Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Title Copyright Acknowledgements About the Author Abbreviations Foreword Contents Chapter 1: Becoming an Entrepreneur in the Security Business
1.1 Context 1.2 Competitive intelligence 1.3 Linking business intelligence to our operating environment 1.4 Examining appropriate intellectual property rights (IPR) in order to protect business ideas and enterprise 1.5 Emerging markets 1.6 Targeting consumer markets and marketing 1.7 Business funding 1.8 Reviewing operations management 1.9 Business networking 2.0 Social media marketing 2.1 Negotiation 2.2 Company structures, corporate returns and regulation References
Chapter 2: Becoming a Developed Security Manager
2.1 Context 2.2 Role of security director 2.4 Fitting security into a wider context of resilience 2.5 Sub-disciplines of organisational resilience: Security, emergency planning and business continuity 2.6 Management and balancing important priorities 2.7 Adding value: Developing the business that clients require 2.8 Why do businesses fail? 2.9 The requirement for professional proficiency References
Chapter 3: Security Legislation and Regulation
3.1 Context 3.2 Types of law in UK 3.3 UK human rights laws 3.4 Other UK laws relating to security management 3.5 Other UK laws relating to corporate management and workplaces 3.6 International law, conflict and human rights 3.7 Prominent business laws related to international business References VIDEOS
Chapter 4: Private Investigations
4.1 Context 4.2 Role of private investigators 4.3 Affidavits and process serving 4.4 Tracing missing people 4.5 Surveillance techniques 4.6 Technical surveillance 4.7 Witness statements 4.8 Crime scene analysis 4.9 Evidence: What is it? Why is evidence so flawed? References
Chapter 5: Information Security
5.1 Context 5.2 Why target our information? 5.3 Intelligence and espionage 5.4 Internal risks 5.5 Cyber security 5.6 Mitigation: Developing a security policy References
Chapter 6: Protective Security
6.1 Context 6.2 Methods of risk assessment 6.3 How to conduct a person-focused threat assessment 6.4 Ethos and expectations of protective security roles; ‘adaptive practitioners’ 6.5 Anti-piracy; market, counter-measures and agencies 6.6 Firearms 6.7 Managing people in protective security environments References
Chapter 7: Safe Business Travel
7.1 Context 7.2 Government help and basics 7.3 Before you go: Safety and security tips 7.4 Reporting and responding to crime in-country 7.5 Business travel insurance 7.6 Kidnap for ransom, kidnap and countermeasures 7.7 Corporate liability laws and business travel 7.8 Protective security approaches to travel security 7.9 Due diligence References
Chapter 8: Personal and Organisational Resilience
8.1 Context 8.2 Personal resilience 8.3 Personal resilience initiatives in the workplace 8.4 Developing team resilience from personal resilience techniques 8.5 Crisis management and personal resilience 8.6 Crisis management and communications 8.7 Social media and crisis management 8.8 Crisis management standards and guidance References
ITG Resources
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion