ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Professional Security Management: A Strategic Guide

دانلود کتاب مدیریت حرفه ای امنیت: راهنمای استراتژیک

Professional Security Management: A Strategic Guide

مشخصات کتاب

Professional Security Management: A Strategic Guide

ویرایش: [1 ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 0367339617, 9780367339616 
ناشر: Routledge 
سال نشر: 2020 
تعداد صفحات: 328
[329] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 2 Mb 

قیمت کتاب (تومان) : 60,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 4


در صورت تبدیل فایل کتاب Professional Security Management: A Strategic Guide به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مدیریت حرفه ای امنیت: راهنمای استراتژیک نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مدیریت حرفه ای امنیت: راهنمای استراتژیک

از لحاظ تاریخی، مدیران امنیتی تمایل دارند از نیروهای مسلح یا مجری قانون تامین شوند. اما پیچیدگی روزافزون سازمان‌هایی که آنها را به کار می‌گیرند، همراه با فناوری‌های به کار گرفته شده توسط آنها، تحول و گسترش نقش را وادار می‌کند و مدیران امنیتی برای موفقیت در حوزه کاری خود و حفاظت از دارایی‌های کارفرمایان خود باید با این چالش مقابله کنند. مدیریت ریسک، مدیریت بحران، مدیریت تداوم، عملیات استراتژیک کسب و کار، امنیت داده، فناوری اطلاعات و ارتباطات تجاری، همگی در حیطه اختیارات مدیر امنیت قرار دارند. این کتاب راهنمای رویارویی با این چالش‌ها است که مجموعه مهارت‌ها و دانش ضروری را برای مدیریت امنیت فراهم می‌کند تا با چالش‌های پیش روی کسب‌وکارهای معاصر، بین‌المللی یا فناوری‌گرا مواجه شود. این مبانی استراتژی، ریسک و فناوری را از دیدگاه مدیر امنیت پوشش می دهد و تنها بر \"نیاز به دانستن\" تمرکز دارد. خواننده از درک اینکه چگونه مدیریت ریسک اهداف عملکردی خود را با اهداف استراتژیک و عملیات سازمان همسو می کند، بهره مند خواهد شد. این کتاب ضروری از اعتباربخشی حرفه‌ای و صلاحیت‌های حرفه‌ای مانند Chartered Security Professional (CSyP) یا Certified Protection Professional (CPP) پشتیبانی می‌کند، و در مورد مسیرهای تحصیلات عالی در زمینه‌های امنیت و مدیریت ریسک توصیه می‌کند. این برای هر مدیر ریسکی که به دنبال آموزش و توسعه خود است، و همچنین مکمل برنامه های مدیریت ریسک و امنیت با تمرکز بر عمل ایده آل است.


توضیحاتی درمورد کتاب به خارجی

Historically, security managers have tended to be sourced from either the armed forces or law enforcement. But the increasing complexity of the organisations employing them, along with the technologies employed by them, is forcing an evolution and expansion of the role, and security managers must meet this challenge in order to succeed in their field and protect the assets of their employers. Risk management, crisis management, continuity management, strategic business operations, data security, IT, and business communications all fall under the purview of the security manager. This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses. It covers the basics of strategy, risk, and technology from the perspective of the security manager, focussing only on the \'need to know\'. The reader will benefit from an understanding of how risk management aligns its functional aims with the strategic goals and operations of the organisation. This essential book supports professional vocational accreditation and qualifications, such as the Chartered Security Professional (CSyP) or Certified Protection Professional (CPP), and advises on pathways to higher education qualifications in the fields of security and risk management. It is ideal for any risk manager looking to further their training and development, as well as being complementary for risk and security management programs with a focus on practice.



