Business & Management

Security Management

Per Page:
Sort:

Introduction to Terrorism, Second Edition

David H. McElreath, Carl J. Jensen, Michael Wigginton, Chester L. Quarles, Stephen Mallory, Daniel Adrian Doss, Robert Nations
June 15, 2017

Written for students and professionals in the fields of Criminal Justice, Homeland Security, National Security, and Intelligence, this textbook presents a critical examination of the topic of terrorism. It covers its historical roots and proceeds through events in history to present-day...

Background Checks Under Fire: Legal Information You Need to Stay Out of Court

Angela L. Preston
May 01, 2017

Those responsible for the background screening programs in their organizations are accountable at some level to establish a program that is legally compliant. A legal manual for the non-expert, this book provides detailed discussion of legal challenges to background checks. It explains how to...

Security Surveillance Centers: Design, Implementation, and Operation

Anthony V. DiSalvatore
April 14, 2017

Unlike current books on the market that focus primarily on the technical aspects of surveillance and protection, Security Surveillance Centers: Design, Implementation, and Operation focuses on the operation of a security surveillance center. This text explains in detail the role of security...

The Comprehensive Handbook of School Safety

E. Scott Dunlap
March 29, 2017

In most schools you will probably see one, if not all of the following: Metal detectors to prevent handguns and other weapons from being brought onto school property Students in standardized uniforms to prevent the appearance of gang affiliations Police officers patrolling the property to deter...

Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

Fredrik Nilsson, Communications Axis
November 21, 2016

Continuing in the tradition of the bestselling first edition, this book examines networked surveillance video solutions. It provides the latest details on industry hardware, software, and networking capabilities of the latest cameras and DVRs. It addresses in full detail updated specifications on...

Information Security Management Handbook, Sixth Edition, Volume 6

Harold F. Tipton, Micki Krause Nozaki
November 16, 2016

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it...

Noiseless Steganography: The Key to Covert Communications

Abdelrahman Desoky
November 16, 2016

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the...

The Facility Manager's Guide to Safety and Security

John W. Henderson
August 24, 2016

A guide for facility managers of varying types of facilities including, apartment buildings/complexes, office buildings, retail stores, educational facilities (schools), restaurants, and countless others. It will look specifically at the physical similarities inherent in all buildings/facilities...

Practical Cloud Security: A Cross-Industry View

Melvin B. Greer, Jr., Kevin L. Jackson
August 02, 2016

Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of...

Business Theft and Fraud: Detection and Prevention

James R. Youngblood
July 25, 2016

Business Theft and Fraud: Detection and Prevention offers a broad perspective on business-related theft, providing a detailed discussion of numerous avenues of theft, including internal and external fraud, organized retail crime, mortgage fraud, cyber fraud, and extortion. Combining current...

Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition

David R. Matthews
May 24, 2016

Although we live in an era in which we are surrounded by an ever-deepening fog of data, few of us truly understand how the data are created, where data are stored, or how to retrieve or destroy data—if that is indeed possible. This book is for all of you, whatever your need or...

Information Security Policies, Procedures, and Standards: A Practitioner's Reference

Douglas J. Landoll
May 05, 2016

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the...

Conferences

Year: