Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Strategic Information Security
Strategic Information Security

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies....

Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student...
Neoliberalism: A Very Short Introduction (Very Short Introductions)
Neoliberalism: A Very Short Introduction (Very Short Introductions)

The 21st-century world is a fundamentally interdependent place. Globalization has expanded, intensified, and accelerated social relations across world-time and world-space. The digital revolution has served as a catalyst for the creation of sprawling information and communication networks that enmesh individuals, states, and businesses alike....

Surveillance and Threat Detection: Prevention versus Mitigation
Surveillance and Threat Detection: Prevention versus Mitigation

Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years....

International Security and the United States: An Encyclopedia (Praeger Security International)
International Security and the United States: An Encyclopedia (Praeger Security International)

Shaped by often very dramatic events, international security and the international system have changed significantly in recent years. The conclusion of the Cold War, the emergence of new political systems, the growth of significant threats such as terrorism, and the development of new security doctrines have driven global transformation. These...

Implementing Homeland Security for Enterprise IT
Implementing Homeland Security for Enterprise IT

The September 11, 2001 attacks illustrated the immense vulnerability to terrorist threats. Since there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships...

Cyber Terrorism: A Guide for Facility Managers
Cyber Terrorism: A Guide for Facility Managers

In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers.This book will address cyberterrorism and...

Roots and Collapse of Empathy: Human nature at its best and at its worst (Advances in Consciousness Research)
Roots and Collapse of Empathy: Human nature at its best and at its worst (Advances in Consciousness Research)

Spanning from care-giving infants and civilian rescuers risking their life to the collapse of empathy in agents of torture and extinction, this unique book deals with and illustrates the altruistic best and atrocious worst of human nature. It begins with infant roots of empathy, then turns to the neurosocial support of empathic participation,...

Risk Analysis of Complex and Uncertain Systems (International Series in Operations Research & Management Science)
Risk Analysis of Complex and Uncertain Systems (International Series in Operations Research & Management Science)
This book is motivated by the following convictions:

1) Quantitative risk assessment (QRA) can be a powerful discipline for improving risk management decisions and policies.
2) Poorly conducted QRAs can produce results and recommendations that are worse than useless.
3) Sound risk assessment methods provide the benefits of QRA
...
Straight from the Hood: Amazing but True Gangster Tales
Straight from the Hood: Amazing but True Gangster Tales

Many books have written about the black gangster. They have been, for the most part, lengthy tomes focusing on the kingpins of the gangland scene, gangsters with names like Nicky Barnes, Frank Lucas, Lorenzo Fat Cat Nichols and Kenneth Supreme McGiff. Yet there are many stories about the black gangsta that have not received much press...

Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats and even terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16 year-old hacker. We are...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy