Risk Analysis and the Security Survey / Edition 4

Hardcover (Print)
Rent
Rent from BN.com
$17.41
(Save 75%)
Est. Return Date: 11/18/2014
Used and New from Other Sellers
Used and New from Other Sellers
from $52.46
Usually ships in 1-2 business days
(Save 25%)
Other sellers (Hardcover)
  • All (10) from $52.46   
  • New (8) from $52.46   
  • Used (2) from $79.94   

Overview

As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of Risk Analysis and the Security Survey. Broder and Tucker guide you throughanalysis toimplementationto provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updating and covering new content. Understand the most fundamental theories surrounding risk control, design, and implementation by reviewing topics such as cost/benefit analysis, crime prediction, response planning, and business impact analysis--all updated to match today's current standards.

This book will show you how to develop and maintain current business contingency and disaster recovery plans to ensure your enterprises are able to sustain loss are able to recover, and protect your assets, be it your business, your information,or yourself,from threats.

*Offers powerful techniques for weighing and managing the risks that face your organization *Gives insights into universal principles that can be adapted to specific situations and threats *Covers topics needed by homeland security professionals as well as IT and physical security managers

Audience: Security professionals and students.

Read More Show Less

Editorial Reviews

From the Publisher

"Managing risk in today’s rapidly changing corporate environment is challenging. James Broder and Eugene Tucker take much of the guesswork out of this challenge with Risk Analysis and the Security Survey…From cover to cover, this is a valuable resource for security professionals at all career stages."--Security Management, January 2013 "When the lst edition of this book was published, back in the 1980s, it became an instant success. Today, many years later, it stands as a classic, used by security professionals, college professors, and students around the world. This new edition addresses the problems every security executive might one day face regarding Disaster Recovery. Broder tells us how to identify and deal with these threats and vulnerabilities as well as what to do if, in spite of our best efforts, disaster strikes. This book is, without doubt, the best of its kind on the market. The contents of this book are virtually priceless and I’m so bold as to suggest that without it, a security professional’s library is incomplete."--Charles (Chuck) Sennewald, CPP, CSC "Jim Broder and Eugene Tucker have done it again--another fine reference for the serious-minded security professional."-- John Fay, Learning Shop USA

Booknews
Updating the 1984 edition, a security authority advocates a three- pronged approach to the fraud and abuse that costs US businesses some $400 billion annually: minimize security risks; minimize loss in the event a breach occurs; and develop/keep current contingency and disaster recovery plans. Appends security survey worksheets and information on danger signs of fraud, embezzlement, and theft; professional practices and resources for business continuity planners; sample introduction letters; a sample kidnap and ransom contingency plan; handling media inquiries; and security system specifications. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9780123822338
  • Publisher: Elsevier Science
  • Publication date: 1/20/2012
  • Edition description: New Edition
  • Edition number: 4
  • Pages: 368
  • Sales rank: 373,259
  • Product dimensions: 7.60 (w) x 9.40 (h) x 1.20 (d)

Meet the Author

James F. Broder, CFE, CPP, FACFE, has more than 40 years experience in security and law enforcement. He has worked as a security executive, instructor, and consultant as well as having served in Vietnam as a Police Advisor in the Counter Insurgency Directorate, Vietnamese
National Police. A former FBI Special Agent and employee for the US State Department, U.S. House of Representatives, Washington D.C. Mr. Broder is considered to be one of the most highly respected security authorities in the United States.

Eugene Tucker, CBCP, CCM, CPP, CFE, CHST has extensive international experience as a corporate manager, investigator, trainer and consultant in security, safety, and business continuity planning. He is the coauthor of "Risk Analysis and the Security Survey" (recognized as a primary source text in the security field). He has completed numerous security vulnerability assessments for Fortune 500 companies as well as for major California water and wastewater districts. His article on security training (Security Management Magazine, July 1990) was acclaimed as a "substantial first step in developing productive relationships between vocational schools and the security industry." He was the coordinator of the Emergency Management seminar program at Santa Clara University and is a member of the Technical Advisory Committee of the Professional Security Officer series (Emergency Film Group). He has written and helped to implement over 100 comprehensive emergency response, business continuity, crisis management and management succession plans. He designed the alarm system for a famous landmark, developed an intelligence program that tracked the plans and activities of dissident groups in the San Francisco Bay Area and completed a terrorism assessment and security program for the nation's second largest winery.

Mr. Tucker is a Certified Protection Professional, (CPP), with a specialty area in Disaster Planning issued by the American Society for Industrial Security, a Certified Fraud Examiner (CFE), a Certified Business Continuity Planner (CBCP) and a Construction Health and Safety Technician (CHST) issued by the Council on Certification of Health, Environmental and Safety Technologists), and a Certified Continuity Manager -ISO 22301 Lead Implementer. He also holds a State of California Adult Education Teaching Credential.

Read More Show Less

Table of Contents

Part I: The Treatment and Analysis of Risk Chapter 1: Risk Chapter 2: Vulnerability and Threat Identification Chapter 3: Risk Measurement Chapter 4: Quantifying and Prioritizing Loss Potential Chapter 5: Cost/Benefit Analysis Chapter 6: Other Risk Analysis Methodologies Chapter 7: The Security Survey: An Overview Chapter 8: Management Audit Techniques and the Preliminary Survey Chapter 9: The Survey Report Chapter 10: Crime Prediction Chapter 11: Determining Insurance Requirements Part II: Emergency Managment and Business Continuity Planning Chapter 12: Emergency Management: A Brief Introduction Chapter 13: Mitigation and Preparedness Chapter 14: Response Planning Chapter 15: Business Impact Analysis Chapter 16: Business Continuity Planning Chapter 17: Plan Documentation Chapter 18: Crisis Management Planning for Kidnap, Ransom, and Extortion Chapter 19: Monitoring Safeguards Chapter 20: The Security Consultant

Appendix A: Security Survey Work Sheets

Appendix B: Sample Kidnap and Ransom Contingency Plan

Appendix C: Security Systems Specifications

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)