Risk Analysis and the Security Survey, Second Edition provides an understanding of the principles of risk analysis to security students and professionals, which will help them produce more effective, results-oriented security surveys geared to the ever-changing needs of the organization. This new edition provides the readers, professional and practitioners alike with new information essential to meeting their professional obligations with regard to crisis management planning, business continuity planning, disaster response and recovery as well as many other issues facing the security industry today. This book is a must have for all security professionals studying risk analysis and loss control. The most fundamental philosophy of risk control, design and implementation is to make the security program as self-sufficient as possible in all matters pertaining to security. This includes the two-sided coin of risk control: (1) the protection of assets by identifying, analyzing and prioritizing the risk, and (2) contingency and disaster recovery planning.
Rezensionen / Stimmen
"'...it provides the reader with a thorough understanding of the vital subjects of risk analysis and the art/science of conducting and producing effective, results-oriented security surveys. It is written to meet the needs of security professionals from student to master. Broder and his contributing authors have addressed today's changes while retaining the spirit, quality, and fundamental principles described in the first edition. As we evolve into an information based society, the principles and advice in this book will serve the reader well, particularly when dealing with the increasing demands of asset protection, information protection, high technology issues, terrorism, and unknown risks. An excellent book in its original iteration, this edition is far superior to the first. It is highly recommended both an as excellent resource and as a study aid the CPP examination.' - Security Management This text sets out to understand the principles of risk analysis and to relate these to security students and professionals. Its aim is to help those individuals produce more effective results-oriented security surveys geared to the ever-changing needs of the organization. -The Computer Law and Security Report The text takes the reader through the relevant issues based on a fundamental philosophy of risk control that the program should be as self-sufficient as possible in all matters pertaining to security. -The Computer Law and Security Report As a study text for those involved in security risk analysis this book would be an important addition to a professional's library, but it would also be very valuable to an investigator involved in post-incident investigations. -The Institute of Professional Investigators The 1984 edition was still in the ASIS top-ten before the compilation of this volume, indicating what security professionals think of it's value as a security text book. -The Institute of Professional Investigators
Auflage
Sprache
Verlagsort
Verlagsgruppe
Elsevier Science & Technology
Zielgruppe
Editions-Typ
Illustrationen
Maße
Höhe: 235 mm
Breite: 152 mm
Gewicht
ISBN-13
978-0-7506-7089-0 (9780750670890)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
James F. Broder, CFE, CPP, BCFE, has more than 35 years experience in security and law enforcement. He has worked as a security executive, instructor, and consultant as well as having served in Vietnam as a Police Advisor in the Counter Insurgency Directorate, Vietnamese National Police. A former FBI Special Agent and employee for the US State Department, Mr. Border is considered to be one of the most highly recognized security authorities in the United States.
Risk; Vulnerability and Threat Identification; Risk Measurement; Quantifying and Prioritizing Loss Potential; Cost/Benefit Analysis; The Security Survey: An Overview; Management Audit Techniques and the Preliminary Survey; The Survey Report; Crime Prediction; Determining Insurance Requirements; Business Impact Analysis; Business Continuity Planning; Plan Documentation; Response Planning; Crisis Management Planning for Kidnap, Extortion, or Ransom; Monitoring Safeguards; The Security Consultant; Appendix