Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Fraud Exposed
  • Language: en
  • Pages: 290

Fraud Exposed

Long accepted as a cost of doing business, occupational fraud has recently proven to be much more dangerous to a company than previously thought. Enron, Global Crossing, and other high-profile cases have shown that the risks can be enormous. Fraud Exposed shows how traditional methods of dealing with occupational fraud are inadequate and how an organization's mindset must change if it is to be more effective in dealing with this problem. In-depth insights and practical advice show readers how to apply criminal and law enforcement response models to workplace fraud prevention and detection; analyze financial controls to prevent occupational fraud; as well as examine and improve current defens...

Protecting Critical Information and Technology
  • Language: en
  • Pages: 713

Protecting Critical Information and Technology

Partial contents: plenary sessions (intellectual property & national security; technology transfer; economic espionage); workshops (establishing an OPSEC program); acquisition/treaties (arms control synergism; on-site inspection); counterintelligence/ intelligence (Chinese security & economic interests; enviro- terrorism); counterintelligence/law enforcement (counter-narcotics); economics (Japanese business intelligence; protecting trade secrets); general issues (computer crime; literature intelligence; FOIA requests; deception & cognition); technology (semiconductor industry; unclassified technology; call diversion).

Sticky Fingers
  • Language: en
  • Pages: 349

Sticky Fingers

  • Type: Book
  • -
  • Published: 2003-12
  • -
  • Publisher: iUniverse

"Steven Fink has done us all an invaluable service by examining in depth an important type of crisis, namely, economic espionage. Ideally, all top corporate executives would do well to read his book to be prepared to combat one of the most significant crises we face." Ian I. Mitroff, Harold Quinton Distinguished Professor of Business Policy and Professor, Annenberg School for Communications, University of Southern California "There is an old saying, 'Business is War, ' and Sticky Fingers shows us just how true that is! It presents a sobering message all across corporate America: be proactive in mitigating your risks or others will be proactive in exploiting them." Stephen Barish Manager of Security Technology Solutions, Ernst & Young, LLP

Strategic Global Sourcing Best Practices
  • Language: en
  • Pages: 246

Strategic Global Sourcing Best Practices

The latest best practice guidance on all aspects of global strategic sourcing-including environmental and international issues Strategic Global Sourcing Best Practices covers the latest trends and leading edge processes in global strategic sourcing, including supply management, t, sustainability, financial decisions, risk management, and international strategies. Offers the latest trends and guidance for sourcing and supply managers Features coverage of understanding sourcing, procurement and supply management, procurement and best business practices, best practices in sourcing management and global sourcing management, financial strategies for sourcing, responsible procurement,diversity procurement, managing risk, supplier selection, project management for procurement and supply managers, managing supplier relationships, international sourcing, managing supplier relationships supply management operations, With the rise of global supply chains, environmental/sustainability concerns, and constantly evolving technology, the time is right for understanding Strategic Global Sourcing Best Practices.

Economic Espionage
  • Language: en
  • Pages: 128

Economic Espionage

  • Type: Book
  • -
  • Published: 1996
  • -
  • Publisher: Unknown

None

An Introduction to Computer Security
  • Language: en
  • Pages: 289

An Introduction to Computer Security

Covers: elements of computer security; roles and responsibilities; common threats; computer security policy; computer security program and risk management; security and planning in the computer system life cycle; assurance; personnel/user issues; preparing for contingencies and disasters; computer security incident handling; awareness, training, and education; physical and environmental security; identification and authentication; logical access control; audit trails; cryptography; and assessing and mitigating the risks to a hypothetical computer system.

The Chemical Weapons Convention
  • Language: en
  • Pages: 84

The Chemical Weapons Convention

  • Type: Book
  • -
  • Published: 1993
  • -
  • Publisher: Congress

None

Public Report of the White House Security Review
  • Language: en
  • Pages: 128