000 | 02786cam a2200433 i 4500 | ||
---|---|---|---|
001 | GVRL9JSY | ||
003 | MiFhGG | ||
005 | 20180221201240.0 | ||
006 | m o d | ||
007 | cr un ---uuuua | ||
008 | 160810t20162016enka ob 001 0 eng d | ||
020 | _a9780128020197 | ||
020 |
_a9780128020586 _q(electronic book) |
||
035 | _a(OCoLC)956735875 | ||
040 |
_aMiFhGG _beng _cMiFhGG _erda _epn |
||
050 | 4 |
_aHD61.5 _b.S85 2016 |
|
082 | 0 | 4 |
_a658.47 _223 |
100 | 1 |
_aSullivant, John, _eauthor. |
|
245 | 1 | 0 |
_aBuilding a corporate culture of security : _bstrategies for strengthening organizational resiliency / _cJohn Sullivant, CFC, CSC, CHS-IV, CPP, RAM-W, Diplomate, American Board of Forensic Engineering & Technology, American College of Forensic Examiners Institute. |
264 | 1 |
_aOxford : _bButterworth-Heinemann, _c[2016] |
|
264 | 4 | _c©2016 | |
300 |
_a1 online resource (xxvii, 270 pages) : _billustrations (some color) |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 0 | _aGale virtual reference library | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _a1. Introduction -- 2. Strategies that create your life line -- 3. The many faces of vulnerability creep-in -- 4. The evolving threat environment -- 5. The cyber threat landscape -- 6. Establishing a security risk management program is crucial -- 7. Useful metrics give the security organization standing -- 8. A user-friendly security assessment model -- 9. Developing a realistic and useful threat estimate profile -- 10. Establishing and maintaining inseparable security competencies -- 11. A user-friendly security technology model -- 12. Preparing for emergencies -- 13. A user-friendly protocol development model -- 14. A proven organization and management assessment model -- 15. Building competencies that count : a training model -- 16. How to communicate with executives and governing bodies -- 17. A brighter tomorrow : my thoughts. | |
520 | _aThis book provides readers with the proven strategies, methods, and techniques they need to present ideas and a sound business case for improving or enhancing security resilience to senior management. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aCorporate culture. | |
650 | 0 |
_aCorporations _xSecurity measures. |
|
650 | 0 |
_aEmergency management _xPlanning. |
|
710 | 2 | _aGale Group. | |
773 | 0 |
_042268 _966644 _oBD_GALE _tGale |
|
856 | 4 | 0 |
_uhttps://www.usco.edu.co/biblioteca/Redirect?link=https://ezproxy.usco.edu.co/login?url=http://link.galegroup.com/apps/pub/9JSY/GVRL?sid=gale_marc&u=usco&tipo=F&acceso=P&nombre=Galegroup _zAquí puedes acceder a este libro en forma virtual |
912 | _a9JSY | ||
942 |
_cBD _h005.8 |
||
999 |
_c42311 _d42311 |