Readings contained in this book has been shaped with the interests of business and management programs in mind, as well as programs based within traditional security management and criminal justice milieus
Counter threats such as terrorism, fraud, natural disasters, and information theft.
Outlines threats to trade secrets that are commonly overlooked by security professionals and shows specific, concrete steps to minimize these threats.
Examines security in a wide range of contexts, spanning corporate issues such as personnel management and business continuity, and encompassing topics of terrorism and border security.
Working knowledge of all the steps necessary to be a successful security design consultant and a smart business owner.
First Responders Guide to Weapons of Mass Destruction (WMD): Practical Techniques and Procedures involving WMD
This book will help you better understand and be prepared for the way the corporate environment operates differently from law enforcement.
A blueprint for those with the skills, determination, and raw courage to succeed in one of the 21st century’s true growth industries.
This book is applicable to all professionals involved in investigations including insurance and risk managers, attorneys, and security practitioners.
Business Continuity Guideline: A Practical Approach for Emergency Preparedness, Crisis Management, and Disaster Recovery
Assists in the identification of physical security measures that can be applied at facilities to safeguard or protect an organization's assets-people, property, and information.
Aids employers in understanding and implementing the fundamental concepts, methodologies, and related legal issues associated with the preemployment background screening of job applicants.
Trusted Information Provider Annex: A Supplement to the ASIS Preemployment Background Screening Guideline
Full of no-nonsense, step-by-step techniques for setting up your consultancy and bringing in clients.
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement