Published 2007
Table of Contents:
“…Chapter 1: Data Driven Security -- Chapter 2: Asset Identification and Security Inventory -- Chapter 3: Threat Assessments -- Chapter 4: Crime Analysis -- Chapter 5: Vulnerability Assessment -- Chapter 6: Risk Assessment -- Chapter 7: Information Technology Risk Management -- Chapter 8: Prevention -- Chapter 9: Security Measures:
Polices & Procedures -- Chapter 10: Security Measures: Physical Security -- Chapter 11: Security Measures: Deploying Physical Security Measures -- Chapter 12: Security Measures: Personnel -- Chapter 13: Project Management -- Chapter 14: Premises Security Liability -- Chapter 15: Forensic Security -- Chapter 16: Ethics in Security -- Appendix A: Certified Security Consultants (CSC) Code of Ethics -- Appendix B: International Association of Professional Security Consultants Forensic Methodology -- Appendix C: Sample Risk Assessment Report -- Appendix D: Crime Analysis Reports.…”
Call Number:
Loading…
Located:
Loading…
CONNECT
CONNECT
CONNECT
Electronic
eBook