Business & Management

Security Management

Per Page:
Sort:

Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

Fredrik Nilsson, Communications Axis
November 21, 2016

Continuing in the tradition of the bestselling first edition, this book examines networked surveillance video solutions. It provides the latest details on industry hardware, software, and networking capabilities of the latest cameras and DVRs. It addresses in full detail updated specifications on...

The Facility Manager's Guide to Safety and Security

John W. Henderson
August 24, 2016

A guide for facility managers of varying types of facilities including, apartment buildings/complexes, office buildings, retail stores, educational facilities (schools), restaurants, and countless others. It will look specifically at the physical similarities inherent in all buildings/facilities...

Practical Cloud Security: A Cross-Industry View

Melvin B. Greer, Jr., Kevin L. Jackson
August 02, 2016

Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of...

Business Theft and Fraud: Detection and Prevention

James R. Youngblood
July 25, 2016

Business Theft and Fraud: Detection and Prevention offers a broad perspective on business-related theft, providing a detailed discussion of numerous avenues of theft, including internal and external fraud, organized retail crime, mortgage fraud, cyber fraud, and extortion. Combining current...

Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition

David R. Matthews
May 23, 2016

Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data—if that is indeed possible. This book is for all of you, whatever your need or...

Information Security Policies, Procedures, and Standards: A Practitioner's Reference

Douglas J. Landoll
May 05, 2016

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the...

The Complete Guide to Cybersecurity Risks and Controls

Anne Kohnke, Dan Shoemaker, Ken E. Sigler
April 04, 2016

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day...

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

Dan Shoemaker, Anne Kohnke, Ken Sigler
February 08, 2016

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship...

Logistics and Transportation Security: A Strategic, Tactical, and Operational Guide to Resilience

Maria G. Burns
October 22, 2015

"Professor Burns has captured the essence of transportation security, one of today's most pressing concerns. As the rate of globalization and world trade increases, security and supply chain resilience are at the core of one’s global transportation network. This is a timely and well written...

Creative Safety Solutions, Second Edition

Thomas D Schneid
September 25, 2015

In today's rapidly changing workplace, safety and loss prevention professionals cannot always "go by the book" for the answers to new and unique problems and issues. When there is no tried-and-true solution to a problem, safety and loss prevention professionals must think outside of the box of...

Global Information Warfare: The New Digital Battlefield, Second Edition

Andrew Jones, Gerald L. Kovacich
September 25, 2015

Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels. These sweeping changes have nearly annihilated privacy anywhere in the world and have also affected how...

Campus Emergency Preparedness: Meeting ICS and NIMS Compliance

Maureen Connolly
September 17, 2015

An easily digestible guide, Campus Emergency Preparedness: Meeting ICS and NIMS Compliance helps you develop and organize emergency operation plans. It incorporates the key components recommended by the Federal Emergency Management Agency (FEMA) and the US Department of Education and outlines the...

Conferences

Year: