000 03340nam a2200505 i 4500
001 9781947441668
003 BEP
005 20240726104637.0
008 180612s2018 nyu foa 001 0 eng d
020 _a9781947441668
_q((electronic)l(electronic)ctronic)-book
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 0 4 _aHD38
_b.C686 2018
100 1 _aGenderen, Dylan van,
_e1
245 1 0 _aCounterintelligence for corporate environmentsDylan van Genderen.
246 3 0 _aHow to protect information and business integrity in the modern world
250 _aFirst edition.
260 _aNew York, New York (222 East 46th Street, New York, NY 10017) :
_bBusiness Expert Press,
_c(c)2018.
300 _a1 online resource (xv, 111 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
_2rda
490 1 _aBusiness law and corporate risk management collection,
505 0 0 _a1. The definition and history of counterintelligence --
_t2. The modern intelligence threat landscape --
_t3. The benefits of counterintelligence for corporate environments --
_t4. Counterintelligence screening and interviewing --
_t5. Security awareness and employee resilience --
_tAbout the author --
_tIndex.
520 3 _aVolume I provides the reader with unique, comprehensive, and efficient methodologies that will change and improve corporate security and operational models to the highest degree possible. Through the extensive and sophisticated discipline of counterintelligence, readers will learn the vital importance of intelligence to the survival, efficiency, and well-being of any organization as well as a whole new approach to the protection of business intelligence and assets. Volume II discusses topics and illustrates strategies and procedures that have never before been used in the corporate field. Inspired by the concepts, strategies, and tactics that have been used by intelligence communities and specialized military forces for decades, this book aims to improve and safeguard every component of a corporate environment through the adaptation and modification of the same strategies employed by these specialized entities. Through this book, managers, security officers, consultants, and entire corporate environments will have the knowledge and skills necessary in order to change the entire dynamic of security applications in the present day and will be able to integrate advanced and highly efficient counterintelligence models in order to combat the extensive modern threat landscape.
530 _a2
_ub
530 _aAlso available in printing.
538 _aMode of access: World Wide Web.
538 _aSystem requirements: Adobe Acrobat reader.
588 _aTitle from PDF title page (viewed on June 12, 2018).
650 0 _aBusiness intelligence.
650 0 _aCorporations
_xSecurity measures.
653 _abusiness integrity
653 _acorporate environments
653 _acounterintelligence
653 _acybersecurity
653 _ainformation protection
653 _aintelligence
653 _aIT
653 _aoperations
653 _aplanning
653 _arisk management
653 _asecurity
942 _c1
_D
_eBEP
_hHD38.7
_m(c)2018
_QOB
_R
_x
_8NFIC
_dCynthia Snell
999 _c73555
_d73555
902 _a1
_bCynthia Snell
_c1
_dCynthia Snell