Record ID | ia:mappingsecurityc0000patt |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/mappingsecurityc0000patt/mappingsecurityc0000patt_marc.xml |
Download MARC binary | https://www.archive.org/download/mappingsecurityc0000patt/mappingsecurityc0000patt_meta.mrc |
LEADER: 03372cam 22005414a 4500
001 ocm57550889
003 OCoLC
005 20200622050113.0
008 040909s2005 inuab b 001 0 eng
010 $a 2004113324
040 $aDLC$beng$cDLC$dJPL$dBAKER$dVRC$dBTCTA$dYDXCP$dIG#$dN5L$dEXW$dBDX$dOCLCO$dOCLCQ$dOCLCO$dOCLCA$dOCLCF
020 $a0321304527
020 $a9780321304520
035 $a(OCoLC)57550889
042 $apcc
050 00 $aHF5548.37$b.P38 2005
082 04 $a658.4/78$222
100 1 $aPatterson, Tom.
245 10 $aMapping security :$bthe corporate security sourcebook for today's global economy /$cTom Patterson with Scott Gleeson Blue.
260 $aUpper Saddle River, NJ :$bAddison-Wesley,$c©2005.
300 $axxiii, 405 pages :$billustrations, maps ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
504 $aIncludes bibliographical references and index.
520 1 $a"Writing for executives, business managers, security professionals, and consultants, Patterson offers an exceptionally thorough and authoritative briefing on today's global security realities. Using real-world examples, he shows how to change your approach to security as you move more deeply into global markets: how to resolve contradictions among the complex rules and customs you'll have to follow and how to customize security solutions for every market. Along the way, he introduces the Mapping Security Index (MSI), a powerful new metric for rapidly quantifying security risk associated with 30 key markets."--Jacket.
505 00 $tThe five Ws of mapping security --$tThe historian and the security guy --$tCharting a course --$tWhy you picked up this book --$tEstablishing your coordinates --$tBuilding the base --$tEnabling business and enhancing process --$tDeveloping radar --$tConstant vigilance --$tReality, illusion, and the souk --$tWells and the security guy travel the globe --$tEurope --$tThe Middle East and Africa --$tThe Americas --$tAsia Pacific --$tOutsourcing and your map --$tWhose law do I break? --$tMapping solutions --$tMapping law --$tMapping technology --$tMapping culture --$tMapping your future --$tLocal security resources by country.
650 0 $aElectronic commerce$xSecurity measures.
650 0 $aInternational business enterprises$xComputer networks$xSecurity measures.
650 0 $aInternet$xSecurity measures.
650 0 $aComputer security.
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aElectronic commerce$xSecurity measures.$2fast$0(OCoLC)fst00906919
650 7 $aInternet$xSecurity measures.$2fast$0(OCoLC)fst01751426
700 1 $aBlue, Scott Gleeson.
776 08 $iOnline version:$aPatterson, Tom.$tMapping security.$dUpper Saddle River, NJ : Addison-Wesley, ©2005$w(OCoLC)607373670
938 $aBaker & Taylor$bBKTY$c34.99$d26.24$i0321304527$n0006087691$sactive
938 $aBrodart$bBROD$n02679310$c$39.99
938 $aBaker and Taylor$bBTCP$n2004113324
938 $aIngram$bINGR$n9780321304520
938 $aYBP Library Services$bYANK$n2143159
029 1 $aAU@$b000027378880
029 1 $aAU@$b000027402605
029 1 $aIG#$b9780321304520
029 1 $aNZ1$b9676323
029 1 $aYDXCP$b2143159
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 156 OTHER HOLDINGS