MARC details
000 -LEADER |
fixed length control field |
03340nam a2200505 i 4500 |
001 - CONTROL NUMBER |
control field |
9781947441668 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
BEP |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240726104637.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180612s2018 nyu foa 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781947441668 |
Qualifying information |
|
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CaBNVSL |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
CaBNVSL |
Modifying agency |
CaBNVSL |
050 04 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HD38 |
Item number |
.C686 2018 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Genderen, Dylan van, |
Relator term |
Author |
245 10 - TITLE STATEMENT |
Title |
Counterintelligence for corporate environmentsDylan van Genderen. |
246 30 - VARYING FORM OF TITLE |
Title proper/short title |
How to protect information and business integrity in the modern world |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York, New York (222 East 46th Street, New York, NY 10017) : |
Name of publisher, distributor, etc. |
Business Expert Press, |
Date of publication, distribution, etc. |
(c)2018. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (xv, 111 pages) |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
data file |
Source |
rda |
490 1# - SERIES STATEMENT |
Series statement |
Business law and corporate risk management collection, |
505 00 - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. The definition and history of counterintelligence -- |
Title |
2. The modern intelligence threat landscape -- |
-- |
3. The benefits of counterintelligence for corporate environments -- |
-- |
4. Counterintelligence screening and interviewing -- |
-- |
5. Security awareness and employee resilience -- |
-- |
About the author -- |
-- |
Index. |
520 3# - SUMMARY, ETC. |
Summary, etc. |
Volume I provides the reader with unique, comprehensive, and efficient methodologies that will change and improve corporate security and operational models to the highest degree possible. Through the extensive and sophisticated discipline of counterintelligence, readers will learn the vital importance of intelligence to the survival, efficiency, and well-being of any organization as well as a whole new approach to the protection of business intelligence and assets. Volume II discusses topics and illustrates strategies and procedures that have never before been used in the corporate field. Inspired by the concepts, strategies, and tactics that have been used by intelligence communities and specialized military forces for decades, this book aims to improve and safeguard every component of a corporate environment through the adaptation and modification of the same strategies employed by these specialized entities. Through this book, managers, security officers, consultants, and entire corporate environments will have the knowledge and skills necessary in order to change the entire dynamic of security applications in the present day and will be able to integrate advanced and highly efficient counterintelligence models in order to combat the extensive modern threat landscape. |
530 ## - COPYRIGHT INFORMATION: |
COPYRIGHT INFORMATION |
COPYRIGHT NOT covered - Click this link to request copyright permission: |
Uniform Resource Identifier |
<a href="b">b</a> |
530 ## - COPYRIGHT INFORMATION: |
COPYRIGHT INFORMATION |
|
538 ## - SYSTEM DETAILS NOTE |
System details note |
Mode of access: World Wide Web. |
538 ## - SYSTEM DETAILS NOTE |
System details note |
System requirements: Adobe Acrobat reader. |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Title from PDF title page (viewed on June 12, 2018). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Business intelligence. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Corporations |
General subdivision |
Security measures. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
business integrity |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
corporate environments |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
counterintelligence |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
cybersecurity |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
information protection |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
intelligence |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
IT |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
operations |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
planning |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
risk management |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
security |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
|
DONATED BY: |
|
VENDOR |
Business Expert Press |
Classification part |
HD38.7 |
PUBLICATION YEAR |
(c)2018 |
LOCATION |
|
REQUESTED BY: |
|
-- |
|
-- |
NFIC |
-- |
Cynthia Snell |
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN) |
a |
1 |
b |
Cynthia Snell |
c |
1 |
d |
Cynthia Snell |