Mapping Security

Mapping Security
Author: Tom Patterson
Publisher: Addison-Wesley Professional
Total Pages: 442
Release: 2005
Genre: Business & Economics
ISBN:

Compelling and practical view of computer security in a multinational environment – for everyone who does business in more than one country.

Introduction to Security

Introduction to Security
Author: Robert J. Fischer
Publisher: Elsevier
Total Pages: 564
Release: 1998
Genre: Business & Economics
ISBN: 9780750698603

This sixth edition of Introduction to Security upholds the book's tradition of informing readers of contemporary security issues from security equipment and procedures to management and loss prevention theory. This new edition has been updated with the most current information available in the constantly changing security field. Introduction to Security, Sixth Edition introduces readers to the options used to deal with a variety of today's security dilemmas. Two important new chapters on workplace violence and drugs in the workplace have been added. Each chapter is followed up with essay and short-answer questions to challenge readers. This book continues to provide the most comprehensive coverage of security issues for the novice, while providing enough detail that experienced security managers will learn about current issues and changes in the profession. Administration Department at Western Illinois University, where he administers a program with more than 1000 undergraduate and 150 graduate students. He earned his Ph.D. in education administration from Southern Illinois University in 1981. Dr. Fischer has served as a consultant to many organizations, including publishers, private security firms, and retailers, and as a contract consultant on police training issues for the Illinois Local Government Police Training Board since 1989. Dr. Fischer is a member of the Academy of Criminal Justice Sciences, The Illinois Association of Criminal Justice Educators, and the American Society for Industrial Security.

A Source Book for Mediæval History

A Source Book for Mediæval History
Author: Oliver J. Thatcher
Publisher: Good Press
Total Pages: 512
Release: 2019-11-22
Genre: History
ISBN:

A Source Book for Mediæval History is a scholarly piece by Oliver J. Thatcher. It covers all major historical events and leaders from the Germania of Tacitus in the 1st century to the decrees of the Hanseatic League in the 13th century.

Intelligence Community Legal Reference Book

Intelligence Community Legal Reference Book
Author: United States. Office of the Director of National Intelligence. Office of General Counsel
Publisher:
Total Pages: 698
Release: 2007
Genre: Electronic surveillance
ISBN:

"The documents presented in this book have been updated to incorporate all amendments made through February 26, 2016 at which point the documents were, where possible, verified against the united States Code maintained by Westlaw." -- pg. v.

Small Business Sourcebook

Small Business Sourcebook
Author:
Publisher:
Total Pages: 1876
Release: 2010
Genre: Small business
ISBN:

A guide to the information services and sources provided to 100 types of small business by associations, consultants, educational programs, franchisers, government agencies, reference works, statisticians, suppliers, trade shows, and venture capital firms.

Effective Security Management

Effective Security Management
Author: Charles A. Sennewald
Publisher: Butterworth-Heinemann
Total Pages: 418
Release: 2003-02-24
Genre: Business & Economics
ISBN: 0750674547

This latest edition of Effective Security Management retains the qualities that made the previous editions a standard of the profession: a readable, comprehensive guide to the planning, staffing, and operation of the security function within an organization. All chapters are completely updated with the focus on practical methods that the reader can put to use in managing an effective security department. The Fourth Edition covers current computer applications that can help in the administrative, managerial, and supervisory aspects of the security function. In addition, two new chapters address employee management in detail. The first, Lifestyle Management for Managers, will discuss motivation at work: the how, when, where, what and why of self-motivation for the boss. The second, The Departing Employee, will discuss the exit interview and the information that can be gained in that process. Also, back by popular demand, are the author's "Jackass Management Traits," 32 humorous portrayals of negative management traits that illustrate very real problems that can undermine the effectiveness of supervisors and managers. * Includes a new chapter on the use of statistics as a security management tool * Contains complete updates to every chapter while retaining the outstanding organization of the previous editions * Recommended reading for The American Society for Industrial Security's (ASIS) Certified Protection Professional (CPP) exam

Cryptography and Privacy Sourcebook, 1996

Cryptography and Privacy Sourcebook, 1996
Author: David Banisar
Publisher: DIANE Publishing
Total Pages: 374
Release: 1996-07
Genre:
ISBN: 0788132768

Includes documents, news items, reports from government agencies, legislative proposals, summary of laws, & public statements intended to provide an overview of the critical issues in today's policy debate. Both sides of an issue are fairly presented. Includes: wiretapping & digital telephony (FBI report on implementing the Communications Assist. for Law Enforce. Act); the clipper chip debate (public key status report; clipper encryption); key escrow (clipper III analysis), & export controls (internat. market for computer software with encryption).

Cryptography and Privacy Sourcebook, 1997

Cryptography and Privacy Sourcebook, 1997
Author: DIANE Publishing Company
Publisher: DIANE Publishing
Total Pages: 302
Release:
Genre:
ISBN: 9780788144776

Includes documents, news items, reports from government agencies, legislative proposals, summary of laws, and public statements intended to provide an overview of the critical issues in today's policy debate. Both sides of an issue are fairly presented. Includes: wiretapping and digital telephony (FBI report on implementing the Communications Assist. for Law Enforce. Act); the clipper chip debate (public key status report; clipper encryption); key escrow (clipper III analysis), and export controls (internat. market for computer software with encryption).