Showing all 11 results
In the fourteenth century, garish ornaments, bright colors, gilt, and military effects helped usher in the age of fashion in Italy. Over a short span of years important matters began to turn on the cut of a sleeve. Fashion influenced consumption and provided a stimulus that drove demand for goods and turned wealthy townspeople into enthusiastic consumers. Making wise decisions about the alarmingly expensive goods that composed a fashionable wardrobe became a matter of pressing concern, especially when the market caught on and became awash in cheaper editions of luxury wares.F
Considered the definitive handbook on the terrorist threat to commercial airline and airport security, USAF Lieutenant Colonel Kathleen Sweet’s seminal resource is now updated to include an analysis of modern day risks. She covers the history of aviation security and compares current in-flight security practices with those of other countries.
Covering Transportation Security Administration changes in security, policy, and training regulation since 9/11, this authoritative reference:
In addition to cargo and passenger security, the text looks at airport and aviation business practices and how security considerations are factored into business processes.
This book has been written for experienced managers and students in postgraduate programs, such as MBA or specialized Masters programs. In a systematic yet concise manner, it addresses all major issues companies face when conducting business across national and cultural boundaries, including assessing and selecting the most promising overseas markets, evaluating market entry alternatives, examining the forces that drive adaptation versus standardization of the marketing mix. It looks at the various global marketing challenges from a strategic perspective and also addresses topics not usually found in international marketing texts, such as aligning marketing strategies with global organizational structures, managing the relationship between national subsidiaries, regional headquarters and global headquarters, as well as corporate social responsibility challenges, and pertinent future trends that are likely to affect global business.
With the business landscape constantly in flux, researchers and analysts look to historical trends to better predict the future of modern business. A Comparative History of Commerce and Industry, Volume I offers a subjective review of how the cultural, social, and economic institutions of commerce and industry evolved in the four industrialized nations of the United States, Great Britain, Germany, and Japan to produce the institution we now know as the business enterprise. This ambitious book offers a multidisciplinary view of the birth and evolution of commerce in these four nations, from the Kamakura Shogunate in 12th century Japan to Europe’s global leadership in the 1920s.
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. Information Security Risk Analysis, Third Edition demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to your organization.
Authored by renowned security expert and certification instructor, Thomas Peltier, this authoritative reference provides you with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment in a matter of days.
Before the American Revolution, the people who lived in British North America were not just colonists; they were also imperial subjects. To think of eighteenth-century New Yorkers as Britons rather than incipient Americans allows us fresh investigations into their world. How was the British Empire experienced by those who lived at its margins? How did the mundane affairs of ordinary New Yorkers affect the culture at the center of an enormous commercial empire? Dangerous Economies is a history of New York culture and commerce in the first two thirds of the eighteenth century, when Britain was just beginning to catch up with its imperial rivals, France and Spain.
Critical Infrastructure (CI) is fundamental to the functioning of a modern economy, and consequently, maintaining CI security is paramount. However, despite all the security technology available for threats and risks to CI, this crucial area often generates more fear than rational discussion. Apprehension unfortunately prompts many involved in CI policy to default to old-fashioned intuition rather than depend on modern concrete risk assessment as the basis for vital security decisions.Going beyond definitions, Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies looks at the iron triangle within CI: power, telecom, and finance.
As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations. While these items are very important, they are only half of the equation necessary to ensure security success. CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives presents tools that empower security practitioners to identify the intangible negative influencers of security that plague most organizations, and provides techniques to identify, minimize, and overcome these pitfalls.T
This book illustrates how to develop the related standards, procedures, and guidelines for implementing policy. Each chapter provides advice on the structural mechanics of the various documents as well as an example of each form. This new edition updates material on the concept of responsibilities that reflects the general nature of the individuals responsible. Standards and procedures are also updated to reflect the work done in the field during 2002 with additional examples. ISO 17799 is used to identify possible standards that enterprises can create.
Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk.
Showing all 11 results