Counterintelligence for corporate environmentsDylan van Genderen. (Record no. 73555)

MARC details
000 -LEADER
fixed length control field 03340nam a2200505 i 4500
001 - CONTROL NUMBER
control field 9781947441668
003 - CONTROL NUMBER IDENTIFIER
control field BEP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240726104637.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180612s2018 nyu foa 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781947441668
Qualifying information
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HD38
Item number .C686 2018
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Genderen, Dylan van,
Relator term Author
245 10 - TITLE STATEMENT
Title Counterintelligence for corporate environmentsDylan van Genderen.
246 30 - VARYING FORM OF TITLE
Title proper/short title How to protect information and business integrity in the modern world
250 ## - EDITION STATEMENT
Edition statement First edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York, New York (222 East 46th Street, New York, NY 10017) :
Name of publisher, distributor, etc. Business Expert Press,
Date of publication, distribution, etc. (c)2018.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xv, 111 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type data file
Source rda
490 1# - SERIES STATEMENT
Series statement Business law and corporate risk management collection,
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note 1. The definition and history of counterintelligence --
Title 2. The modern intelligence threat landscape --
-- 3. The benefits of counterintelligence for corporate environments --
-- 4. Counterintelligence screening and interviewing --
-- 5. Security awareness and employee resilience --
-- About the author --
-- Index.
520 3# - SUMMARY, ETC.
Summary, etc. Volume I provides the reader with unique, comprehensive, and efficient methodologies that will change and improve corporate security and operational models to the highest degree possible. Through the extensive and sophisticated discipline of counterintelligence, readers will learn the vital importance of intelligence to the survival, efficiency, and well-being of any organization as well as a whole new approach to the protection of business intelligence and assets. Volume II discusses topics and illustrates strategies and procedures that have never before been used in the corporate field. Inspired by the concepts, strategies, and tactics that have been used by intelligence communities and specialized military forces for decades, this book aims to improve and safeguard every component of a corporate environment through the adaptation and modification of the same strategies employed by these specialized entities. Through this book, managers, security officers, consultants, and entire corporate environments will have the knowledge and skills necessary in order to change the entire dynamic of security applications in the present day and will be able to integrate advanced and highly efficient counterintelligence models in order to combat the extensive modern threat landscape.
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION COPYRIGHT NOT covered - Click this link to request copyright permission:
Uniform Resource Identifier <a href="b">b</a>
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat reader.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF title page (viewed on June 12, 2018).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business intelligence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Corporations
General subdivision Security measures.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term business integrity
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term corporate environments
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term counterintelligence
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cybersecurity
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term information protection
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term intelligence
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term IT
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term operations
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term planning
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term risk management
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term security
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type
DONATED BY:
VENDOR Business Expert Press
Classification part HD38.7
PUBLICATION YEAR (c)2018
LOCATION
REQUESTED BY:
--
-- NFIC
-- Cynthia Snell
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN)
a 1
b Cynthia Snell
c 1
d Cynthia Snell
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
        Non-fiction G. Allen Fleece Library G. Allen Fleece Library   03/20/2023 Business Expert Press   HD38.7 9781947441668 03/20/2023 03/20/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)