Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet or computer – no Kindle device required. Learn more
Read instantly on your browser with Kindle Cloud Reader.
Using your mobile phone camera, scan the code below and download the Kindle app.
Enter your mobile phone or email address
By pressing ‘Send link’, you agree to Amazon's Conditions of Use.
You consent to receive an automated text message from or on behalf of Amazon about the Kindle App at your mobile number above. Consent is not a condition of any purchase. Message and data rates may apply.
Follow the Author
Security Risk Management Aide-Mémoire Kindle Edition
- ASIN : B07YCRFS8Z
- Publisher : SERT Pty Ltd; 1st edition (30 October 2019)
- Language : English
- File size : 28076 KB
- Text-to-Speech : Enabled
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Enabled
- Print length : 164 pages
- Best Sellers Rank: 200,476 in Kindle Store (See Top 100 in Kindle Store)
- Customer Reviews:
About the author
Review this product
Top reviews from Australia
There was a problem filtering reviews right now. Please try again later.
This book is perfect for those who have a good understanding of the basics and are trying to expand their capability to undertake more complex operational assessments.
Top reviews from other countries
An additional benefit being that this is supported by a website facility.
Security problems can come from any direction, whether it is from hackers, terrorism or an active shooter. They can also come at any time of the day or night. All companies, big and small, must have some sort of security plan in place and ready to activate at a moment's notice. For any company that does not have a plan in place, why not? "It will never happen to me," right?
Is your computer system as hacker-proof as possible? Do you need to beef up your physical security, perhaps with more, and better-trained, security guards? A tip has been received, stating that an "attack" is imminent. Is that tip reliable and credible? Is it designed to get you looking in one direction, while the actual attack is coming from a different direction? After the immediate security problem has been eliminated, evaluate your security plan. Did it work? Did it not work? Look at what needs to be changed for next time, for there will certainly be a next time.
This is a very specialized book, so it is not for the general reader. It assumes that the reader is familiar with the world of corporate security. There are many charts included, to make it easier to understand. For security professionals, this book is very much worth reading.