How to develop and implement a security master plan
(eBook)
Author
Published
Boca Raton, Fla. : Auerbach, ©2009.
Format
eBook
ISBN
9781420086256, 1420086251, 9781420086263, 142008626X
Physical Desc
1 online resource
Status
Description
Loading Description...
Also in this Series
Checking series information...
Subjects
LC Subjects
OCLC Fast Subjects
More Details
Language
English
Notes
Bibliography
Includes bibliographical references and index.
Description
Presents an understanding of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies, and how to focus on both effectiveness and efficiency while conducting a site security assessment. This work constructs a five year plan that is synchronized with the strategies of the business or institution.
Original Version
Original version,xxii, 351 p. : ill. ; 25 cm.
Local note
O'Reilly,O'Reilly Online Learning: Academic/Public Library Edition
Reviews from GoodReads
Loading GoodReads Reviews.
Citations
APA Citation, 7th Edition (style guide)
Giles, T. (2009). How to develop and implement a security master plan . Auerbach.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Giles, Timothy. 2009. How to Develop and Implement a Security Master Plan. Auerbach.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Giles, Timothy. How to Develop and Implement a Security Master Plan Auerbach, 2009.
MLA Citation, 9th Edition (style guide)Giles, Timothy. How to Develop and Implement a Security Master Plan Auerbach, 2009.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
e2e1f78f-9737-e5a2-39ac-bcb35b4afb19-eng
Grouping Information
Grouped Work ID | e2e1f78f-9737-e5a2-39ac-bcb35b4afb19-eng |
---|---|
Full title | how to develop and implement a security master plan |
Author | giles timothy |
Grouping Category | book |
Last Update | 2024-04-16 12:23:35PM |
Last Indexed | 2024-04-20 04:54:51AM |
Book Cover Information
Image Source | syndetics |
---|---|
First Loaded | Jun 18, 2022 |
Last Used | Feb 12, 2024 |
Marc Record
First Detected | Nov 09, 2022 03:39:50 PM |
---|---|
Last File Modification Time | Apr 16, 2024 12:26:42 PM |
MARC Record
LEADER | 03977cam a2200577Ma 4500 | ||
---|---|---|---|
001 | ocn630935581 | ||
003 | OCoLC | ||
005 | 20240405112445.0 | ||
006 | m go d | ||
007 | cr mnu---uuuuu | ||
008 | 100524s2009 flua ob 001 0 eng | ||
019 | |a 681170593|a 779922782 | ||
020 | |a 9781420086256|q (hbk.) | ||
020 | |a 1420086251|q (hbk.) | ||
020 | |a 9781420086263|q (electronic bk.) | ||
020 | |a 142008626X|q (electronic bk.) | ||
029 | 0 | |a AU@|b 000045592886 | |
035 | |a (OCoLC)630935581|z (OCoLC)681170593|z (OCoLC)779922782 | ||
040 | |a AU@|b eng|e pn|c AU@|d OCLCQ|d TULIB|d OCLCO|d YDXCP|d OCLCQ|d KIJ|d OCLCF|d OCLCO|d OCLCQ|d YDX|d OCLCO|d OCL|d OCLCQ|d OCLCO|d OCLCL | ||
049 | |a TKLA | ||
082 | 0 | 4 | |a 658.4/7|q OCoLC|2 22/eng/20230216 |
100 | 1 | |a Giles, Timothy. | |
245 | 1 | 0 | |a How to develop and implement a security master plan /|c Timothy D. Giles. |
260 | |a Boca Raton, Fla. :|b Auerbach,|c ©2009. | ||
300 | |a 1 online resource | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Security Master Plan Process -- Intent of the Master Plan -- 1. The Business of Security -- 2. Evaluate the Business's Risks -- 3. Conducting a Site Security Assessment -- Part 1 -- 4. Conducting a Site Security Assessment -- Part 2 -- 5. Conducting a Site Security Assessment -- Part 3 -- 6. Conducting a Site Security Assessment -- Part 4 -- 7. Conducting an Assessment of the Security Organization -- 8. Determining What Prevention, Crisis Management, and Recovery Programs Exist -- 9. Interviewing Executive and Security Management -- 10. Review and Evaluate All Security-Related Contracts and the Information Protection Program -- 11. Constructing the Security Master Plan Document -- 12. Typical Contents of a Security Master Plan -- 13. Finalizing the Security Master Plan Process -- 14. Utilizing Your Plan in Managing Your Business -- App. A. Workplace Violence Guidelines -- App. B. Executive and Employee Protection -- App. C. Security Assessment or Self-Assessment Document -- App. D. Risk/Security Management & Consulting -- App. E. Basic Physical Security Standards -- App. F. Sample Termination Checklist -- App. G. Crisis Management Emergency Planning Checklist. | |
520 | |a Presents an understanding of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies, and how to focus on both effectiveness and efficiency while conducting a site security assessment. This work constructs a five year plan that is synchronized with the strategies of the business or institution. | ||
534 | |p Original version|e xxii, 351 p. : ill. ; 25 cm. | ||
588 | 0 | |a Print version record. | |
590 | |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Security systems.|0 http://id.loc.gov/authorities/subjects/sh85119483 | |
650 | 0 | |a Public buildings|x Security measures. | |
650 | 0 | |a Commercial buildings|x Security measures. | |
650 | 0 | |a Emergency management.|0 http://id.loc.gov/authorities/subjects/sh91000441 | |
650 | 6 | |a Systèmes de sécurité. | |
650 | 6 | |a Bâtiments publics|x Sécurité|x Mesures. | |
650 | 6 | |a Immeubles commerciaux|x Sécurité|x Mesures. | |
650 | 7 | |a security systems.|2 aat | |
650 | 7 | |a Commercial buildings|x Security measures|2 fast | |
650 | 7 | |a Emergency management|2 fast | |
650 | 7 | |a Public buildings|x Security measures|2 fast | |
650 | 7 | |a Security systems|2 fast | |
758 | |i has work:|a How to develop and implement a security master plan (Text)|1 https://id.oclc.org/worldcat/entity/E39PCFFpCbcbCYPdwjFyHx8hwP|4 https://id.oclc.org/worldcat/ontology/hasWork | ||
856 | 4 | 0 | |u https://ezproxy.knoxlib.org/login?url=https://learning.oreilly.com/library/view/~/9781420086263/?ar |
938 | |a YBP Library Services|b YANK|n 15919087 | ||
938 | |a YBP Library Services|b YANK|n 2919072 | ||
994 | |a 92|b TKL |