Protective security : creating military-grade defenses for your digital business / Jim Seaman.

This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-crit...

Full description

Saved in:
Bibliographic Details
Main Author: Seaman, Jim (Author)
Format: eBook
Language:English
Published: [Berkeley] : Apress, [2021]
Subjects:
Online Access:Click for online access
Table of Contents:
  • Chapter 1: Introduction
  • Chapter 2: What is Protective Security (PS)?
  • Chapter 3: Protective Security (PS) in Terms of the Legal and Regulatory Considerations for the Digital Business
  • Chapter 4: The Integration of Compliance with Protection Security(PS)
  • Chapter 5: Developing a Protective Security Strategy
  • Chapter 6: Cyber Security and the Digital Business
  • Chapter 7: Network/IT Security in Protective Security (PS)
  • Chapter 8: Information Systems Security
  • Chapter 9: Physical Security
  • Chapter 10: Industrial Systems Protective Security
  • Chapter 11: Securing Your Supply Chain
  • Chapter 12: Developing Your Human Firewall
  • Chapter 13: Strict Access Restrictions
  • Chapter 14: Building Resilience
  • Chapter 15: Demonstrating the Protective Security Return on Investment (ROI)
  • Appendix A: A Lifetime in Protective Security
  • Appendix B: A Chronology of Protective Security Development.