Read more
Informationen zum Autor James F. Broder, CFE, CPP, FACFE, has more than 40 years experience in security and law enforcement. He has worked as a security executive, instructor, and consultant as well as having served in Vietnam as a Police Advisor in the Counter Insurgency Directorate, Vietnamese National Police. A former FBI Special Agent and employee for the US State Department, U.S. House of Representatives, Washington D.C. Mr. Broder is considered to be one of the most highly respected security authorities in the United States. Eugene (Gene) Tucker, CPP, CFE, CBCP, CHST, is co-author of Butterworth Heinemann’s Risk Analysis and the Security Survey, 4th edition. He is qualified as a Certified Continuity Manager (CCM) – ISO 22301 Lead Implementer and as an ISO 22301 Lead Auditor, and has extensive international experience as a corporate manager, investigator, trainer and consultant in security, safety, and business continuity planning. Klappentext Machine generated contents note: Part I: The Treatment and Analysis of Risk Chapter 1: Risk Chapter 2: Vulnerability and Threat Identification Chapter 3: Risk Measurement Chapter 4: Quantifying and Prioritizing Loss Potential Chapter 5: Cost/Benefit Analysis Chapter 6: Other Risk Analysis Methodologies Chapter 7: The Security Survey: An Overview Chapter 8: Management Audit Techniques and the Preliminary Survey Chapter 9: The Survey Report Chapter 10: Crime Prediction Chapter 11: Determining Insurance Requirements Part II: Emergency Managment and Business Continuity Planning Chapter 12: Emergency Management: A Brief Introduction Chapter 13: Emergency Response Planning Chapter 14: Business Continuity Planning Chapter 15: Business Impact Analysis Chapter 16: Plan Documentation Chapter 17: Crisis Management Chapter 18: Monitoring Safeguards Chapter 19: The Security Consultant . Zusammenfassung Guides you through analysis to implementation to provide you with know-how to implement rigorous! accurate! and cost-effective security policies and designs. This book offers techniques for weighing and managing risks that face your organization. It gives insights into universal principles that can be adapted to specific situations and threats. Inhaltsverzeichnis Part I: The Treatment and Analysis of Risk 1: Risk2: Vulnerability and Threat Identification3: Risk Measurement4: Quantifying and Prioritizing Loss Potential 5: Cost/Benefit Analysis6: Other Risk Analysis Methodologies7: The Security Survey: An Overview8: Management Audit Techniques and the Preliminary Survey9: The Survey Report10: Crime Prediction11: Determining Insurance Requirements Part II: Emergency Managment and Business Continuity Planning 12: Emergency Management: A Brief Introduction13: Mitigation and Preparedness14: Response Planning15: Business Impact Analysis16: Business Continuity Planning17: Plan Documentation18: Crisis Management Planning for Kidnap, Ransom, and Extortion19: Monitoring Safeguards20: The Security Consultant Appendix A: Security Survey Work SheetsAppendix B: Sample Kidnap and Ransom Contingency PlanAppendix C: Security Systems Specifications ...
List of contents
Part I: The Treatment and Analysis of Risk1: Risk2: Vulnerability and Threat Identification3: Risk Measurement4: Quantifying and Prioritizing Loss Potential 5: Cost/Benefit Analysis6: Other Risk Analysis Methodologies7: The Security Survey: An Overview8: Management Audit Techniques and the Preliminary Survey9: The Survey Report10: Crime Prediction11: Determining Insurance Requirements
Part II: Emergency Managment and Business Continuity Planning12: Emergency Management: A Brief Introduction13: Mitigation and Preparedness14: Response Planning15: Business Impact Analysis16: Business Continuity Planning17: Plan Documentation18: Crisis Management Planning for Kidnap, Ransom, and Extortion19: Monitoring Safeguards20: The Security Consultant
Appendix A: Security Survey Work SheetsAppendix B: Sample Kidnap and Ransom Contingency PlanAppendix C: Security Systems Specifications
Report
"Managing risk in today's rapidly changing corporate environment is challenging. James Broder and Eugene Tucker take much of the guesswork out of this challenge with Risk Analysis and the Security Survey.From cover to cover, this is a valuable resource for security professionals at all career stages." --Security Management, January 2013
"When the lst edition of this book was published, back in the 1980s, it became an instant success. Today, many years later, it stands as a classic, used by security professionals, college professors, and students around the world. This new edition addresses the problems every security executive might one day face regarding Disaster Recovery. Broder tells us how to identify and deal with these threats and vulnerabilities as well as what to do if, in spite of our best efforts, disaster strikes. This book is, without doubt, the best of its kind on the market. The contents of this book are virtually priceless and I'm so bold as to suggest that without it, a security professional's library is incomplete." --Charles (Chuck) Sennewald, CPP, CSC
"Jim Broder and Eugene Tucker have done it again--another fine reference for the serious-minded security professional." --John Fay, Learning Shop USA