<DIV>Managing Knowledge Security is a comprehensive reference guide detailing how to secure both the physical and intangible assets owned by a business. Citing international examples such as Hewlett Packard, Microsoft, Google, Boeing, and Amazon, the author covers all aspects of knowledge protection
Managing Knowledge Security: Strategies for Protecting Your Company's Intellectual Assets
β Scribed by Kevin C. Desouza
- Publisher
- Kogan Page
- Year
- 2007
- Tongue
- English
- Leaves
- 224
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Managing Knowledge Security is a comprehensive reference guide detailing how to secure both the physical and intangible assets owned by a business. Citing international examples such as Hewlett Packard, Microsoft, Google, Boeing, and Amazon, the author covers all aspects of knowledge protection, from employee retention strategies to physical security. Knowledge managers, security professionals, general managers, information systems managers, and competitive intelligence professionals will find the book of immediate relevance, as will members of the defense, national security, and government intelligence agencies.
β¦ Table of Contents
Contents......Page 7
Preface......Page 9
Acknowledgements......Page 17
About the author......Page 19
1 The basics......Page 21
Compromising your intellectual assets......Page 23
Intellectual assets: the bedrock of organizations......Page 26
Knowledge management......Page 29
Competitive intelligence......Page 35
Security management......Page 40
Roadmap of the book......Page 42
2 The human stain......Page 47
Security breaches......Page 50
Preventive measures......Page 59
Closing thoughts......Page 73
3 Technology hiccups......Page 75
Security breaches......Page 79
Preventive measures......Page 87
Closing thoughts......Page 94
4 When friends become liabilities......Page 95
Types of alliance......Page 99
Security breaches......Page 108
Preventive measures......Page 117
Closing thoughts......Page 123
5 Guarding the fortress......Page 125
Defining the fortress......Page 128
Security breaches......Page 129
Preventive measures......Page 137
Closing thoughts......Page 147
6 From abnormalities to crises......Page 149
Understanding the beast......Page 152
Preventative measures......Page 174
Closing thoughts......Page 191
The seven strategic considerations......Page 193
Closing thoughts......Page 207
Notes......Page 209
References......Page 211
Index......Page 215
π SIMILAR VOLUMES
This is a great book for a facility manager who is concerned about security. It starts with "How to Perform a Risk Assessment" and proceeds progressively to more and more complex systems. It covers Physical Security Separation Fencing Gates Barricades Locks Hardware Intrusion Detection Cl
Covering everything required to build and manage a security system, Facility Manager's Guide to Security discusses the layout of the facility in order to provide security for workers, plants, processes, and products. The book covers distances and separation, fencing, access control, intrusion detect
In many ways, writing an introductory overview is more difficult than crafting a more advanced work. Overviews by their nature are wide-ranging and must cover so many variables. Such is the case with this primer on facility security.Author Robert N. Reid selects perhaps the best approach for an over
The information systems security (InfoSec) profession remains one of the fastest growing professions in the world today. With the advent of the Internet and its use as a method of conducting business, even more emphasis is being placed on InfoSec. However, there is an expanded field of threats that
A straightforward guide to leveraging your company's intellectual capital by creating a knowledge management cultureThe Complete Guide to Knowledge Management offers managers the tools they need to create an organizational culture that improves knowledge sharing, reuse, learning, collaboration, and