فهرست مطالب

Cover
Half Title
Title
Copyright
Dedication
Contents
List of figures
List of tables
Acknowledgements
Introduction
	Thinking like a criminal
	Aims
	Security management
	Exercise Brave Defender
1 Private security and the development of the security manager
	Policing and law enforcement
		The United Kingdom
	The Metropolitan Police Service (MPS)
	The US
	The UK police post-2008/09
	The next great recession
	The dark figure of crime
	The private security sector
	Private security companies (PSC)
	The 2012 London Olympics
	The development of the security manager
	Management
	Security management
	The cultural debate
2 Security risk management and strategic business awareness
	The security professional and risk management
	Risk management responsibilities
	Crisis management and the security manager
	Strategic business awareness and the security manager
	Income generation
3 Critical security areas
	3.1 Security risk management
		Security
		International security
		Timeline
		Personal security – extrapolating from above section
		National security
		International security
		Globalisation
		A potted history
		Walls and castles
		Risk
		Risk perception
		Risk perception case study: 9/11
		The security risk assessment
		Competent persons and the security risk assessment
		Subject matter expertise
		Risk component parts
		Assets
		Brand and reputation
		Threats: capability combined with intent
		Vulnerability
		Likelihood
		Impact
		Risk treatment and control measures
		Reduce the risk
		Avoid the risk
		Risk transference
		Residual risk
		Risk acceptance
		Risk communication
	Exercise Brave Defender: security and risk management
		Scenario
		Britcom UK: 1 Canada Fields
		Security systems at 1 Canada Fields
		Access control
		Intruder detection system (IDS)
		Britcom plc
			Unique selling point
		Internal – SWOT
		External – PESTLE
		Synopsis
		Task
	3.2 Crime Prevention Through Environmental Design (CPTED) and Situational Crime Prevention (SCP)
		CPTED
		Situational Crime Prevention
		Situational Crime Prevention activities
		Routine Activity Theory (RAT)
		Rational Choice Theory
		Synopsis
	3.3 Physical and electronic security systems
		Defence in depth (DiD)
		Defence in depth (continued)
			The surrounding environment
		Perimeter
			Fencing
			Security lighting
			External access control
		Building fabric and construction
		Physical security standards
		Reception areas
		Electronic systems
			Closed circuit television (CCTV)
			Perimeter intruder detection systems (PIDS) and intruder detection systems (IDS)
			Internal access control
			Radio frequency identification (RFID)
		Synopsis
	3.4 The security survey and the security audit
		The security survey
		Competency levels
		The security surveyor
		My vision – the professional security surveyor
		Registered security surveyor/auditor
		Synopsis
	3.5 Business resilience
		Risk management
		Management policies, procedures, and practices
		Communicating, consulting, and establishing the context
		Identifying, analysing, evaluating, treating, monitoring, and reviewing risk
		Treating, monitoring, and reviewing the risk
		Identification of residual risks
		Monitoring and reviewing risk
		Crisis management
		The crisis management plan (CMP)
		Phases of a crisis
		Pre-crisis – preventing the crisis from occurring
		The financial crisis of 2008
		Operational crisis – containment and control
		Post-crisis phase
		The crisis management team (CMT)
		CMT members
		CMT lead
		Human resources lead (director)
		Legal advisor
		Public relations (PR) and communications lead
		Security and safety
		Operations and logistics
		Business administration and finance
		The role of the crisis management team
		Crisis communications
		Senior management response
		Synopsis
		Exercise Noble Response
		Phase 1
		Phase 2
		Phase 3
		Phase 4
		Phase 5
		Phase 6
		Phase 7
		Phase 8
		Phase 9
		Phases 1 to 7 – summary
		Reflection on the above
		Phase 1
		Phase 2
		Phase 3
		Phase 4
		Phase 5
		Phase 6
		Phase 7
		Phase 8
		Phase 9
		Résumé
		Terrorist threat level: SEVERE
		Phase 10
		Phase 11
		Disaster management
		Disaster management and the disaster management cycle
		The Disaster Management Life Cycle
		Business continuity
		Business
		Business Continuity Planning (BCP) and Business Continuity Management Systems (BCMS)
		The Business Continuity Plan (BCP)
		Synopsis
	3.6 The chief security officer (CSO) and the chief information 
security officer (CISO)
		The CSO
		The CISO
		Synopsis
	3.7 Cybercrime and the cyberthreat
		The cyberthreat
		The Internet of Things
		Synopsis
	3.8 Critical national infrastructure
		Interdependency
		Risk and critical infrastructures (CI)
		Threats to critical infrastructures
		Physical threats
		Fukushima Daiichi
		Physical
		Cyber
		The protection of critical infrastructure (CI)
		Cyber-NHS and ransomware
		Synopsis
		Task
	3.9 Terrorism and counterterrorism
		Definitions and identification of terrorism
		The psychology and rationale of terrorism
		Radicalisation and de-radicalisation
		Radicalisation
		De-radicalisation and disengagement
		Terrorist methods of operation and attack platforms
		Irish terrorism
		The troubles
		The Fenians
		Partition
		1969 – the Apprentice Boys march
		The Provisional Irish Republican Army (PIRA)
		The corporal killings
		PIRA external operations
		Jihad
		Islamic Jihadi terrorism
		Extreme right-wing terrorism
		Left-wing ideologies
		State-sponsored terrorism
		State patronage
		State assistance
		Synopsis
		Task
	3.10 Aviation and maritime security management
		Aviation security
		Maritime security
			International terrorism
		MV Limburg
		USS Cole
		The ISPS Code
		Maritime Transportation Security Act (MTSA) of 2002 – USA
		Container Security Initiative (CSI) – US
		Customs Trade Partnership Against Terrorism (C-TPAT) – USA
		World Customs Organisation (WCO) Framework of Standards to Secure and Facilitate Trade (SAFE)
		Authorised Economic Operator (AEO) – EU
		Maritime security – piracy
		Synopsis
		Task
	3.11 Supply chain security management
		Intermodal transportation
		Synopsis
	3.12 Hostile environment awareness
		Beirut
		Synopsis
	3.13 Strategic business awareness
		Britcom plc
		Synopsis
		Task
	3.14 Fraud and fraud investigations
		Concern – 2018
		PwC’s 2018 Global Economic Crime and Fraud Survey
		Fraud
		Types of fraud
		Synopsis and task
	3.15 Retail loss and prevention methods
		The British Retail Consortium (BRC)
			Context and trends
			Violence and abuse
			Theft and damage
			Fraud
			Cyber
		Retail loss prevention
		Members of staff
		Organised criminals
		Opportunist criminals
		Mitigation
		Involve the right people with the right approach
		Venice and the unions
		The right people
		Resistance
		Choose activities and topics
		Plan and execute
		Synopsis
	3.16 Workplace investigations
		Evidence
		Legislation
			Civil law
			Criminal law
		Acts of Parliament
		The investigation
		Planning
		Procedural transparency
		Synopsis
		Tasks
	3.17 Academic and vocational qualifications
		SIA front line training
			Common security industry knowledge
			Security guarding specialist module
			Conflict management module
		The Regulated Qualifications Framework (RQF)
		Foundation degree
		Bachelor’s degree (BA/BSc)
		Master’s degree (MA/MSc/MLitt/MPhil)
		PhD
			Chartered status
			ASIS International
	3.18 Conclusion
	Bibliography
Index




نظرات کاربران