Browse Results

Showing 99,651 through 99,675 of 100,000 results

Security: An Introduction

by Philip P. Purpura

Today, threats to the security of an organization can come from a variety of sources- from outside espionage to disgruntled employees and internet risks to utility failure. Reflecting the diverse and specialized nature of the security industry, Security: An Introduction provides an up-to-date treatment of a topic that has become increasingly comple

Security Analysis and Business Valuation on Wall Street + Companion Web Site

by Hooke Jeffrey C.

An insider's look at security analysis and business valuation, as practiced by Wall Street, Corporate America, and international businesses Two major market crashes, numerous financial and accounting scandals, growth in private equity and hedge funds, Sarbanes Oxley and related regulations, and international developments changed security analysis and business valuation substantially over the last fourteen years. These events necessitated a second edition of this modern classic, praised earlier by Barron's as a "welcome successor to Graham and Dodd" and used in the global CFA exam. This authoritative book shows the rational, rigorous analysis is still the most successful way to evaluate securities. It picks up where Graham and Dodd's bestselling Security Analysis - for decades considered the definitive word on the subject - leaves off. Providing a practical viewpoint, Security Analysis on Wall Street shows how the values of common stock are really determined in today's marketplace. Incorporating dozens of real-world examples, and spotlighting many special analysis cases - including cash flow stocks, unusual industries and distressed securities - this comprehensive resources delivers all the answers to your questions about security analysis and corporate valuation on Wall Street. The Second Edition of Security Analysis on Wall Street examines how mutual funds, private equity funds, hedge funds, institutional money managers, investment banks, business appraisers, and corporate acquirers perform their craft of security analysis and business valuation in today's highly charged environment. Completely updated to reflect the latest methodologies, this reliable resource represents the most comprehensive book written by someone who has actually worked as an investment banker, private equity executive, and international institutional investor. Shows the methodical process that practitioners use to value common stocks and operating companies and to make buy/sell decisions Discusses the impact of the two stock market crashes, the accounting and financial scandals, and the new regulations on the evaluation process Covers how Internet and computing power automate portions of the research and analytical effort Includes new case study examples representative of valuation issues faced daily by mutual funds, private equity funds, hedge funds, institutional investors, investment banks, business appraisers, and corporate acquirers Is a perfect tool for professors wishing to show their MBA students the essential tools of equity and business valuation Security analysis and business valuation are core financial disciplines for Wall Streeters, corporate acquirers, and international investors. The Second Edition of Security Analysis on Wall Street is an important book for anyone who needs a solid grounding in these critical finance topics.

Security Analysis and Portfolio Management: A Primer (Classroom Companion: Business)

by Shveta Singh Surendra S. Yadav

This book is a simple and concise text on the subject of security analysis and portfolio management. It is targeted towards those who do not have prior background in finance, and hence the text veers away from rather complicated formulations and discussions. The course ‘Security Analysis and Portfolio Management’ is usually taught as an elective for students specialising in financial management, and the authors have an experience of teaching this course for more than two decades. The book contains real empirical evidence and examples in terms of returns, risk and price multiples from the Indian equity markets (over the past two decades) that are a result of the analysis undertaken by the authors themselves. This empirical evidence and analysis help the reader in understanding basic concepts through real data of the Indian stock market. To drive home concepts, each chapter has many illustrations and case-lets citing real-life examples and sections called ‘points to ponder’ to encourage independent thinking and critical examination. For practice, each chapter has many numericals, questions, and assignments

