Kirjojen hintavertailu. Mukana 11 457 444 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

1000 tulosta hakusanalla Gerald L. Kovacich

Fighting Fraud

Fighting Fraud

Gerald L. Kovacich

Butterworth-Heinemann Inc
2007
nidottu
This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company. Fighting Fraud provides an exceptional foundation for security professionals or business executives involved in developing and implementing a corporate anti-fraud program as part of a corporate assets protection program. The author’s intent is to provide the reader with a practitioner’s guide (a “how-to? book), augmented by some background information to put it all in perspective. The approach used should enable the readers to immediately put in place a useful anti-fraud program under the leadership of the corporate security officer (CSO), or other corporate professional.
The Information Systems Security Officer's Guide

The Information Systems Security Officer's Guide

Gerald L. Kovacich

Butterworth-Heinemann Inc
2016
nidottu
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer. The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.
Security Metrics Management

Security Metrics Management

Gerald L. Kovacich

Butterworth-Heinemann Ltd
2005
sidottu
Security metrics is the application of quantitative, statistical, and/or mathematical analyses to measuring security functional trends and workload. In other words, tracking what each function is doing in terms of level of effort (LOE), costs, and productivity. Security metrics management is the managing of an assets protection program and related security functions through the use of metrics. It can be used where managerial tasks must be supported for such purposes as supporting the security professional’s position on budget matters, justifying the cost-effectiveness of decisions, determining the impact of downsizing on service and support to customers, etc. Security Metrics Management is designed to provide basic guidance to security professionals so that they can measure the costs of their assets protection program - their security program - as well as its successes and failures. It includes a discussion of how to use the metrics to brief management, justify budget and use trend analyses to develop a more efficient and effective assets protection program.
Security Metrics Management

Security Metrics Management

Gerald L. Kovacich; Edward Halibozek

Butterworth-Heinemann Inc
2016
nidottu
Security Metrics Management, Measuring the Effectiveness and Efficiency of a Security Program, Second Edition details the application of quantitative, statistical, and/or mathematical analyses to measure security functional trends and workload, tracking what each function is doing in terms of level of effort (LOE), costs, and productivity. This fully updated guide is the go-to reference for managing an asset protection program and related security functions through the use of metrics. It supports the security professional’s position on budget matters, helping to justify the cost-effectiveness of security-related decisions to senior management and other key decision-makers. The book is designed to provide easy-to-follow guidance, allowing security professionals to confidently measure the costs of their assets protection program - their security program - as well as its successes and failures. It includes a discussion of how to use the metrics to brief management, build budgets, and provide trend analyses to develop a more efficient and effective asset protection program.
The Manager's Handbook for Corporate Security

The Manager's Handbook for Corporate Security

Gerald L. Kovacich; Edward Halibozek

Butterworth-Heinemann Ltd
2003
sidottu
Kovacich and Halibozek offer you the benefit of more than 55 years of combined experience in government and corporate security. Throughout the book, the authors use a fictional global corporation as a model to provide continual real-world challenges and solutions. New and experienced managers alike will find a wealth of information and practical advice to help you develop strategic and tactical plans and manage your daily operations.
High-Technology Crime Investigator's Handbook

High-Technology Crime Investigator's Handbook

Gerald L. Kovacich; William C. Boni

Butterworth-Heinemann Ltd
2006
nidottu
The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator.
The Blank Page

The Blank Page

Gerald L Kovacich

Authorhouse
2019
sidottu
This book is focused on the process of writing books but the process will also apply to all types of writings such as for magazines, journals, and articles; as well as developing lectures. Just as we are each unique individuals, we also have our unique style of writing. Each writer must find their style as thousands of others have done so for eons. This book will support your writing efforts by providing an efficient and effective process so that you can have an organized approach, thus making it easier for you to focus on the art of writing your book. It also provides valuable information about today's writing and publication environment. Dr. Gerald L. Kovacich has written about 20 books of fiction and non-fiction with four different publishers, excluding second, third editions and foreign language editions. He has mentored and co-authored with successful writers for over a decade. Based on those experiences, he has decided to share his successful approach with others who have made their decision to write their first and subsequent books.
The Blank Page

