This book gathers the papers presented at the XXIX International Congress INGEGRAF "e;The digital transformation in graphic engineering,"e; which was held in Logrono, Spain on June 20-21, 2019.
Global Value Chains and Production Networks: Case Studies of Siemens and Huawei presents theories and frameworks that facilitate the evolution of GPN studies, from macro perspectives based on territory and industry to the use of micro (firm-level) data.
Effective Security Management, Seventh Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management.
This book guides readers through the broad field of generic and industry-specific management system standards, as well as through the arsenal of tools that are needed to effectively implement them.
This book constructs a model of the knowledge value chain in the university and analyzes the university knowledge value-added mechanism in the process of Industry-University Collaborative Innovation.
Fashion Supply Chain Management Using Radio Frequency Identification (RFID) Technologies looks at the application of RFID technologies in such areas as order allocation, garment manufacturing, product tracking, distribution and retail.
The Only Complete Technical Primer for MDM Planners, Architects, and Implementers Companies moving toward flexible SOA architectures often face difficult information management and integration challenges.
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response.
Successes and Failures of Knowledge Management highlights examples from across multiple industries, demonstrating where the practice has been implemented well-and not so well-so others can learn from these cases during their knowledge management journey.
From Corporate Security to Commercial Force: A Business Leader's Guide to Security Economics addresses important issues, such as understanding security related costs, the financial advantages of security, running an efficient security organization, and measuring the impact of incidents and losses.
Security Metrics Management, Measuring the Effectiveness and Efficiency of a Security Program, Second Edition details the application of quantitative, statistical, and/or mathematical analyses to measure security functional trends and workload, tracking what each function is doing in terms of level of effort (LOE), costs, and productivity.
Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry.
Women in the Security Profession: A Practical Guide for Career Development is a resource for women considering a career in security, or for those seeking to advance to its highest levels of management.
Maritime Security: An Introduction, Second Edition, provides practical, experience-based, and proven knowledge - and a "e;how-to-guide"e; - on maritime security.
Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact.
Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems.
Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible assets, and people.
In corporate security today, while the topic of information technology (IT) security metrics has been extensively covered, there are too few knowledgeable contributions to the significantly larger field of global enterprise protection.
Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management.
Workplace Safety: Establishing an Effective Violence Prevention Program includes a powerful model on how to overcome organizational rationalization, objection, and denial when confronted with proposing a workplace violence protection program.
According to Pinkerton-the leading provider of risk management services in the world-workplace violence is second only to cybersecurity as the top threat faced by organizations today.
Security Operations Management, 3rd edition, is the latest edition the seminal reference on corporate security management operations for today's security management professionals and students.
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face.
Biosecurity and Bioterrorism, Second Edition, takes a holistic approach to biosecurity, with coverage of pathogens, prevention, and response methodology.
Security Litigation: Best Practices for Managing and Preventing Security-Related Lawsuits provides practical guidance and examples on how to deal with the most difficult legal issues that security executives face every day, also exploring the key issues that occur before, during, and after a lawsuit.
Operational Policy Making for Professional Security: Practical Policy Skills for the Public and Private Sector is a clear, concise, and practical resource for drafting effective, legally defensible security policies.
Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization.
How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand?
How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand?
How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand?
Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or managerial positions.
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools.
Cybercrime and Business: Strategies for Global Corporate Security examines the three most prevalent cybercrimes afflicting today's corporate security professionals: piracy, espionage, and computer hacking.
The Manager's Handbook for Business Security is designed for new or current security managers who want build or enhance their business security programs.
Security Litigation: Best Practices for Managing and Preventing Security-Related Lawsuits provides practical guidance and examples on how to deal with the most difficult legal issues that security executives face every day, also exploring the key issues that occur before, during, and after a lawsuit.
This research report presents the findings of a broad survey of corporate security programs conducted by the Security Executive Council's Security Leadership Research Institute (SLRI).
The International Security Programs Benchmark Report presents and analyzes the findings of a broad survey conducted by the Security Executive Council of corporate international security programs.
Immer mehr Unternehmen entdecken Massive Open Online Courses, kurz: MOOCs als Format für Aus- und Weiterbildung, Training, Rekrutierung und Onboarding.
This book presents a study of so-called indie video game developers that are widely regarded as the creative and innovative fringe of the video game industry.
Global Production is the first book to provide a fully comprehensive overview of the complicated issues facing multinational companies and their global sourcing strategies.
Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management.