Search in ISMS Guides

Google
 

Saturday, September 1, 2007

Risk Analysis and the Security Survey, Third Edition (Hardcover)

Risk Analysis and the Security Survey, Third Edition (Hardcover)

Order Now


Product Details
  • Hardcover: 392 pages
  • Publisher: Butterworth-Heinemann; 3 edition (February 22, 2006)
  • Language: English
  • ISBN-10: 0750679220
  • ISBN-13: 978-0750679220
  • Product Dimensions: 10.3 x 7.4 x 1.2 inches
Editorial Reviews
Review
Security is an element of risk management, asserts James F. Broder in the third edition of his classic Risk Analysis and the Security Survey. And he ably backs up that statement in this wonderfully written book, which should be required reading for all current and future security professionals.-Jerry D. Loghry, Security Management, March 2007

Review
'...it provides the reader with a thorough understanding of the vital subjects of risk analysis and the art/science of conducting and producing effective, results-oriented security surveys. It is written to meet the needs of security professionals from student to master. Broder and his contributing authors have addressed today's changes while retaining the spirit, quality, and fundamental principles described in the first edition. As we evolve into an information based society, the principles and advice in this book will serve the reader well, particularly when dealing with the increasing demands of asset protection, information protection, high technology issues, terrorism, and unkown risks. An excellent book in its original iteration, this edition is far superior to the first. It is highly recommended both an as excellent resource and as a study aid the CPP examination.' - Security Management

This text sets out to understand the principles of risk analysis and to relate these to security students and professionals. Its aim is to help those individuals produce more effective results-oriented security surveys geared to the ever-changing needs of the organization. -The Computer Law and Security Report

The text takes the reader through the relevant issues based on a fundamental philosophy of risk control that the program should be as self-sufficient as possible in all matters pertaining to security. -The Computer Law and Security Report

As a study text for those involved in security risk analysis this book would be an important addition to a professional's library, but it would also be very valuable to an investigator involved in post-incident investigations. -The Institute of Professional Investigators

The 1984 edition was still in the ASIS "top-ten" before the compilation of this volume, indicating what security professionals think of it's value as a security text book. -The Institute of Professional Investigators --This text refers to an out of print or unavailable edition of this title.

Book Description
Security and risk management are principally concerned with the protection and conservation of corporate assets and resources. The task of protection continues to be an increasingly complex one in a time when technology is creating new products (and thus risk) at an explosive rate. Add this to the crime rate -- now aggravated by domestic and international terrorism -- and the importance of risk analysis and evaluation to design proper protection becomes self-evident.

With an awareness of the growing threat of global terrorism, the third edition of RISK ANALYSIS AND THE SECURITY SURVEY has been completely updated. It includes two new chapters covering disaster recover planning, mitigation, and the evolving methodologies that are a result of the Homeland Security Act. The following topics will also be added and covered among the various chapters: contingency planning, testing of disaster response plan, managing during a crisis, maintaining and testing a response plan (team drills, etc.), bomb threats and suicide bombings, and prevention techniques to better prepare business for new post 9/11 security risks.

- Covers Business Impact Analysis (BIA), Project Planning, Data Collection, Data Analysis and Report of Findings, and Prediction of Criminal Behavior
- Presents updated statistical information and practical case examples
- Helps professionals and students produce more effective results-oriented security surveys

Card catalog description
"Risk Analysis and the Security Survey, Second Edition provides an understanding of the principles of risk analysis to security students and professionals. It will help them produce more effective, results-oriented security surveys geared to the ever-changing needs of the organization."--BOOK JACKET. "The most fundamental philosophy of risk control, design, and implementation is to make the program as self-sufficient as possible in all matters pertaining to security. This includes the two-sided coin of risk control: (1) the protection of assets by identifying, analyzing, and prioritizing the risk, and (2) contingency and disaster recovery planning."--BOOK JACKET. --This text refers to an out of print or unavailable edition of this title.

About the Author
James F. Broder, CFE, CPP, BCFE, has more than 35 years experience in security and law enforcement. He has worked as a security executive, instructor, and consultant as well as having served in Vietnam as a Police Advisor in the Counter Insurgency Directorate, Vietnamese National Police. A former FBI Special Agent and employee for the US State Department, Mr. Border is considered to be one of the most highly recognized security authorities in the United States.


Table of Content

Acknowledgments
Introdution
1.RISK
2.VULNERBILITY AND THREAT IDENTIFICATION
3.RISK MEASUREMENT
4.QUANTIFYING AND PRIORITIZING LOSS POTENTIAL
5.COST/BENEFIT ANALYSIS
6.THE SECURITY SURVEY: AN OVERVIEW
7.MANAGEMENT AUDIT TECHNIQUES AND THE PRELIMINARY SURVEY
8.THE SURVEY REPORT
9.CRIME PREDICTION
10.DETERMINING INSURANCE REQUIREMENTS
11.BUSINESS IMPACT ANALYSIS
12.BUSINESS CONTINUITY PLANNING
13.PLAN DOCUMENTATION
14.RESPONSE PLANNING
15.CRSIS MANADEMENT PLANNING FOR KINDNAP, EXTORTION, OR RANDOM
16.MONITORING SAFEGUARDS
17.THE SECURITY CONSULTANT

APPENDICES
A. Security Survey Work Sheets
B. Danger Signs of Fraud, Embezzlement, and Theft
C. Professional Pratices for Bisiness Continuity Plan
D. Sample BIA Introdution Letter
E. Sample Kindnap and Random Contingency Plan
F. How to Establish Notice
G. Handling Media Inquiries
H. Security System Specifications
I. Sample Introdution Memorandum: Disaster Recovery Planning
Index

2 comments:

Teri said...

Nice Blog :)

forfin said...

Thank you for your comment ^ ^ .