Browse Results

Showing 99,501 through 99,525 of 100,000 results

The Securitization of Foreign Aid (Rethinking International Development)

by Stephen Brown Jörn Grävingholt

Security concerns increasingly influence foreign aid: how Western countries give aid, to whom and why. With contributions from experts in the field, this book examines the impact of security issues on six of the world's largest aid donors, as well as on key crosscutting issues such as gender equality and climate change.

The Securitization of Foreign Aid (Rethinking International Development series)

by Stephen Brown J�rn Gr�vingholt

Security concerns increasingly influence foreign aid: how Western countries give aid, to whom and why. With contributions from experts in the field, this book examines the impact of security issues on six of the world's largest aid donors, as well as on key crosscutting issues such as gender equality and climate change.

Securitized Insurance Risk: Strategic Opportunities for Insurers and Investors (Glenlake Business Monographs)

by Michael Himick

Securitized Insurance Risk is one of the first books to focus exclusively on the convergence of the insurance and financial markets in risk management and the emergence of insurance risk as a non-correlated asset class. Written for insurers and investors alike, this book explores the opportunities available to forward-looking risk and investment managers. Chapters by prominent experts specifically address: the win-win principle behind securitizing insurance risk; current structures, including catastrophe bonds, structured notes, catastrophe options, and swaps; partnering financial market tools with traditional reinsurance programs; holding insurance risk, uncorrelated with stocks and bonds; pricing insurance risk instruments and evaluating basic risk; and regulatory and accounting concerns.

Security

by Philippe Bourbeau

Security is a vital subject of study in the twenty-first century and a central theme in many social science disciplines. This volume provides a comparative analysis of the ways in which the concept of security is theorized and studied across different disciplines. The book has two objectives: first, to explore the growing diversity of theories, paradigms, and methods developed to study security; and, second, to initiate a multidisciplinary dialogue about the ontological, epistemological, paradigmatic, and normative aspects of security studies in social sciences. Readers across nine fields are invited to reflect on their conceptualizations of security and to consider how an interdisciplinary dialogue can stimulate and enrich the understanding of security in our contemporary world. Analytically sharp yet easy to read, this is a cutting-edge volume exploring what security is and what it means in today's world.

Security: An Introduction

by Philip P. Purpura

Today, threats to the security of an organization can come from a variety of sources ― from outside espionage to disgruntled employees and internet risks to utility failure. Reflecting the diverse and specialized nature of the security industry, Security: An Introduction provides an up-to-date treatment of a topic that has become increasingly complex as more vulnerabilities arise. <p><p> Philip P. Purpura, recently selected by Security Magazine as one of the Top 25 Most Influential People in the Security Industry, shares his 30-plus years of professional experience in the industry to provide basic theory and real-world methodologies that security practitioners can apply to scenarios they encounter. <p> Utilizing real-world examples, each chapter begins with learning objectives and a list of key terms and ends with discussion questions, role-playing exercises, and links to relevant websites. The book offers readers a foundation for understanding and implementing best practices for security to more effectively protect people, assets, and organizations.

Security: An Introduction

by Philip P. Purpura

Today, threats to the security of an organization can come from a variety of sources- from outside espionage to disgruntled employees and internet risks to utility failure. Reflecting the diverse and specialized nature of the security industry, Security: An Introduction provides an up-to-date treatment of a topic that has become increasingly comple

Security Analysis and Business Valuation on Wall Street + Companion Web Site

by Hooke Jeffrey C.

