This latest edition of Effective Security Management retains the qualities that made the previous editions a standard of the profession: a readable, comprehensive guide to the planning, staffing, and operation of the security function within an organization. All chapters are completely updated with the focus on practical methods that the reader can put to use in managing an effective security department. The Fourth Edition covers current computer applications that can help in the administrative, managerial, and supervisory aspects of the security function. In addition, two new chapters address employee management in detail. The first, Lifestyle Management for Managers, will discuss motivation at work: the how, when, where, what and why of self-motivation for the boss. The second, The Departing Employee, will discuss the exit interview and the information that can be gained in that process. Also, back by popular demand, are the author's "Jackass Management Traits," 32 humorous portrayals of negative management traits that illustrate very real problems that can undermine the effectiveness of supervisors and managers. * Includes a new chapter on the use of statistics as a security management tool * Contains complete updates to every chapter while retaining the outstanding organization of the previous editions * Recommended reading for The American Society for Industrial Security's (ASIS) Certified Protection Professional (CPP) exam
Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations.
This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses.
The healthcare industry is changing daily.
Guidelines for Effective Information Security Management Thomas R. Peltier ... RADIUS Remote Authentication Dial-In User Service RAM Random Access Memory RARP Reverse Address Resolution Protocol RBOC Regional Bell Operating Companies ...
Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process.
The Computer Fraud and Abuse Act was instituted in 1986 and for the first time, a computer hacker, Kevin Poulsen, was featured on America's Most Wanted. Poulsen was finally arrested in 1991, after spending several years as a fugitive.
This book contains important coverage of environmental design, security surveys, locks, lighting, and CCTV, the latest ISO standards for risk assessment and risk management, physical security planning, network systems infrastructure, and ...
This book examines the diverse factors involved in occupational management—planning, people, budget, information, and preparedness—to present an accurately balanced picture of safety functions.
This volume enables security professionals to structure the best security program designed to meet the complex needs of an entire organization, taking into account the organization's business goals as well as the surrounding controls, ...
I strongly recommend this book to all security practitioners and consultants as an excellent repository of risk and security management know-how." —Tom Mulhall, Director of Security Programmes, Loughborough University