
Business Continuity Management
Beschreibung
Weitere Details
Weitere Ausgaben
Person
Inhalt
- Cover
- Contents
- More Praise for Business Continuity Management
- Title page
- Copyright
- Dedication
- Preface
- About the Web Site
- Crisis Management
- The Value
- Mapping Risks
- Incident Response versus Crisis Management
- Immediate Response and Impact Levels
- Risk Management
- Structuring Business Continuity Management Plans
- Summary
- Chapter 1: Business Continuity Management Plan
- Incident Management versus Crisis Response
- Principles of Incident Management
- Incident Management Sequence
- Incident Management Plan Design and Implementation
- Incident Management Plan Policies and Procedures
- Resourcing the Incident Management Plan
- Structuring Incident Management Plans
- Summary
- Chapter 2: Incident Management Plan
- Interorganizational Management
- Crisis Leadership
- Organizational Crisis Leadership
- Approach Methodologies
- Education and Training
- Response Buildups
- Crisis Management Structures
- Composition of Crisis Response Teams
- Incident Management Structures
- Crisis Control Center
- Monitoring Crisis Management Programs
- Summary
- Chapter 3: Crisis Management Structures
- Security and Safety Awareness
- Crisis Management Training
- Stages of Disasters
- Man-Made Risks
- Natural Risks
- Summary
- Chapter 4: Scope of Risk
- Vehicle-Borne IED Incident Management
- Casualty Incident Management
- Missing Person Incident Management
- Road Traffic Accident Incident Management Data Call
- Facility Physical Security Breach Incident Management
- Kidnapping and Ransom Incident Management
- Media Management Incident Management
- Detention and Arrest Incident Management
- Hostage Situation Incident Management
- Suspect Call Incident Management
- Civil Unrest Incident Management
- Unexploded Ordnance or Suspect Package Incident Management
- Suspect Letter Incident Management
- Destruction of Sensitive Materials Incident Management
- Repatriation Incident Management
- Domestic Terrorism or Special-Interest Groups Incident Management
- Espionage Incident Management
- Site Occupation or Sit-Ins Incident Management
- Sabotage Incident Management
- Demonstrations Incident Management
- Pending Detention or Exit Denial Incident Management
- Complaints Incident Management
- Blackouts and Power Loss Incident Management
- Loss of Sensitive or High-Value Materials Incident Management
- Indirect Fire and Direct Fire Attacks Incident Management
- Workplace Violence Incident Management
- Chemical, Biological, or Radiological Attack Incident Management
- Complex Attack Incident Management
- Family Liaison Incident Management
- Office, Facility, or Hotel Fires Incident Management
- Threats, Coercion, and Intimidation Incident Management
- Mugging or Robbery Incident Management
- Small Arms Fire Incident Management
- Floods and Tidal Waves Incident Management
- Earthquakes Incident Management
- Pandemics Incident Management
- Hurricanes and Tornadoes Incident Management
- Volcanoes Incident Management
- Sandstorms Incident Management
- Landslides Incident Management
- Forest Fires and Brush Fires Incident Management
- Summary
- Chapter 5: Incident Response Guidelines
- Immediate Verbal Reporting (SAD CHALETS)
- Serious Incident Reporting
- Incident Management Plan Risk Assessment Reports
- Sample Crisis Information Capture Reports
- Summary
- Chapter 6: Crisis Information Capture Reports
- Acknowledgments
- Index
- End User License Agreement
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist.
Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.
Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.