by
Tobias, Marc Weber.
Call Number
683.32 23
Publication Date
2000
Format:
Electronic Resources
Relevance:
4.0100
by
Gouin, Brian.
Call Number
658.47 22
Publication Date
2007
Summary
Targets the growing number of consultants designing secure, crime-resistant facilities!
Format:
Electronic Resources
Relevance:
3.9456
View Other Search Results
by
Broder, James F.
Call Number
363.11 22
Publication Date
2006
Summary
The definitive classic on risk analysis for security and risk assessment professionals!
Format:
Electronic Resources
Relevance:
3.9456
by
Shannon, Keith Smith.
Call Number
658.47 21
Publication Date
1999
Summary
The intent of this book is to give a working business professional a realistic review of security issues that a business may have to deal with on an everyday basis. Many texts have been written discussing these issues in great detail offering solutions. While the value of these presentations is very worthwhile for the security professional, most management professionals need a more simple and workable way to deal with security problems. This presentation endeavors to outline security remedies and options on a level most useful for the average business professional. In many businesses, security management is assigned to administrative personnel not familiar with protection topics. This book will give those individuals a working knowledge of security issues and practices.
Format:
Electronic Resources
Relevance:
3.8202
by
Vellani, Karim H., 1971-
Call Number
658.478 22
Publication Date
2007
Summary
Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organizations assets, giving decision makers the foundation needed to climb the next step up the corporate ladder. Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures. Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald. * Provides clear direction on how to meet new business demands on the security professional * Guides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the program * Covers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each.
Format:
Electronic Resources
Relevance:
3.3510
by
Fay, John, 1934-
Call Number
658.47 22
Publication Date
2006
Format:
Electronic Resources
Relevance:
3.3129
by
Wiles, Jack.
Call Number
658.478 22
Publication Date
2007
Summary
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and thoughts discussed here are as new as tomorrows headlines, whereas others have been around for decades without being properly addressed. I hope you enjoy this book as much as we have enjoyed working with the various authors and friends during its development. Donald Withers, CEO and Cofounder of TheTrainingCo. Jack Wiles, on Social Engineering offers up a potpourri of tips, tricks, vulnerabilities, and lessons learned from 30-plus years of experience in the worlds of both physical and technical security. Russ Rogers on the Basics of Penetration Testing illustrates the standard methodology for penetration testing: information gathering, network enumeration, vulnerability identification, vulnerability exploitation, privilege escalation, expansion of reach, future access, and information compromise. Johnny Long on No Tech Hacking shows how to hack without touching a computer using tailgating, lock bumping, shoulder surfing, and dumpster diving. Phil Drake on Personal, Workforce, and Family Preparedness covers the basics of creating a plan for you and your family, identifying and obtaining the supplies you will need in an emergency. Kevin OShea on Seizure of Digital Information discusses collecting hardware and information from the scene. Amber Schroader on Cell Phone Forensics writes on new methods and guidelines for digital forensics. Dennis OBrien on RFID: An Introduction, Security Issues, and Concerns discusses how this well-intended technology has been eroded and used for fringe implementations. Ron Green on Open Source Intelligence details how a good Open Source Intelligence program can help you create leverage in negotiations, enable smart decisions regarding the selection of goods and services, and help avoid pitfalls and hazards. Raymond Blackwood on Wireless Awareness: Increasing the Sophistication of Wireless Users maintains it is the technologists responsibility to educate, communicate, and support users despite their lack of interest in understanding how it works. Greg Kipper on What is Steganography? provides a solid understanding of the basics of steganography, what it can and cant do, and arms you with the information you need to set your career path. Eric Cole on Insider Threat discusses why the insider threat is worse than the external threat and the effects of insider threats on a company. *Internationally known experts in information security share their wisdom *Free pass to Techno Security Conference for everyone who purchases a book$1,200 value *2-HOUR DVD with cutting edge information on the future of information security.
Format:
Electronic Resources
Relevance:
2.5825
by
Mendell, Ronald L.
Call Number
658.472 23
Publication Date
2011
Summary
In the years since the first edition, industrial and corporate espionage have not diminished. There has been, however, an increase in awareness about the issues. There are more graduate-level programs in business and in security that are offering courses and training on intelligence gathering in the commercial sector. Training in the protection of confidential documents and materials that forms a part of security certification programs has been updated. With the large amount of outsourcing in the technological sector overseas, information transfer and leakage continues to be a serious problem.
Format:
Electronic Resources
Relevance:
2.4923
by
Fischer, Robert J.
Call Number
363.289 22
Publication Date
2004
Format:
Electronic Resources
Relevance:
2.3722
by
Alexander, Dean C., 1965-
Call Number
363.32 22
Publication Date
2004
Format:
Electronic Resources
Relevance:
1.7114
by
Devarasetty, Ravi, author.
Call Number
004.6782 23
Publication Date
2021
Summary
Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users. Many organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications.You'll start by understanding how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then covers Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise.By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution. This book is for security engineers, security architects, security managers, and security operations specialists who may be involved in transitioning to or from Zscaler or want to learn about deployment, implementation, and support of a Zscaler solution. Anyone looking to step into the ever-expanding world of zero-trust network access using the Zscaler solution will also find this book useful.
Format:
Electronic Resources
Relevance:
0.3329
Call Number
TR DVD 647.940683 EXP 2
Publication Date
2013
Summary
Topics include: an overview of workplace procedures for health, safety and security; dealing with emergencies; participating in workplace OHS practices; following hygiene procedures and identifying hazards; identifying and reporting personal health issues; controlling contamination; selecting and safely using cleaning equipment and materials; storage of cleaning equipment and chemicals; sustainable and environmentally responsible practices.
Format:
Electronic Resources
Relevance:
0.2694
Limit Search Results