Business, Management, and Public Administration

Page 35

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Protecting Employees and Assets in Volatile Regions

Port Security Management

Scott Alan Ast

Kenneth Christopher

Security Professional, Olathe, Kansas, USA

Park University, Parkville, Missouri, USA

Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI-recognized subject matter expert, this text details the recommended protocol for protecting people and assets in hostile global settings. Scott Alan Ast offers wisdom and insight gleaned from 28 years of hands-on experience in international security management. He supplies the fundamental understanding and advanced tools required to ensure business is conducted safely regardless of the risk level, identifying the various threats that loom in international projects, and walking readers through a logical framework to design and implement a safety and security program.

Focusing on organizational structure, risk and vulnerability analysis, and operations oversight, this book explores security management in the port facility environment. It begins with a historical perspective on maritime and port security and contextualizes the management of risk assessment and the unique vulnerabilities found within the maritime and port sector. Balancing the needs of business and homeland safety, the book addresses the ground-level issues, tasks, and responsibilities that must be handled by the security manager in concert with the port director and law enforcement. It also addresses cargo security, personnel security, guard force management, and the role of technology.

Catalog no. K10256, ISBN: 978-1-4398-0467-4 August 2009, 6-1/8 x 9-1/4, 366 pp. Suggested Price: $79.95 / £49.99

Catalog no. AU6892, ISBN: 978-1-4200-6892-4 March 2009, 7 x 10, 336 pp. Suggested Price: $89.95 / £54.99

Mechanics of User Identification and Authentication Fundamentals of Identity Management

A Practical Guide to Security Assessments

Dobromir Todorov

Sudhanshu Kairab

Consultant, Buckinghamshire, UK

Amper, Politziner, & Mattia, P.C., New Jersey, USA

Effective and fool-proof user identification and authentication are essential to modern security. Providing a hacker perspective, this text introduces the philosophy behind user authentication and access control and presents key concepts for practical applications. It outlines the process of controlled access to resources through authentication, authorization, and accounting and provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is presented with a specific authentication scenario.

Taking a process-focused approach, A Practical Guide to Security Assessments presents a structured methodology for conducting assessments. The key element of the methodology is an understanding of business goals and processes, and how security measures are aligned with business risks. The guide also emphasizes that resulting security recommendations should be cost-effective and commensurate with the security risk. The methodology described serves as a foundation for building and maintaining an information security program. The book includes an appendix with questionnaires that can be modified and used to conduct security assessments.

Catalog no. AU5219, ISBN: 978-1-4200-5219-0 June 2007, 6-1/8 x 9-1/4, 760 pp. Suggested Price: $83.95 / £53.99

Catalog no. AU1706, ISBN: 978-0-8493-1706-4 September 2004, 6-1/8 x 9-1/4, 520 pp. Suggested Price: $83.95 / £53.99

Textbook

Organizational Crisis Management

Private Security and the Investigative Process

The Human Factor

Third Edition

Gerald Lewis

Charles P. Nemeth

COMPASS, Framingham, Massachusetts, USA

California University of Pennsylvania, USA

Organizational Crisis Management: The Human Factor offers a theoretical background and practical strategies for responding to workplace crises. Responding to a paradigm that focuses on the operational aspects of continuity to the detriment of human factors, this volume provides a comprehensive understanding of the unavoidable yet often complex reactions of people to a wide array of organizational disruptions. Based upon the author’s vast experience in the field, this book is a “nuts and bolts” resource that you can immediately apply to a wide range of organizational environments. The book also looks at legal and security aspects of workplace disruption.

Now in its third edition, this highly popular resource covers best-practice techniques and little-known trade secrets that are applicable for use in public law enforcement and private sector and corporate security investigations. It offers insight into the various elements and activities that make up a thorough, professional investigation. This edition has been completely updated to include emerging technology and revised legal and practical considerations regarding interviewing, as well as additional information on case evaluation and an overview of the investigative process. An instructor’s manual with PowerPoint® slides is available with qualifying course adoption.

Catalog no. AU3962, ISBN: 978-0-8493-3962-2 March 2006, 6-1/8 x 9-1/4, 208 pp. Suggested Price: $83.95 / £53.99

Catalog no. AU8569, ISBN: 978-1-4200-8569-3 February 2010, 7 x 10, 272 pp. Suggested Price: $69.95 / £44.99

Security Management

Managing Security Overseas

33


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.