How to develop and implement a security master plan
(eBook)

Book Cover
Average Rating
Published
Boca Raton, Fla. : Auerbach, ©2009.
Format
eBook
ISBN
9781420086256, 1420086251, 9781420086263, 142008626X
Physical Desc
1 online resource
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Syndetics Unbound

More Details

Language
English

Notes

Bibliography
Includes bibliographical references and index.
Description
Presents an understanding of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies, and how to focus on both effectiveness and efficiency while conducting a site security assessment. This work constructs a five year plan that is synchronized with the strategies of the business or institution.
Original Version
Original version,xxii, 351 p. : ill. ; 25 cm.
Local note
O'Reilly,O'Reilly Online Learning: Academic/Public Library Edition

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Giles, T. (2009). How to develop and implement a security master plan . Auerbach.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Giles, Timothy. 2009. How to Develop and Implement a Security Master Plan. Auerbach.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Giles, Timothy. How to Develop and Implement a Security Master Plan Auerbach, 2009.

MLA Citation, 9th Edition (style guide)

Giles, Timothy. How to Develop and Implement a Security Master Plan Auerbach, 2009.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
e2e1f78f-9737-e5a2-39ac-bcb35b4afb19-eng
Go To Grouped Work

Grouping Information

Grouped Work IDe2e1f78f-9737-e5a2-39ac-bcb35b4afb19-eng
Full titlehow to develop and implement a security master plan
Authorgiles timothy
Grouping Categorybook
Last Update2024-04-16 12:23:35PM
Last Indexed2024-04-20 04:54:51AM

Book Cover Information

Image Sourcesyndetics
First LoadedJun 18, 2022
Last UsedFeb 12, 2024

Marc Record

First DetectedNov 09, 2022 03:39:50 PM
Last File Modification TimeApr 16, 2024 12:26:42 PM

MARC Record

LEADER03977cam a2200577Ma 4500
001ocn630935581
003OCoLC
00520240405112445.0
006m    go  d        
007cr mnu---uuuuu
008100524s2009    flua    ob    001 0 eng  
019 |a 681170593|a 779922782
020 |a 9781420086256|q (hbk.)
020 |a 1420086251|q (hbk.)
020 |a 9781420086263|q (electronic bk.)
020 |a 142008626X|q (electronic bk.)
0290 |a AU@|b 000045592886
035 |a (OCoLC)630935581|z (OCoLC)681170593|z (OCoLC)779922782
040 |a AU@|b eng|e pn|c AU@|d OCLCQ|d TULIB|d OCLCO|d YDXCP|d OCLCQ|d KIJ|d OCLCF|d OCLCO|d OCLCQ|d YDX|d OCLCO|d OCL|d OCLCQ|d OCLCO|d OCLCL
049 |a TKLA
08204|a 658.4/7|q OCoLC|2 22/eng/20230216
1001 |a Giles, Timothy.
24510|a How to develop and implement a security master plan /|c Timothy D. Giles.
260 |a Boca Raton, Fla. :|b Auerbach,|c ©2009.
300 |a 1 online resource
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
504 |a Includes bibliographical references and index.
5050 |a Security Master Plan Process -- Intent of the Master Plan -- 1. The Business of Security -- 2. Evaluate the Business's Risks -- 3. Conducting a Site Security Assessment -- Part 1 -- 4. Conducting a Site Security Assessment -- Part 2 -- 5. Conducting a Site Security Assessment -- Part 3 -- 6. Conducting a Site Security Assessment -- Part 4 -- 7. Conducting an Assessment of the Security Organization -- 8. Determining What Prevention, Crisis Management, and Recovery Programs Exist -- 9. Interviewing Executive and Security Management -- 10. Review and Evaluate All Security-Related Contracts and the Information Protection Program -- 11. Constructing the Security Master Plan Document -- 12. Typical Contents of a Security Master Plan -- 13. Finalizing the Security Master Plan Process -- 14. Utilizing Your Plan in Managing Your Business -- App. A. Workplace Violence Guidelines -- App. B. Executive and Employee Protection -- App. C. Security Assessment or Self-Assessment Document -- App. D. Risk/Security Management & Consulting -- App. E. Basic Physical Security Standards -- App. F. Sample Termination Checklist -- App. G. Crisis Management Emergency Planning Checklist.
520 |a Presents an understanding of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies, and how to focus on both effectiveness and efficiency while conducting a site security assessment. This work constructs a five year plan that is synchronized with the strategies of the business or institution.
534 |p Original version|e xxii, 351 p. : ill. ; 25 cm.
5880 |a Print version record.
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Security systems.|0 http://id.loc.gov/authorities/subjects/sh85119483
650 0|a Public buildings|x Security measures.
650 0|a Commercial buildings|x Security measures.
650 0|a Emergency management.|0 http://id.loc.gov/authorities/subjects/sh91000441
650 6|a Systèmes de sécurité.
650 6|a Bâtiments publics|x Sécurité|x Mesures.
650 6|a Immeubles commerciaux|x Sécurité|x Mesures.
650 7|a security systems.|2 aat
650 7|a Commercial buildings|x Security measures|2 fast
650 7|a Emergency management|2 fast
650 7|a Public buildings|x Security measures|2 fast
650 7|a Security systems|2 fast
758 |i has work:|a How to develop and implement a security master plan (Text)|1 https://id.oclc.org/worldcat/entity/E39PCFFpCbcbCYPdwjFyHx8hwP|4 https://id.oclc.org/worldcat/ontology/hasWork
85640|u https://ezproxy.knoxlib.org/login?url=https://learning.oreilly.com/library/view/~/9781420086263/?ar
938 |a YBP Library Services|b YANK|n 15919087
938 |a YBP Library Services|b YANK|n 2919072
994 |a 92|b TKL