Franklin

The security consultant's handbook / Richard Bingley.

Author/Creator:
Bingley, Richard, author.
Publication:
Ely, Cambridgeshire : IT Governance Publishing, 2015.
Format/Description:
Book
1 online resource (354 pages) : illustrations (some color)
Edition:
1st edition
Status/Location:
Loading...

Options
Location Notes Your Loan Policy

Details

Subjects:
Security consultants -- Handbooks, manuals, etc.
Computer networks -- Security measures -- Handbooks, manuals, etc.
Computer security -- Handbooks, manuals, etc.
Form/Genre:
Electronic books.
Language:
English
System Details:
text file
Summary:
A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organizational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities, and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. This book provides essential direction for those who want to succeed in security, either individually or as part of a team. It also aims to stimulate some fresh ideas and provide new market routes for security professionals who may feel that they are underappreciated and overexerted in traditional business domains. Product overview Distilling the author’s fifteen years’ experience as a security practitioner, and incorporating the results of some fifty interviews with leading security practitioners and a review of a wide range of supporting business literature, The Security Consultant’s Handbook provides a wealth of knowledge for the modern security practitioner, covering: Entrepreneurial practice (including business intelligence, intellectual property rights, emerging markets, business funding, and business networking) Management practice (including the security function’s move from basement to boardroom, fitting security into the wider context of organizational resilience, security management leadership, adding value, and professional proficiency) Legislation and regulation (including relevant UK and international laws such as the Human Rights Act 1998, the Data Protection Act 1998 and the Geneva Conventions) Private investigations (including surveillance techniques, tracing missing people, witness statements and evidence, and surveillance and the law) Information and cybersecurity (including why information needs protection, intelligence and espionage, cybersecurity threats, and mitigation approaches such as the ISO 27001 standard for information security management) Protective security (including risk assessment methods, person-focused threat assessments, protective security roles, piracy, and firearms) Safer business travel (including government assistance, safety tips, responding to crime, kidnapping, protective approaches to travel security and corporate liability) Personal and organizational resilience (including workplace initiative...
Notes:
Bibliographic Level Mode of Issuance: Monograph
Includes bibliographical references.
Description based on online resource; title from PDF title page (ebrary, viewed March 15, 2016).
ISBN:
1-84928-749-X
OCLC:
941700560