Counterintelligence for corporate environmentsDylan van Genderen.
Material type: TextSeries: Publication details: New York, New York (222 East 46th Street, New York, NY 10017) : Business Expert Press, (c)2018.Edition: First editionDescription: 1 online resource (xv, 111 pages)Content type:- text
- computer
- online resource
- 9781947441668
- How to protect information and business integrity in the modern world
- HD38 .C686 2018
- COPYRIGHT NOT covered - Click this link to request copyright permission: https://lib.ciu.edu/copyright-request-form
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library | Non-fiction | HD38.7 (Browse shelf(Opens below)) | Available | 9781947441668 |
Browsing G. Allen Fleece Library shelves, Collection: Non-fiction Close shelf browser (Hides shelf browser)
1. The definition and history of counterintelligence -- 2. The modern intelligence threat landscape -- 3. The benefits of counterintelligence for corporate environments -- 4. Counterintelligence screening and interviewing -- 5. Security awareness and employee resilience -- About the author -- Index.
Volume I provides the reader with unique, comprehensive, and efficient methodologies that will change and improve corporate security and operational models to the highest degree possible. Through the extensive and sophisticated discipline of counterintelligence, readers will learn the vital importance of intelligence to the survival, efficiency, and well-being of any organization as well as a whole new approach to the protection of business intelligence and assets. Volume II discusses topics and illustrates strategies and procedures that have never before been used in the corporate field. Inspired by the concepts, strategies, and tactics that have been used by intelligence communities and specialized military forces for decades, this book aims to improve and safeguard every component of a corporate environment through the adaptation and modification of the same strategies employed by these specialized entities. Through this book, managers, security officers, consultants, and entire corporate environments will have the knowledge and skills necessary in order to change the entire dynamic of security applications in the present day and will be able to integrate advanced and highly efficient counterintelligence models in order to combat the extensive modern threat landscape.
COPYRIGHT NOT covered - Click this link to request copyright permission:
https://lib.ciu.edu/copyright-request-form
Mode of access: World Wide Web.
System requirements: Adobe Acrobat reader.
Title from PDF title page (viewed on June 12, 2018).
There are no comments on this title.