An insider's look at security analysis and business valuation, as practiced by Wall Street, Corporate America, and international businesses Two major market crashes, numerous financial and accounting scandals, growth in private equity and hedge funds, Sarbanes Oxley and related regulations, and international developments changed security analysis and business valuation substantially over the last fourteen years. These events necessitated a second edition of this modern classic, praised earlier by Barron's as a "welcome successor to Graham and Dodd" and used in the global CFA exam. This authoritative book shows the rational, rigorous analysis is still the most successful way to evaluate securities. It picks up where Graham and Dodd's bestselling Security Analysis - for decades considered the definitive word on the subject - leaves off. Providing a practical viewpoint, Security Analysis on Wall Street shows how the values of common stock are really determined in today's marketplace. Incorporating dozens of real-world examples, and spotlighting many special analysis cases - including cash flow stocks, unusual industries and distressed securities - this comprehensive resources delivers all the answers to your questions about security analysis and corporate valuation on Wall Street. The Second Edition of Security Analysis on Wall Street examines how mutual funds, private equity funds, hedge funds, institutional money managers, investment banks, business appraisers, and corporate acquirers perform their craft of security analysis and business valuation in today's highly charged environment. Completely updated to reflect the latest methodologies, this reliable resource represents the most comprehensive book written by someone who has actually worked as an investment banker, private equity executive, and international institutional investor. Shows the methodical process that practitioners use to value common stocks and operating companies and to make buy/sell decisions Discusses the impact of the two stock market crashes, the accounting and financial scandals, and the new regulations on the evaluation process Covers how Internet and computing power automate portions of the research and analytical effort Includes new case study examples representative of valuation issues faced daily by mutual funds, private equity funds, hedge funds, institutional investors, investment banks, business appraisers, and corporate acquirers Is a perfect tool for professors wishing to show their MBA students the essential tools of equity and business valuation Security analysis and business valuation are core financial disciplines for Wall Streeters, corporate acquirers, and international investors. The Second Edition of Security Analysis on Wall Street is an important book for anyone who needs a solid grounding in these critical finance topics.

Security Analysis and Portfolio Management: A Primer (Classroom Companion: Business)

by Shveta Singh Surendra S. Yadav

This book is a simple and concise text on the subject of security analysis and portfolio management. It is targeted towards those who do not have prior background in finance, and hence the text veers away from rather complicated formulations and discussions. The course ‘Security Analysis and Portfolio Management’ is usually taught as an elective for students specialising in financial management, and the authors have an experience of teaching this course for more than two decades. The book contains real empirical evidence and examples in terms of returns, risk and price multiples from the Indian equity markets (over the past two decades) that are a result of the analysis undertaken by the authors themselves. This empirical evidence and analysis help the reader in understanding basic concepts through real data of the Indian stock market. To drive home concepts, each chapter has many illustrations and case-lets citing real-life examples and sections called ‘points to ponder’ to encourage independent thinking and critical examination. For practice, each chapter has many numericals, questions, and assignments

Security Analysis: Sixth Edition, Foreword By Warren Buffett

by Benjamin Graham David Dodd

First published in 1934, Security Analysis is one of the most influential financial books ever written. Selling more than one million copies through five editions, it has provided generations of investors with the timeless value investing philosophy and techniques of Benjamin Graham and David L. Dodd. As relevant today as when they first appeared nearly 75 years ago, the teachings of Benjamin Graham, “the father of value investing,” have withstood the test of time across a wide diversity of market conditions, countries, and asset classes. This new sixth edition, based on the classic 1940 version, is enhanced with 200 additional pages of commentary from some of today’s leading Wall Street money managers. These masters of value investing explain why the principles and techniques of Graham and Dodd are still highly relevant even in today’s vastly different markets. The contributor list includes: Seth A. Klarman, president of The Baupost Group, L.L.C. and author of Margin of Safety James Grant, founder of Grant's Interest Rate Observer, general partner of Nippon Partners Jeffrey M. Laderman, twenty-five year veteran of BusinessWeek Roger Lowenstein, author of Buffett: The Making of an American Capitalist and When America Aged and Outside Director, Sequoia Fund Howard S. Marks, CFA, Chairman and Co-Founder, Oaktree Capital Management L.P. J. Ezra Merkin, Managing Partner, Gabriel Capital Group . Bruce Berkowitz, Founder, Fairholme Capital Management. Glenn H. Greenberg, Co-Founder and Managing Director, Chieftain Capital Management Bruce Greenwald, Robert Heilbrunn Professor of Finance and Asset Management, Columbia Business School David Abrams, Managing Member, Abrams Capital Featuring a foreword by Warren E. Buffett (in which he reveals that he has read the 1940 masterwork “at least four times”), this new edition of Security Analysis will reacquaint you with the foundations of value investing—more relevant than ever in the tumultuous 21st century markets.

