Amazon cover image
Image from Amazon.com

Counterintelligence for corporate environmentsDylan van Genderen.

By: Material type: TextTextSeries: Publication details: New York, New York (222 East 46th Street, New York, NY 10017) : Business Expert Press, (c)2018.Edition: First editionDescription: 1 online resource (xv, 111 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781947441668
Other title:
  • How to protect information and business integrity in the modern world
Subject(s): LOC classification:
  • HD38 .C686 2018
Available additional physical forms:
Contents:
2. The modern intelligence threat landscape -- 3. The benefits of counterintelligence for corporate environments -- 4. Counterintelligence screening and interviewing -- 5. Security awareness and employee resilience -- About the author -- Index.
Abstract: Volume I provides the reader with unique, comprehensive, and efficient methodologies that will change and improve corporate security and operational models to the highest degree possible. Through the extensive and sophisticated discipline of counterintelligence, readers will learn the vital importance of intelligence to the survival, efficiency, and well-being of any organization as well as a whole new approach to the protection of business intelligence and assets. Volume II discusses topics and illustrates strategies and procedures that have never before been used in the corporate field. Inspired by the concepts, strategies, and tactics that have been used by intelligence communities and specialized military forces for decades, this book aims to improve and safeguard every component of a corporate environment through the adaptation and modification of the same strategies employed by these specialized entities. Through this book, managers, security officers, consultants, and entire corporate environments will have the knowledge and skills necessary in order to change the entire dynamic of security applications in the present day and will be able to integrate advanced and highly efficient counterintelligence models in order to combat the extensive modern threat landscape.
List(s) this item appears in: IZZY- duplicates
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

1. The definition and history of counterintelligence -- 2. The modern intelligence threat landscape -- 3. The benefits of counterintelligence for corporate environments -- 4. Counterintelligence screening and interviewing -- 5. Security awareness and employee resilience -- About the author -- Index.

Volume I provides the reader with unique, comprehensive, and efficient methodologies that will change and improve corporate security and operational models to the highest degree possible. Through the extensive and sophisticated discipline of counterintelligence, readers will learn the vital importance of intelligence to the survival, efficiency, and well-being of any organization as well as a whole new approach to the protection of business intelligence and assets. Volume II discusses topics and illustrates strategies and procedures that have never before been used in the corporate field. Inspired by the concepts, strategies, and tactics that have been used by intelligence communities and specialized military forces for decades, this book aims to improve and safeguard every component of a corporate environment through the adaptation and modification of the same strategies employed by these specialized entities. Through this book, managers, security officers, consultants, and entire corporate environments will have the knowledge and skills necessary in order to change the entire dynamic of security applications in the present day and will be able to integrate advanced and highly efficient counterintelligence models in order to combat the extensive modern threat landscape.

COPYRIGHT NOT covered - Click this link to request copyright permission:

https://lib.ciu.edu/copyright-request-form

Mode of access: World Wide Web.

System requirements: Adobe Acrobat reader.

Title from PDF title page (viewed on June 12, 2018).

There are no comments on this title.

to post a comment.