The Blank Page

Gerald L Kovacich

Authorhouse
2019
pokkari
This book is focused on the process of writing books but the process will also apply to all types of writings such as for magazines, journals, and articles; as well as developing lectures. Just as we are each unique individuals, we also have our unique style of writing. Each writer must find their style as thousands of others have done so for eons. This book will support your writing efforts by providing an efficient and effective process so that you can have an organized approach, thus making it easier for you to focus on the art of writing your book. It also provides valuable information about today's writing and publication environment. Dr. Gerald L. Kovacich has written about 20 books of fiction and non-fiction with four different publishers, excluding second, third editions and foreign language editions. He has mentored and co-authored with successful writers for over a decade. Based on those experiences, he has decided to share his successful approach with others who have made their decision to write their first and subsequent books.
The Manager's Handbook for Corporate Security

The Manager's Handbook for Corporate Security

Edward Halibozek; Gerald L. Kovacich

Butterworth-Heinemann Inc
2017
nidottu
The Manager’s Handbook for Corporate Security: Establishing and Managing a Successful Assets Protection Program, Second Edition, guides readers through today’s dynamic security industry, covering the multifaceted functions of corporate security and providing managers with advice on how to grow not only their own careers, but also the careers of those they manage on a daily basis. This accessible, updated edition provides an implementation plan for establishing a corporate security program, especially for those who have little or no knowledge on the topic. It also includes information for intermediate and advanced professionals who are interested in learning more about general security, information systems security, and information warfare.
Mergers and Acquisitions Security

Mergers and Acquisitions Security

Edward Halibozek; Gerald L. Kovacich

Butterworth-Heinemann Ltd
2005
nidottu
In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly reshape themselves continually exploring new markets and developing new products. When they can't expand into new markets or develop new products on their own, they seek alternatives. These alternatives include merging with or acquiring other companies to create a single more capable company. Companies acquire other companies for a wide variety of reasons. In some cases company survival may actually be the reason. What does this condition mean to the security professional? In the course of mergers and acquisitions, security plays a vital role in helping to make the endeavor successful. There are numerous titles on the business aspects of M&A such as the ones listed below. However, this unique book focuses on the role security plays in helping to make a merger, acquisition or divestiture successful. It addresses the fundamental security elements that are required to support the effort. In addition, it provides an integrated "how to" approach to implementing M&A security complete with methods and processes that have been quickly and cost-effectively implemented.
Global Information Warfare

Global Information Warfare

Andrew Jones; Gerald L. Kovacich

Productivity Press
2015
sidottu
Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels. These sweeping changes have nearly annihilated privacy anywhere in the world and have also affected how global information warfare is waged and what must be done to counter its attacks.In light of increased attacks since 2002, Global Information Warfare: The New Digital Battlefield, Second Edition provides a critical update on the nature and approaches to global information warfare. It focuses on threats, vulnerabilities, attacks, and defenses from the perspectives of various players such as governments, corporations, terrorists, and private citizens.Upgrades to the Second Edition Include:Revised discussions of changes and impacts of global information warfare since 2002Updated analyses of the capabilities of several nation-states as well as nonstate actorsA comprehensive list of incidents that have occurred in the past year to show the scope of the problem of GIWDiscussions of post-9/11 governmental changes and shifting priorities with clearer hindsight than was possible in the first editionThe book underscores how hostile countries, business competitors, terrorists, and others are waging information warfare against adversaries, even from across the globe. It describes attacks on information systems through theft, Internet espionage, deception, and sabotage, and illustrates countermeasures used to defeat these threats.The second edition of Global Information Warfare contains a wealth of information and detailed analyses of capabilities of contemporary information technology and the capabilities of the individuals and groups who employ it in their respective digital wars. It is a crucial source for gaining the best understanding of the current state of information warfare and the most effective ways to counter it.
Information Assurance