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices (Security, Audit and Leadership Series)

by Sajay Rai Philip Chukwuma Richard Cozart

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure and audit smart device. It provides guidance on the handling of corporate devices and the Bring Your Own Devices (BYOD) smart devices.

Security and Control in Information Systems: A Guide for Business and Accounting (Textbooks In Information Systems Ser.)

by Andrew Hawker

With the advent of electronic commerce, and the increasing sophistication of the information systems used in business organizations, control and security have become key management issues. Responsibility for ensuring that controls are well designed and properly managed can no longer simply be delegated to the technical experts. It has become an area in which the whole management team needs to be involved. This comprehensive review, written for the business reader, includes coverage of recent developments in electronic commerce, as well as the more traditional systems found in many organizations, both large and small. Intended for any manager whose work depends on financial or other business information, it includes case studies, summaries and review questions, making it equally suitable as a source text for students of business studies at postgraduate or advanced level.

Security and Cryptography for Networks: 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings (Lecture Notes in Computer Science #11035)

by Dario Catalano Roberto De Prisco

This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.The 30 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on signatures and watermarking; composability; encryption; multiparty computation; anonymity and zero knowledge; secret sharing and oblivious transfer; lattices and post quantum cryptography; obfuscation; two-party computation; and protocols.

Security and Defence in Europe (Advanced Sciences and Technologies for Security Applications)

by J. Martín Ramírez Jerzy Biziewski

This book argues that security and defense have never been true priorities in the European Union, and have constantly been marginalized by the elites since the Soviet Union collapsed and the Warsaw Pact disintegrated. Despite the official rhetoric, only a few tangible results can be presented concerning the operational readiness of European forces, and the EU’s inability to act was proven during the crises in the Balkans, NATO has experienced similar problems, as the majority of its members are EU countries. Both organizations have declared their resolve concerning the security and defense of their nations and territories, but, unfortunately, little has been done to lend these statements credence. In this context, the book analyzes several aspects of EU security and defense, including: the EU – NATO relationship, common defense policy and strategy, common capability building, common understanding of strategic changes, common operational planning and centrally synchronized exercises based on operational planning, etc. The member states have helped to make EU/NATO effective organizations, but unfortunately their individual interests and priorities constitute real challenges. This aspect should be discussed and addressed by political and military elites, scholars, analysts, students and the general public alike.

Security and Migration in Asia: The Dynamics of Securitisation (Politics in Asia)

by Wong Siu-Lun Melissa Curley

Security and Migration in Asia explores how various forms of unregulated and illegal forms of human movement within Asia and beyond the region have come to be treated as 'security' issues, and whether and how a 'securitization' framework enables a more effective response to them. The process and theory of 'securitization' and 'desecuritization' have been developed within the international relations literature by the so-call Copenhagen school scholars, including Barry Buzan and Ole Waever among others. The topics explored in this well- presented and engaging book cover geographic areas of China, Northeast Asia, Central Asia, the Russian Far East, Southeast Asia, and the Hong Kong SAR, and includes research on: human trafficking and people smuggling financing illegal migration and links to transnational organized crime regulated and unregulated labour migration the 'securitization' of illegal migration in sending, transit and receiving countries. This book provides compelling insights into contemporary forms of illegal migration, under conditions of globalization, and makes a contribution to the literature in international relations and migration studies.

Security and Privacy: Volume III (The Library of Essays on Law and Privacy #3)

by Joseph Savirimuthu

During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the big themes in a manner which typifies the complex interplay between privacy, identity, security and surveillance. This level of engagement is both welcome and timely, particularly in a climate of growing public mistrust of State surveillance activities and business predisposition to monetize information relating to the online activities of users. This volume is informed by the range of discussions currently conducted at scholarly and policy levels. The essays illustrate the value of viewing privacy concerns not only in terms of the means by which information is communicated but also in terms of the political processes that are inevitably engaged and the institutional, regulatory and cultural contexts within which meanings regarding identity and security are constituted.