Security Analysis: Sixth Edition, Foreword By Warren Buffett

by Benjamin Graham David Dodd

First published in 1934, Security Analysis is one of the most influential financial books ever written. Selling more than one million copies through five editions, it has provided generations of investors with the timeless value investing philosophy and techniques of Benjamin Graham and David L. Dodd. As relevant today as when they first appeared nearly 75 years ago, the teachings of Benjamin Graham, “the father of value investing,” have withstood the test of time across a wide diversity of market conditions, countries, and asset classes. This new sixth edition, based on the classic 1940 version, is enhanced with 200 additional pages of commentary from some of today’s leading Wall Street money managers. These masters of value investing explain why the principles and techniques of Graham and Dodd are still highly relevant even in today’s vastly different markets. The contributor list includes: Seth A. Klarman, president of The Baupost Group, L.L.C. and author of Margin of Safety James Grant, founder of Grant's Interest Rate Observer, general partner of Nippon Partners Jeffrey M. Laderman, twenty-five year veteran of BusinessWeek Roger Lowenstein, author of Buffett: The Making of an American Capitalist and When America Aged and Outside Director, Sequoia Fund Howard S. Marks, CFA, Chairman and Co-Founder, Oaktree Capital Management L.P. J. Ezra Merkin, Managing Partner, Gabriel Capital Group . Bruce Berkowitz, Founder, Fairholme Capital Management. Glenn H. Greenberg, Co-Founder and Managing Director, Chieftain Capital Management Bruce Greenwald, Robert Heilbrunn Professor of Finance and Asset Management, Columbia Business School David Abrams, Managing Member, Abrams Capital Featuring a foreword by Warren E. Buffett (in which he reveals that he has read the 1940 masterwork “at least four times”), this new edition of Security Analysis will reacquaint you with the foundations of value investing—more relevant than ever in the tumultuous 21st century markets.

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices (Security, Audit and Leadership Series)

by Sajay Rai Philip Chukwuma Richard Cozart

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure and audit smart device. It provides guidance on the handling of corporate devices and the Bring Your Own Devices (BYOD) smart devices.

Security and Control in Information Systems: A Guide for Business and Accounting (Textbooks In Information Systems Ser.)

by Andrew Hawker

With the advent of electronic commerce, and the increasing sophistication of the information systems used in business organizations, control and security have become key management issues. Responsibility for ensuring that controls are well designed and properly managed can no longer simply be delegated to the technical experts. It has become an area in which the whole management team needs to be involved. This comprehensive review, written for the business reader, includes coverage of recent developments in electronic commerce, as well as the more traditional systems found in many organizations, both large and small. Intended for any manager whose work depends on financial or other business information, it includes case studies, summaries and review questions, making it equally suitable as a source text for students of business studies at postgraduate or advanced level.

Security and Cryptography for Networks: 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings (Lecture Notes in Computer Science #11035)

by Dario Catalano Roberto De Prisco

This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.The 30 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on signatures and watermarking; composability; encryption; multiparty computation; anonymity and zero knowledge; secret sharing and oblivious transfer; lattices and post quantum cryptography; obfuscation; two-party computation; and protocols.

Security and Defence in Europe (Advanced Sciences and Technologies for Security Applications)

by J. Martín Ramírez Jerzy Biziewski

This book argues that security and defense have never been true priorities in the European Union, and have constantly been marginalized by the elites since the Soviet Union collapsed and the Warsaw Pact disintegrated. Despite the official rhetoric, only a few tangible results can be presented concerning the operational readiness of European forces, and the EU’s inability to act was proven during the crises in the Balkans, NATO has experienced similar problems, as the majority of its members are EU countries. Both organizations have declared their resolve concerning the security and defense of their nations and territories, but, unfortunately, little has been done to lend these statements credence. In this context, the book analyzes several aspects of EU security and defense, including: the EU – NATO relationship, common defense policy and strategy, common capability building, common understanding of strategic changes, common operational planning and centrally synchronized exercises based on operational planning, etc. The member states have helped to make EU/NATO effective organizations, but unfortunately their individual interests and priorities constitute real challenges. This aspect should be discussed and addressed by political and military elites, scholars, analysts, students and the general public alike.

Security and Migration in Asia: The Dynamics of Securitisation (Politics in Asia)

by Wong Siu-Lun Melissa Curley

Security and Migration in Asia explores how various forms of unregulated and illegal forms of human movement within Asia and beyond the region have come to be treated as 'security' issues, and whether and how a 'securitization' framework enables a more effective response to them. The process and theory of 'securitization' and 'desecuritization' have been developed within the international relations literature by the so-call Copenhagen school scholars, including Barry Buzan and Ole Waever among others. The topics explored in this well- presented and engaging book cover geographic areas of China, Northeast Asia, Central Asia, the Russian Far East, Southeast Asia, and the Hong Kong SAR, and includes research on: human trafficking and people smuggling financing illegal migration and links to transnational organized crime regulated and unregulated labour migration the 'securitization' of illegal migration in sending, transit and receiving countries. This book provides compelling insights into contemporary forms of illegal migration, under conditions of globalization, and makes a contribution to the literature in international relations and migration studies.

