Atnaujinkite slapukų nuostatas

El. knyga: Security Risk Handbook: Assess, Survey, Audit

  • Formatas: 538 pages
  • Išleidimo metai: 23-Jan-2023
  • Leidėjas: Routledge
  • Kalba: eng
  • ISBN-13: 9781000785548
  • Formatas: 538 pages
  • Išleidimo metai: 23-Jan-2023
  • Leidėjas: Routledge
  • Kalba: eng
  • ISBN-13: 9781000785548

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

The Security Risk Handbook assists businesses that need to be able to carry out effective security risk assessments, security surveys, and security audits. It provides guidelines and standardised detailed processes and procedures for carrying out all three stages of the security journey: assess, survey, and audit.

Packed with tools and templates, the book is extremely practical. At the end of each explanatory chapter, a unique case study can be examined by the reader in the areas of risk assessment, security survey, and security audit. This book also highlights the commercial and reputational benefits of rigorous risk management procedures. It can be applied to corporate security, retail security, critical national infrastructure security, maritime security, aviation security, counter-terrorism, and executive and close protection.

This text is relevant to security professionals across all key sectors: corporate security, retail security, critical national infrastructure security, maritime security, aviation security, counter-terrorism, and executive and close protection. It will also be useful to health and safety managers, operations managers, facilities managers, and logistics professionals whose remit is to ensure security across an organisation or function.



The Security Risk Handbook provides clear and comprehensive guidelines and standardised detailed processes and procedures for carrying out all three stages of the security journey: assess, survey, audit. Packed with tools and templates, the book is supremely practical.

 

Opening statement x
Book aims xii
List of figures
xvi
List of tables
xviii
International Security Standards and Regulations xx
Glossary xxiii
Acknowledgements xxix
Foreword xxxi
Introduction 1(2)
What this book is all about
1(2)
Chapter 1 Risk and the Security Risk Assessment
3(1)
Chapter 2 The Security Survey
4(1)
Chapter 3 The Security Audit
4(438)
Conclusion
5(1)
The security review (for lack of a better term)
5(1)
Identification: What's in a title?
6(3)
1 Risk and the Security Risk Assessment
9(167)
The Risk Journey
10(1)
Risk
10(2)
Risk perception
12(2)
Risk component parts
14(23)
The Security Risk Assessment process
37(18)
Risk communication
55(7)
Security Risk Assessment of unique sectors
62(1)
Corporate security
62(14)
Publicly accessible locations (PAL)
76(13)
Retail security
89(10)
Critical national infrastructure security
99(8)
Maritime security
107(14)
Aviation security
121(19)
Hostile environment security
140(10)
Close protection
150(12)
Counter-terrorism
162(9)
Bibliography
171(5)
2 The Security Survey
176(266)
Defence in Depth (DiD)
177(1)
The customer
178(1)
Understanding customer needs
178(2)
The six steps
180(16)
Physical penetration test
196(8)
Integrated security and perimeter security
204(5)
Internal
209(12)
Manned guarding
221(2)
IDS
223(4)
Lighting
227(2)
Closed-circuit television (CCTV), often referred to today as video surveillance
229(11)
The Security Survey report
240(3)
Security Survey - unique sectors
243(25)
Publicly accessible locations (PAL)
268(24)
Retail security
292(16)
Critical national infrastructure
308(18)
Maritime security
326(27)
Aviation security
353(27)
Hostile environment security
380(27)
Close protection
407(28)
Bibliography
435(7)
3 The Security Audit
442(16)
The Security Audit
443(1)
Security
443(2)
The Security Auditor
445(1)
The Security Audit process
445(2)
The Security Audit report
447(1)
Unique sectors
447(1)
Corporate security
447(1)
Publicly accessible locations
448(2)
Retail security
450(2)
Critical national infrastructure security
452(1)
Maritime security
453(1)
Aviation security
454(1)
Hostile environment security
455(1)
Close protection
456(1)
Bibliography
457(1)
Conclusion 458(3)
Annexe A Security Risk Assessment Template 461(9)
Annexe B Security Survey Template 470(18)
Annexe C Security Audit Template 488(3)
Index 491
Charles Swanson is a professional security and risk management specialist and lecturer. He is a Chartered Security Professional, Fellow of the Security Institute, and currently the Senior Tutor on the MSc programme in Security and Risk Management with Linx International and the University of West London. He has lectured in risk management, counterterrorism, and information security (cyber) to a global audience. His first book published by Routledge was titled Professional Security Management: A Strategic Guide.