<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<mods version="3.3" ID="483">
<titleInfo>
<title>Security risk assessment and management:</title>
<subTitle>a professional practice guide for protecting buildings and infrastructures</subTitle>
</titleInfo>
<name type="Personal Name" authority="">
<namePart>Biringer, Betty E</namePart>
<role><roleTerm type="text">Additional Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<genre authority="marcgt">bibliography</genre>
<originInfo>
<place><placeTerm type="text">Canada</placeTerm></place>
<publisher>John Wiley &#38; Sons</publisher>
<dateIssued>2007</dateIssued>
<issuance>monographic</issuance>
<edition></edition>
</originInfo>
<language>
<languageTerm type="code">en</languageTerm>
<languageTerm type="text">Inggris</languageTerm>
</language>
<physicalDescription>
<form authority="gmd">Text</form>
<extent>xxvi, 358 hal, ilus, index, 25,5 cm</extent>
</physicalDescription>
<note>&#34;Proven set of best practices for security risk assessment andmanagement, explained in plain English

This guidebook sets forth a systematic, proven set of bestpractices for security risk assessment and management of buildingsand their supporting infrastructures. These practices are alldesigned to optimize the security of workplace environments foroccupants and to protect the interests of owners and otherstakeholders. The methods set forth by the authors stem from theirresearch at Sandia National Laboratories and their practicalexperience working with both government and private facilities.

Following the authors' step-by-step methodology for performing acomplete risk assessment, you learn to:

    Identify regional and site-specific threats that are likely andcredible
    Evaluate the consequences of these threats, including loss oflife and property, economic impact, as well as damage to symbolicvalue and public confidence
    Assess the effectiveness of physical and cyber security systemsand determine site-specific vulnerabilities in the securitysystem

The authors further provide you with the analytical tools neededto determine whether to accept a calculated estimate of risk or toreduce the estimated risk to a level that meets your particularsecurity needs. You then learn to implement a risk-reductionprogram through proven methods to upgrade security to protectagainst a malicious act and/or mitigate the consequences of theact.

This comprehensive risk assessment and management approach hasbeen used by various organizations, including the U.S. Bureau ofReclamation, the U.S. Army Corps of Engineers, the Bonneville PowerAdministration, and numerous private corporations, to assess andmanage security risk at their national infrastructure facilities.With its plain-English presentation coupled with step-by-stepprocedures, flowcharts, worksheets, and checklists, you can easilyimplement the same proven approach and methods for yourorganization or clients. Additional forms and resources areavailable online at www.wiley.com/go/securityrisk.&#34;</note>
<subject authority=""><topic>Risk assessment</topic></subject>
<subject authority=""><topic>Buildings -- Security measures</topic></subject>
<classification>658.47</classification><identifier type="isbn">9780471793526</identifier><location>
<physicalLocation>UPA PERPUSTAKAAN POLITEKNIK PERKAPALAN NEGERI SURABAYA Politeknik Perkapalan Negeri Surabaya</physicalLocation>
<shelfLocator>658.47 Bet s</shelfLocator>
<holdingSimple>
<copyInformation>
<numerationAndChronology type="1">310012009010565</numerationAndChronology>
<sublocation>My Library (Lemari 11/294)</sublocation>
<shelfLocator>658.47 Bet s</shelfLocator>
</copyInformation>
</holdingSimple>
</location>
<recordInfo>
<recordIdentifier>483</recordIdentifier>
<recordCreationDate encoding="w3cdtf">2017-11-22 09:52:47</recordCreationDate>
<recordChangeDate encoding="w3cdtf">2019-06-17 10:17:58</recordChangeDate>
<recordOrigin>machine generated</recordOrigin>
</recordInfo></mods></modsCollection>