Security and Privacy: Volume III (The Library of Essays on Law and Privacy #3)

by Joseph Savirimuthu

During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the big themes in a manner which typifies the complex interplay between privacy, identity, security and surveillance. This level of engagement is both welcome and timely, particularly in a climate of growing public mistrust of State surveillance activities and business predisposition to monetize information relating to the online activities of users. This volume is informed by the range of discussions currently conducted at scholarly and policy levels. The essays illustrate the value of viewing privacy concerns not only in terms of the means by which information is communicated but also in terms of the political processes that are inevitably engaged and the institutional, regulatory and cultural contexts within which meanings regarding identity and security are constituted.

Security and Profit in China’s Energy Policy: Hedging Against Risk (Contemporary Asia in the World)

by Øystein Tunsjø

China has developed sophisticated hedging strategies to insure against risks in the international petroleum market. It has managed a growing net oil import gap and supply disruptions by maintaining a favorable energy mix, pursuing overseas equity oil production, building a state-owned tanker fleet and strategic petroleum reserve, establishing cross-border pipelines, and diversifying its energy resources and routes.Though it cannot be "secured," China's energy security can be "insured" by marrying government concern with commercial initiatives. This book comprehensively analyzes China's domestic, global, maritime, and continental petroleum strategies and policies, establishing a new theoretical framework that captures the interrelationship between security and profit. Arguing that hedging is central to China's energy-security policy, this volume links government concerns about security of supply to energy companies' search for profits, and by drawing important distinctions between threats and risks, peacetime and wartime contingencies, and pipeline and seaborne energy-supply routes, the study shifts scholarly focus away from securing and toward insuring an adequate oil supply and from controlling toward managing any disruptions to the sea lines of communication. The book is the most detailed and accurate look to date at how China has hedged its energy bets and how its behavior fits a hedging pattern.

Security and Trust Management: 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings (Lecture Notes in Computer Science #11738)

by Sjouke Mauw Mauro Conti

This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions. The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.

Security as Practice: Discourse Analysis and the Bosnian War (New International Relations)

by Lene Hansen

This important text offers a full and detailed account of how to use discourse analysis to study foreign policy. It provides a poststructuralist theory of the relationship between identity and foreign policy and an in-depth discussion of the methodology of discourse analysis. Part I offers a detailed discussion of the concept of identity, the intertextual relationship between official foreign policy discourse and oppositional and media discourses and of the importance of genres for authors' ability to establish themselves as having authority and knowledge. Lene Hansen devotes particular attention to methodology and provides explicit directions for how to build discourse analytical research designs Part II applies discourse analytical theory and methodology in a detailed analysis of the Western debate on the Bosnian war. This analysis includes a historical genealogy of the Western construction of the Balkans as well as readings of the official British and American policies, the debate in the House of Commons and the US Senate, Western media representations, academic debates and travel writing and autobiography. Providing an introduction to discourse analysis and critical perspectives on international relations, this book will be essential reading for students and scholars of international relations, discourse analysis and research methodology.

Security beyond the State

by Rita Abrahamsen Michael C. Williams

Across the globe, from mega-cities to isolated resource enclaves, the provision and governance of security takes place within assemblages that are de-territorialized in terms of actors, technologies, norms and discourses. They are embedded in a complex transnational architecture, defying conventional distinctions between public and private, global and local. Drawing on theories of globalization and late modernity, along with insights from criminology, political science and sociology, Security Beyond the State maps the emergence of the global private security sector and develops a novel analytical framework for understanding these global security assemblages. Through in-depth examinations of four African countries - Kenya, Nigeria, Sierra Leone and South Africa - it demonstrates how global security assemblages affect the distribution of social power, the dynamics of state stability, and the operations of the international political economy, with significant implications for who gets secured and how in a global era.

Security Capital Pacific Trust: A Case for Branding

by Susan Fournier

A real estate operations and investment trust is considering whether it should pursue branding as a strategic investment. Through interpretation of case data and video from focus groups, students deduce the consumer (cognitive, psychological, and economic), environmental, and company factors that are conducive to branding, thereby illuminating their understanding of when it makes sense to brand. Analysis of extensive survey data allows students to consider the secondary question about how to brand as they formulate brand-positioning recommendations. Includes color exhibits.

