Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
63,119 result(s) for "enterprise security"
Sort by:
Theoretical and Methodological Basis of Management of Enterprise Development Security
The aim of the article is to justify the theoretical and methodological basis of management of enterprise development security. The article determines that, under modern conditions, the complexity of the functioning of all levels of the national economy, including industrial enterprises, requires revolutionary changes in their management system if an enterprise is considered as a complex multi-structural system. The crisis signs observed over the past ten years can have both negative and positive impact on the transformation in activities of individual enterprises, lead to both development and degradation of an enterprise. Therefore, the theoretical and methodological basis of management of enterprise development security is proposed. The fundamental components of the theoretical and methodological basis of management of enterprise development security include: management goal, objectives, management principles, approaches, management methods and tools, which, in turn, is the basis for the formation of a convergent integrated mechanism for managing development security with a synergistic effect. In particular, the choice of a mechanism for managing enterprise development security is based on appropriate approaches. Along with the existing general scientific theoretical approaches to forming an effective enterprise management system, there proposed approaches to creating a system for managing enterprise development security, namely: aspectual, situational, systems, process, synergistic and systems-synergistic ones. The convergent integrated mechanism with a synergistic effect is based on the process of convergence of all methodological bases of security and development of an enterprise with obtaining a synergetic effect on its individual components.
Business Confronts Terrorism
Central banks and stock exchanges are bombed. Suicide bombers ravage cinemas, nightclubs, and theaters. Planes crash into skyscrapers and government buildings. Multiple bombs explode on commuter trains. Thousands of people are killed and injured while millions are terrorized by these attacks. These scenarios could be part of a future Hollywood movie. Sadly, they are representative of previous terror attacks against industry and government interests worldwide. Moreover, they are harbingers of global terror threats. Industry constitutes a prime target of contemporary terrorism. This timely book analyzes the threats companies face due to terrorism, industry responses to these dangers, and terrorism’s effects on conducting business in the post-9/11 environment. Dean C. Alexander details the conventional and unconventional terror capabilities facing industry. He describes the activities of terrorists in the economic system and the ways they finance their operations. Alexander discusses how companies can reduce terrorist threats and that corporate security can minimize political violence. He outlines the dynamics of the public-private partnership against terrorism: government aiding industry, business supporting government, and tensions between the two. He also delineates terrorism’s effects—financial, physical, and emotional—on workers and employers. He highlights the negative financial and economic consequences of terrorism. He discusses the impact of terrorism on traditional business practices and concludes with an assessment of future trends.
Electronic Security Systems
Electronic Security Systems is a book written to help the security professional understand the various electronic security functional components and the ways these components interconnect. Providing a holistic approach to solving security issues, this book discusses such topics as integrating electronic functions, developing a system, component philosophy, possible long-term issues, and the culture within a corporation. The book uses a corporate environment as its example; however, the basic issues can be applied to virtually any environment.For a security professional to be effective, he or she needs to understand the electronics as they are integrated into a total security system. Electronic Security Systems allows the professional to do just that, and is an invaluable addition to any security library. * Provides a well-written and concise overview of electronic security systems and their functions* Takes a holistic approach by focusing on the integration of different aspects of electronic security systems* Includes a collection of practical experiences, solutions, and an approach to solving technical problems
Terrorism, the Worker and the City
Soon after watching the twin towers falling in New York, some of those with business responsibilities were already asking themselves whether people would be willing to work in tall buildings ever again. Is work too risky? How can people be expected to attend work in what might now be seen as precarious and vulnerable workplaces and cities? Although, thankfully, large scale terrorist attacks are infrequent, the world's cities, and the businesses to which they are home, have been put on notice that it can come to any place at any time. In Terrorism, the Worker and the City, Luke Howie considers what steps managers and employees can and should take to protect their businesses from such an amorphous and indefinable threat. Deftly combining theoretical insight with empirical research, he reveals how, despite an appearance of 'business as usual', fear; anxiety; and suspicion permeate workplaces, even in cities that may not be at the top of any terrorist group's target list. Using the Australian city of Melbourne, a cosmopolitan city and major business centre with nearly four million people, as a metaphor for other such cities around the world, Dr Howie's research has uncovered that even where they don't perceive a high level threat, business managers who might face having to account for themselves to some post event Inquiry have taken action in consequence of the situation. Often, that action amounts to the introduction of what can be described as 'Simulated Security'. This cannot ever provide certain protection from terrorist attack, but it may be the best we can reasonably do. There is also evidence that it can be effective in terms of providing the reassurance to counter the terrorist objective of disrupting normal life through fear. With its rigorous research compared with other more speculative works on this subject, Terrorism, the Worker and the City will appeal to city and business leaders and managers, and security professionals, as well as those in governmenta
The Complete Guide to Physical Security
Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. Emphasizing the marriage of technology and physical hardware, this volume covers intrusion detection, access control, and video surveillance systems, including networked video.
Asset Protection through Security Awareness
Supplying a high-level overview of how to protect your company's physical and intangible assets, this book explains how to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks. It reviews key topics surrounding computer security and provides detailed instruction on how to put together an effective security awareness team. Requiring no previous networking or programming experience, the book specifies managers' and employees' roles in establishing a company-wide culture of security awareness.
Becoming a Global Chief Security Executive Officer
Becoming a Global Chief Security Executive Officer provides tangible, proven, and practical approaches to optimizing the security leader's ability to lead both today's, and tomorrow's, multidisciplined security, risk, and privacy function.The need for well-trained and effective executives who focus on business security, risk, and privacy has.
Auditing Cloud Computing
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the \"cloud.\" Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. Provides necessary guidance to ensure auditors address security and privacy aspects that through a proper audit can provide a specified level of assurance for an organization's resources Reveals effective methods for evaluating the security and privacy practices of cloud services A cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA) Timely and practical, Auditing Cloud Computing expertly provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers.
Methodological approaches to enterprise security management: traditional and transformed to the conditions of functioning
Purpose. To analyse the methodological approaches to enterprise security management with the allocation of traditional ones and those transformed to modern uncertain conditions of functioning. Methodology. The methodological basis of the study was the scientific works by domestic and foreign scholars to identify the main theoretical provisions on approaches to security management, which were further analysed for their essence and feasibility of use in specific conditions of enterprise functioning. By combining the methods of analysis, synthesis, morphological analysis, and generalisations, the authors have managed to identify traditional approaches to enterprise management and those transformed to modern conditions which are inter-integrated and complementary. Findings. A map of the integration of traditional methodological approaches of enterprise security management and those transformed to modern conditions was formed and proposed, which can be used by enterprises to find effective approaches to security management depending on the object to which the management vector is immediately directed. Originality. The authors analyse a number of approaches to enterprise security management, starting with traditional approaches and moving towards their change depending on the conditions and environment of enterprise functioning. The authors trace the layering of several approaches on the traditional ones simultaneously, which is explained by the complication of the conditions of functioning of enterprises. The importance of finding approaches to management depending on the conditions of functioning of the enterprise and the security object to which security management is focused is emphasised. Practical value. The analysis and the results obtained are of practical value in terms of the feasibility of application at enterprises regardless of their industry, in addition to the effectiveness of the proposed map of approaches, which is variably integrated, taking into account the conditions and the object of management. This will allow one to broadly cover security issues and methodically solve them using a specifically selected approach.