
* Presents material in an engaging, easy-to-follow manner that will
appeal to investigators, law enforcement professionals, corporate
security and information systems security professionals; as well as
corporate and government managers
In reaction to the continually changing business climate companies
develop many business strategies to increase their competitiveness
and improve profitability. Companies regularly reshape themselves
continually exploring new markets and developing new products. When
they can't expand into new markets or develop new products on their
own, they seek alternatives. These alternatives include merging
with or acquiring other companies to create a single more capable
company. Companies acquire other companies for a wide variety of
reasons. In some cases company survival may actually be the reason.
What does this condition mean to the security professional? In the
course of mergers and acquisitions, security plays a vital role in
helping to make the endeavor successful. There are numerous titles
on the business aspects of M&A such as the ones listed below.
However, this unique book focuses on the role security plays in
helping to make a merger, acquisition or divestiture successful. It
addresses the fundamental security elements that are required to
support the effort. In addition, it provides an integrated "how to"
approach to implementing M&A security complete with methods and
processes that have been quickly and cost-effectively implemented.
- First book available that focuses on the role of the Security
Manager in M&A
- Case studies that highlight the role of the security manager;
cases include both best practices as well as illustrations of
nightmare examples of what NOT to do
- Lead author is an expert that has participated in/managed
security for more than 20 high-profile and large-scale acquisitions
- Model processes, procedures, checklists, charts and sample forms
all serve to ease immediate analysis and implementation in a merger
or acquisition
I-Way Robbery is for security, investigative, law enforcement, and
other criminal justice professionals, offering a unique look at the
Internet as the new crime environment for the 21st century. The
book provides an overview of the Internet, its impact on nations,
societies, criminals, security officers, and law enforcement
professionals, and includes recommended basic, protective measures.
I-Way Robbery is written in non-technical terms. It is also an
excellent reference for business and government agency managers who
must understand their responsibilities as they relate to asset
protection - especially those who have on and off ramps connected
to the I-Way.
Boni and Kovacich start with the basics and teach users about the
internet before teaching them about the security risks. This
addresses the subject from the non-information systems perspective
and educates the average user about the overall risks and
appropriate protective measures they should enforce and follow.
This book is a must-have for anyone with an interest in the
pitfalls and precautions of doing business on the internet.
I-Way Robbery: Crime on the Internet, uniquely approaches the
much talked about topic of Internet Crime and security. It is
written for anyone who wants a basic understanding of the Internet
crime environment now and into the 21st Century. It covers related
Internet business, government, global, laws, politics and privacy
issues; techniques being used to commit crimes; what can be done
about it; and what challenges the future may hold including topics
such as information warfare.
Drawing on their decades of experience in high-technology and
Internet crime investigations William Boni and Dr. Gerald L.
Kovacich have written not only an excellent reference book for
business and government agency managers, small business owners, and
teachers, but for anyone who drives along the I-Way.
Addresses the subject of internet security from the non-information
systems perspective
Detailed incident reports to fully illustrate the specific issues
readers must understand to fully appreciate the risks of I-Way
activity
Covers a broad range of issues
|
You may like...
Hoe Ek Dit Onthou
Francois Van Coke, Annie Klopper
Paperback
R300
R219
Discovery Miles 2 190
Loot
Nadine Gordimer
Paperback
(2)
R383
R310
Discovery Miles 3 100
|