- Shopping Bag ( 0 items )
From the Publisher… by following the guidance laid out in this detailed book, security managers can do it themselves with software that’s probably already on their office computers: Microsoft Excel. … There is no doubt that Norman himself spent considerable time devising the process, which he presents in the book. He provides step-by-step lists for building various matrices … definitely a book for the advanced security practitioner. … it outlined an excellent methodology and is well worth the effort required to read it and work through the process outlined by the author.
— Glen Kitteringham, CPP, President of Kitteringham Security Group Inc., in Security Management, January 2011