Security Capital Pacific Trust: A Case for Branding

by Susan Fournier

A real estate operations and investment trust is considering whether it should pursue branding as a strategic investment. Through interpretation of case data and video from focus groups, students deduce the consumer (cognitive, psychological, and economic), environmental, and company factors that are conducive to branding, thereby illuminating their understanding of when it makes sense to brand. Analysis of extensive survey data allows students to consider the secondary question about how to brand as they formulate brand-positioning recommendations. Includes color exhibits.

The Security Council as Global Legislator (Global Institutions)

by Trudy Fraser Vesselin Popovski

Security Council resolutions have undergone an important evolution over the last two decades. While continuing its traditional role of determining state-specific threats to peace and engaging accordingly in various peaceful or coercive measures, the Security Council has also adopted resolutions that have effectively imposed legal obligations on all United Nations member states. This book seeks to move away from the discussions of whether the Security Council – in the current composition and working methods – is representative, capable or productive. Rather it assesses whether legislative activity by the Security Council can be beneficial to international peace and security. The authors examine and critique the capacities of the Security Council to address thematic international threats - such as terrorism, weapons proliferations, targeting of civilians, recruitment of child soldiers, piracy – as an alternative to the traditional model of addressing country-specific situations on a case-by-case basis. Ultimately, the book seeks to assess the efficacy of the Security Council as global legislator in terms of complementing the Security Council’s mandate for the maintenance of international peace and security with a preventative and norm-setting capacity. The book presents views from a diverse range of Security Council stakeholders including academic scholars, political analysts, and international lawyers. This resource will be of great interest to students of international relations, international organizations and international security studies alike.

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

by Hilary Walton

Security Culture starts from the premise that, even with good technical tools and security processes, an organisation is still vulnerable without a strong culture and a resilient set of behaviours in relation to people risk. Hilary Walton combines her research and her unique work portfolio to provide proven security culture strategies with practical advice on their implementation. And she does so across the board: from management buy-in, employee development and motivation, right through to effective metrics for security culture activities. There is still relatively little integrated and structured advice on how you can embed security in the culture of your organisation. Hilary Walton draws all the best ideas together, including a blend of psychology, risk and security, to offer a security culture interventions toolkit from which you can pick and choose as you design your security culture programme - whether in private or public settings. Applying the techniques included in Security Culture will enable you to introduce or enhance a culture in which security messages stick, employees comply with policies, security complacency is challenged, and managers and employees understand the significance of this critically important, business-as-usual, function.

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer

by Perry Carpenter Kai Roer

Mitigate human risk and bake security into your organization&’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture. The topic of security culture is mysterious and confusing to most leaders. But it doesn&’t have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer, two veteran cybersecurity strategists deliver experience-driven, actionable insights into how to transform your organization&’s security culture and reduce human risk at every level. This book exposes the gaps between how organizations have traditionally approached human risk and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization. The book offers: An expose of what security culture really is and how it can be measured A careful exploration of the 7 dimensions that comprise security culture Practical tools for managing your security culture program, such as the Security Culture Framework and the Security Culture Maturity Model Insights into building support within the executive team and Board of Directors for your culture management programAlso including several revealing interviews from security culture thought leaders in a variety of industries, The Security Culture Playbook is an essential resource for cybersecurity professionals, risk and compliance managers, executives, board members, and other business leaders seeking to proactively manage and reduce risk.

Security De-Engineering: Solving the Problems in Information Risk Management

by Ian Tibble

As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems i

The Security Field: Crime Control, Power and Symbolic Capital (Routledge Studies in Crime, Security and Justice)