Information Assurance

Andrew Blyth; Gerald L. Kovacich

Springer London Ltd
2006
nidottu
When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth, this is the Holy Grail that all organisations that value their information should strive to achieve, but which few even understand. Information assurance is a term that has recently come into common use. When talking with old timers in IT (or at least those that are over 35-year old), you will hear them talking about information security, a term that has survived since the birth of the computer. In the recent past, the term information warfare was coined to describe the measures that need to be taken to defend and attack information. This term, however, has military connotations – after all, warfare is normally their domain. Shortly after the term came into regular use, it was applied to a variety of situations encapsulated by Winn Schwartau as the f- lowing three classes of information warfare: Class 1: Personal information warfare Class 2: Corporate information warfare Class 3: Global information warfare Political sensitivities lead to “warfare” being replaced by the “operations”, a much more “politically correct” word. Unfortunately, “operations” also has an offensive connotation and is still the terminology of the military and gove- ments.
I-Way Robbery

I-Way Robbery

William C. Boni; Gerald L. Kovacich

Butterworth-Heinemann Ltd
1999
nidottu
I-Way Robbery is for security, investigative, law enforcement, and other criminal justice professionals, offering a unique look at the Internet as the new crime environment for the 21st century. The book provides an overview of the Internet, its impact on nations, societies, criminals, security officers, and law enforcement professionals, and includes recommended basic, protective measures. I-Way Robbery is written in non-technical terms. It is also an excellent reference for business and government agency managers who must understand their responsibilities as they relate to asset protection - especially those who have on and off ramps connected to the I-Way. Boni and Kovacich start with the basics and teach users about the internet before teaching them about the security risks. This addresses the subject from the non-information systems perspective and educates the average user about the overall risks and appropriate protective measures they should enforce and follow. This book is a must-have for anyone with an interest in the pitfalls and precautions of doing business on the internet. I-Way Robbery: Crime on the Internet, uniquely approaches the much talked about topic of Internet Crime and security. It is written for anyone who wants a basic understanding of the Internet crime environment now and into the 21st Century. It covers related Internet business, government, global, laws, politics and privacy issues; techniques being used to commit crimes; what can be done about it; and what challenges the future may hold including topics such as information warfare. Drawing on their decades of experience in high-technology and Internet crime investigations William Boni and Dr. Gerald L. Kovacich have written not only an excellent reference book for business and government agency managers, small business owners, and teachers, but for anyone who drives along the I-Way.
The Corporate Security Professional's Handbook on Terrorism

The Corporate Security Professional's Handbook on Terrorism

Edward Halibozek; Andy Jones; Gerald L. Kovacich

Butterworth-Heinemann Ltd
2007
nidottu
The Corporate Security Professional's Handbook on Terrorism is a professional reference that clarifies the difference between terrorism against corporations and their assets, versus terrorism against government assets. It addresses the existing misconceptions regarding how terrorism does or does not affect corporations, and provides security professionals and business executives with a better understanding of how terrorism may impact them. Consisting three sections, Section I provides an explanation of what terrorism is, its history, who engages in it, and why. Section II focuses on helping the security professional develop and implement an effective anti-terrorism program in order to better protect the employees and assets of the corporation. Section III discusses the future as it relates to the likelihood of having to deal with terrorism. The book provides the reader with a practitioner’s guide, augmented by a historical assessment of terrorism and its impact to corporations, enabling them to immediately put in place useful security processes and methods to protect their corporate interests against potential acts of terror. This is guide is an essential tool for preparing security professionals and company executives to operate in an increasingly hostile global business environment.
Gerald L. K. Smith

Gerald L. K. Smith

Glen Jeansonne; Leo P. Ribuffo

Louisiana State University Press
1997
nidottu
In the first full-length biography of evangelist Gerald L. K. Smith (1898-1976), Glen Jeansonne traces the tempestuous career of this notorious bigot. A spellbinding speaker and brilliant organiser, Smith founded the reactionary hate sheet The Cross and the Flag as well as the anti-Semitic Christian Nationalist Crusade and ran for president three times. Exhaustively researched, this study contains information from Smith's FBI dossier, his personal papers, and Smith himself. Also included are compelling arguments concerning the causes of anti-Semitism in America, the role of demagogues, and the mentality of their loyal supporters.