logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Futures in Mechanics of Structures and Materials

Futures in Mechanics of Structures and Materials (Hardcover)

Thiru Aravinthan (엮은이)
  |  
CRC Pr I Llc
2008-11-20
  |  
748,120원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
알라딘 613,450원 -18% 0원 30,680원 582,770원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
로딩중

e-Book

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

해외직구

책 이미지

Futures in Mechanics of Structures and Materials

책 정보

· 제목 : Futures in Mechanics of Structures and Materials (Hardcover) 
· 분류 : 외국도서 > 기술공학 > 기술공학 > 재료과학
· ISBN : 9780415491969
· 쪽수 : 914쪽

목차

THE EVOLVING ROLE OF SECURITY MANAGEMENT
The Risk and Loss Challenges to Modern Enterprise

Super-Ordinate Directive: Protecting People, Property and Ideas
Ensuring Continuity of Service
Examination of Specific Environments:
Governance and Compliance: Internal Threats and Stakeholder Confidence
Litigation and Legislation
Globalization
IT/Network Infrastructure

Total Enterprise Security: Protecting Organizational Assets
Human Assets
Physical Assets
Intellectual Property
Brand Identity and Reputation
Financial Integrity and Accountability
Information Technology and Networks
Business Continuity and Succession Planning

The Security Manager as a Team Leader
Expectations of the Modern Manager
Supervision and Management: Roles and Responsibilities
Identifying Management Style
Effective Team Dynamics
Critical Distinctions: Management and Leadership
Identifying and Meeting Goals
Security Manager's Human Resource Responsibilities

The Security Manager as a Business Leader
The Role of Security in Modern Enterprise
Business Metrics and Total Quality Management
Overcoming "Overhead" Perception: Quantifying Averted Loss and Building Value
Added Services
Establishing Executive Buy-in
Key Business Partners:

THE EVOLVING ROLE OF SECURITY, RISK MANAGEMENT AND LOSS PREVENTION

The Art & Science of Security
Historical Concepts of Security
Two Traditional Postures: "Denial and Hysteria"
Operating in a "Fishbowl"
The Security Manager as Chess Player
Detect, Deter, Disrupt, Deny
The Five Components of an Effective Security Program:
Managing Risk
The Risk Management Formula
Risk Analysis and Modeling
Selling your Solutions

Security Operations in the Modern Enterprise
Credential Management
Access Control and Alarm Management
Surveillance: Detection and Deterrence
Fire/Life Safety Prevention and Containment
Surveys and Measurement
Audits and Compliance
Prevention through Design
Incident Reporting and Case Management
IT Authentication, Security and Monitoring
Public Agency Interface

Budgeting
Defining the Security Budget
Anticipating Costs and Forecasting Expenditures
Fixed Costs vs. Variable Costs
One Time Expenditures, Amortization and Depreciation
Personnel Expenditures
Technology Expenditures
Vehicle and Equipment Expenditures
"Marketing "/Security Awareness Expenditures
Administrative Expenditures
Training Expenditures
Cost Efficienciesl Economies of Scale
Value-Added Opportunities

The Intelligence Cycle and Due Diligence
Planning and Direction
Collection
Processing
Analysis and Production
Dissemination
Due Diligence Investigations
Communications and Media
Organizational Media Policy
Public Information Officers
Press Access and Free Speech Areas
Establishing Good Media Relations
Information Management

Security Ethics
Expectations and Rights
Illegitimate or Unlawful Directives
Limits of Surveillance
Unfair Labor Practices
Profiling
Use of Force

COMPONENTS OF THE ENTERPRISE SECURITY PROGRAM
People (Personnel)
Determining Needs: In-House vs. Outsourced Functions
The Modem Security Officer:
Establishing Post and Patrol Requirements
Selecting Vendors
Contract Management
The Hiring and Selection Process
Developing Supervisors and Grooming Your Replacement
Training and Professional Development
Career Path Development

Technology
Access Control and Alarm Monitoring Systems (ACAMS)
Network Architecture
Security Cameras
Surveillance Monitoring
Control Center Design
Network Access Authentication
Network Protection and Encryption
Lighting
Screening and Detection
Biometrics
Fire and Life Safety
RFP and Vendor Selection
Contract Management
Specifications, Drawings and System Design Standards
Test and Verification

Environment
SWOT (Strengths, Weaknesses, Opportunities, and Threats) Analysis
Defensible Space
Integrating Security into Design
Project Management
Target Hardening
Natural Barriers
Natural Lighting
Visibility and Line- of- Sight
Psychological Deterrents

Process
Vision and Mission Statement for Security
Organizational Policies and Procedures
Executive Buy-In
Post Orders
Emergency Response Procedures
Legislation and Regulation
Survey, Audit and Compliance
Training
Periodic Evaluation and Modification
Continuous Process Improvement

Awareness
Defining Security Awareness
Intelligence and Threat Assessment
Training, Educating and Empowering the Workforce
Engineering Good Habits
"JDLR"- Just Doesn't Look Right
Creative Awareness Strategies
Marketing Security
Executive Buy-In
Security Awareness Focus

DEFINING AND MITIGATING THE THREATS TO ENTERPRISE SECURITY

Internal Investigations
Discretion and Privacy
Rights and Abilities in Private vs. Public Investigations
Shopkeeper's Privilege
Involving Key Business Partners

Internal Threats
Financial Misconduct I White Collar Crime
Corporate and Vicarious Liability
Policy Violations
Unauthorized DisclosurelViolations of Privacy
Theft

Criminal and Civil Threats
Shoplifting
Trespassing
Burglary
Vandalism
Slips, Trips and Falls
Civil Disobedience
Assault and Battery
Domestic Violence
Arson and Sabotage
Narcotics and Substance Abuse
Gangs and Organized Crime
Coordinating with Law Enforcement

Workplace Violence
Definitions
Hostile Work Environment
Weapons Policies
The Warning Signs
Intervention
Mitigation and Employee Assistance
Response Plans
Fire and Life Safety Emergencies
Fire Protection and Life Safety
Monitoring and Inspection
Prevention
Containment
Early Detection and Response
Interagency Coordination
Evacuation Training and Education
Standardized Emergency Management System (SEMS)
Communications Interoperability

Catastrophic Event and Business Continuity Planning
Natural Disaster
Terrorism
Civic Unrest
Pandemic
CBRNE Events
Unintended Release, Toxins, Explosions
Cyber-attack, Denial of Service, Network Failure
Threats to Executives, Disruption of Decision Making
Elements of BCP

Competitive Intelligence and Industrial Espionage
Compare and Contrast CI and Espionage
Operational Security (OPSEC)
Defining, Controlling and Destroying Sensitive Information
Counter Intelligence Programs
Methods of Intelligence Gathering
Electronic Intelligence and Countermeasures

Operating in a Global Environment
Regional Analysis
Identifying Public and Private Regional Partners
Global Centralized Monitoring
Piracy, Kidnap and Ransom, and Extortion

Information and Network Security
Partnering with IT and Network Administrator
Cross-functionality: physical and IT security
Understanding Threats
Authentication and Verification
Monitoring and Measurement
Intrusion Detection and Network Analyzers
Antivirus
Firewalls and Proxy

CASE STUDIES

저자소개

Thiru Aravinthan (엮은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책