by Matt Bowden

How crime and security are governed has become a critical issue in criminology over the first quarter of the twenty-first century. Today, we see a broader landscape of regulatory players who are involved in the control and management of crime, whether in crime prevention, safety in the community or in providing private security services. The Security Field: Crime Control, Power and Symbolic Capital gets to grips with these changes and argues that this forms an emerging field in which different players appear to compete and co-operate but are ultimately vying to shape and order the field. This book draws on new thinking in the social sciences on questions of crime, fear and security and contributes to the expanding interest on the sociology and criminology of security by offering a Bourdieusian approach to plural policing and the everyday political economy of security.Drawing from Bourdieu’s concept of field, this book builds a theory of the security field based upon a series of in-depth interviews with security actors such as senior police officers, NGOs, private security professionals, government officials and community safety workers in Ireland. It demonstrates how security producers compete for cultural capital in its many forms – as data, information and relationships – and ultimately as a way of cementing their positions in this emerging field. It shows the dominant power of the formal police and central government in shaping and ordering this relational space. In doing so, The Security Field: Crime Control, Power and Symbolic Capital builds an empirical case from three distinct areas of security production: urban security, community safety and the connections between regulated private security and public crime prevention. It explores the challenges of securitisation in respect of public safety, security and rights and the way in which social problems such as drug use, homelessness and urban marginality are recast as ‘security’ concerns.An accessible and compelling read, this book will appeal to students and scholars of criminology, sociology, urban studies and security studies.

Security-First Compliance for Small Businesses

by Karen Walsh

Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-19 pandemic increase an organization’s attack surface. When combined with limited resources caused by the cybersecurity skills gap, securing small and mid-sized business IT infrastructures becomes more complicated. With limited staffing and budgetary restrictions, small businesses need to create cost-effective, security-driven programs that protect data while also meeting increasingly stringent compliance requirements. This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. Starting from the premise that “with security comes compliance,” this book starts by defining “security-first” and then walking readers through the process of creating a holistic security and compliance program. Looking at security and privacy through the lens of zero trust, this overview of regulations and industry standards provides both background about and implications drawn from modern security practices. Rather than focusing solely on individual cybersecurity frameworks, this book offers insights into best practices based on the commonalities between regulations and industry standards, highlighting some of the primary differences to show the nuances. Woven throughout are practical examples of solutions that enable small and mid-sized businesses to create “cybersustainable” security-focused policies, processes, and controls that protect today’s future for tomorrow’s digital ecosystem.

Security for Costs in International Arbitration (Lloyd's Arbitration Law Library)

by Cameron Ford

This is the first and leading comprehensive guide to security for costs in international arbitration, including commercial and investment arbitration, providing a text which will be the key resource for those considering, making and ruling on applications for security for costs. It is the first and only work to consider the 40+ factors informing the discretion to award security for costs.The author begins with an introduction and description of the security of costs controversy in international arbitration, and then explains the developing approach of arbitral tribunals to applications for security for costs, with reference to decisions published by ICC and ASA, and statistics of LCIA and decisions of the UK courts when they had the power to grant security for costs in international arbitration. The book features an analysis of the reasons given for restricting security for costs in international commercial arbitration to ‘exceptional circumstances’ or similar. The author conveys discretionary factors taken into account by the courts and arbitral tribunals in considering applications for security for costs, special considerations for investor-state arbitrations, the correct approach to the exercise of the discretion, the manner of making and resisting applications, appropriate orders to be made on applications, and consequences of orders.This book is written for all arbitration practitioners around the world, including arbitrators ruling on applications. The work would be incidentally useful to litigation practitioners as it necessarily considers applications for security for costs in litigation.

Security Governance, Policing, and Local Capacity (Advances in Police Theory and Practice)

by Jan Froestad Clifford Shearing

The security governance of South Africa has faced immense challenges amid post-apartheid constitutional and political transformations. In many cases, policing and governmental organizations have failed to provide security and other services to the poorest inhabitants. Security Governance, Policing, and Local Capacity explores an experiment that too

Security - The Human Factor

by Paul Kearney

Address human vulnerabilities with this essential guide . . . Practical advice from an acknowledged expert - endorsed by BT!Your business information is likely to be much more valuable than the hardware on which it is stored. The loss of a laptop might set you back £400, but if the files on the laptop included sensitive customer data or the blueprint for a new product, the cost of repairing the damage would run into thousands. The consequences of a data breach range from alienating customers to heavy fines, or even criminal prosecution. While technologies, such as antivirus software and encryption, can offer some protection against cybercrime, security breaches are most often the result of human error and carelessness. Improve information securityImproving information security within your organisation, therefore, has to encompass people and processes, as well as technology. Motivating your team and making them more aware of security concerns should be at the heart of your information security strategy. At the same time, the processes you have in place to address information security issues need to be straightforward and properly understood if you want your employees to adhere to them. BT's approachThis pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.

Refine Search

Showing 99,651 through 99,675 of 100,000 results