000 | 03340nam a2200505 i 4500 | ||
---|---|---|---|
001 | 9781947441668 | ||
003 | BEP | ||
005 | 20240726104637.0 | ||
008 | 180612s2018 nyu foa 001 0 eng d | ||
020 |
_a9781947441668 _q((electronic)l(electronic)ctronic)-book |
||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 0 | 4 |
_aHD38 _b.C686 2018 |
100 | 1 |
_aGenderen, Dylan van, _e1 |
|
245 | 1 | 0 | _aCounterintelligence for corporate environmentsDylan van Genderen. |
246 | 3 | 0 | _aHow to protect information and business integrity in the modern world |
250 | _aFirst edition. | ||
260 |
_aNew York, New York (222 East 46th Street, New York, NY 10017) : _bBusiness Expert Press, _c(c)2018. |
||
300 | _a1 online resource (xv, 111 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_adata file _2rda |
||
490 | 1 | _aBusiness law and corporate risk management collection, | |
505 | 0 | 0 |
_a1. The definition and history of counterintelligence -- _t2. The modern intelligence threat landscape -- _t3. The benefits of counterintelligence for corporate environments -- _t4. Counterintelligence screening and interviewing -- _t5. Security awareness and employee resilience -- _tAbout the author -- _tIndex. |
520 | 3 | _aVolume I provides the reader with unique, comprehensive, and efficient methodologies that will change and improve corporate security and operational models to the highest degree possible. Through the extensive and sophisticated discipline of counterintelligence, readers will learn the vital importance of intelligence to the survival, efficiency, and well-being of any organization as well as a whole new approach to the protection of business intelligence and assets. Volume II discusses topics and illustrates strategies and procedures that have never before been used in the corporate field. Inspired by the concepts, strategies, and tactics that have been used by intelligence communities and specialized military forces for decades, this book aims to improve and safeguard every component of a corporate environment through the adaptation and modification of the same strategies employed by these specialized entities. Through this book, managers, security officers, consultants, and entire corporate environments will have the knowledge and skills necessary in order to change the entire dynamic of security applications in the present day and will be able to integrate advanced and highly efficient counterintelligence models in order to combat the extensive modern threat landscape. | |
530 |
_a2 _ub |
||
530 | _aAlso available in printing. | ||
538 | _aMode of access: World Wide Web. | ||
538 | _aSystem requirements: Adobe Acrobat reader. | ||
588 | _aTitle from PDF title page (viewed on June 12, 2018). | ||
650 | 0 | _aBusiness intelligence. | |
650 | 0 |
_aCorporations _xSecurity measures. |
|
653 | _abusiness integrity | ||
653 | _acorporate environments | ||
653 | _acounterintelligence | ||
653 | _acybersecurity | ||
653 | _ainformation protection | ||
653 | _aintelligence | ||
653 | _aIT | ||
653 | _aoperations | ||
653 | _aplanning | ||
653 | _arisk management | ||
653 | _asecurity | ||
942 |
_c1 _D _eBEP _hHD38.7 _m(c)2018 _QOB _R _x _8NFIC _dCynthia Snell |
||
999 |
_c73555 _d73555 |
||
902 |
_a1 _bCynthia Snell _c1 _dCynthia Snell |