Security and Profit in China’s Energy Policy: Hedging Against Risk (Contemporary Asia in the World)

by Øystein Tunsjø

China has developed sophisticated hedging strategies to insure against risks in the international petroleum market. It has managed a growing net oil import gap and supply disruptions by maintaining a favorable energy mix, pursuing overseas equity oil production, building a state-owned tanker fleet and strategic petroleum reserve, establishing cross-border pipelines, and diversifying its energy resources and routes.Though it cannot be "secured," China's energy security can be "insured" by marrying government concern with commercial initiatives. This book comprehensively analyzes China's domestic, global, maritime, and continental petroleum strategies and policies, establishing a new theoretical framework that captures the interrelationship between security and profit. Arguing that hedging is central to China's energy-security policy, this volume links government concerns about security of supply to energy companies' search for profits, and by drawing important distinctions between threats and risks, peacetime and wartime contingencies, and pipeline and seaborne energy-supply routes, the study shifts scholarly focus away from securing and toward insuring an adequate oil supply and from controlling toward managing any disruptions to the sea lines of communication. The book is the most detailed and accurate look to date at how China has hedged its energy bets and how its behavior fits a hedging pattern.

Security and Trust Management: 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings (Lecture Notes in Computer Science #11738)

by Sjouke Mauw Mauro Conti

This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions. The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.

Security as Practice: Discourse Analysis and the Bosnian War (New International Relations)

by Lene Hansen

This important text offers a full and detailed account of how to use discourse analysis to study foreign policy. It provides a poststructuralist theory of the relationship between identity and foreign policy and an in-depth discussion of the methodology of discourse analysis. Part I offers a detailed discussion of the concept of identity, the intertextual relationship between official foreign policy discourse and oppositional and media discourses and of the importance of genres for authors' ability to establish themselves as having authority and knowledge. Lene Hansen devotes particular attention to methodology and provides explicit directions for how to build discourse analytical research designs Part II applies discourse analytical theory and methodology in a detailed analysis of the Western debate on the Bosnian war. This analysis includes a historical genealogy of the Western construction of the Balkans as well as readings of the official British and American policies, the debate in the House of Commons and the US Senate, Western media representations, academic debates and travel writing and autobiography. Providing an introduction to discourse analysis and critical perspectives on international relations, this book will be essential reading for students and scholars of international relations, discourse analysis and research methodology.

Security beyond the State

by Rita Abrahamsen Michael C. Williams

Across the globe, from mega-cities to isolated resource enclaves, the provision and governance of security takes place within assemblages that are de-territorialized in terms of actors, technologies, norms and discourses. They are embedded in a complex transnational architecture, defying conventional distinctions between public and private, global and local. Drawing on theories of globalization and late modernity, along with insights from criminology, political science and sociology, Security Beyond the State maps the emergence of the global private security sector and develops a novel analytical framework for understanding these global security assemblages. Through in-depth examinations of four African countries - Kenya, Nigeria, Sierra Leone and South Africa - it demonstrates how global security assemblages affect the distribution of social power, the dynamics of state stability, and the operations of the international political economy, with significant implications for who gets secured and how in a global era.

Security Capital Pacific Trust: A Case for Branding

by Susan Fournier

A real estate operations and investment trust is considering whether it should pursue branding as a strategic investment. Through interpretation of case data and video from focus groups, students deduce the consumer (cognitive, psychological, and economic), environmental, and company factors that are conducive to branding, thereby illuminating their understanding of when it makes sense to brand. Analysis of extensive survey data allows students to consider the secondary question about how to brand as they formulate brand-positioning recommendations. Includes color exhibits.

Security Capital Pacific Trust: A Case for Branding

by Susan Fournier

A real estate operations and investment trust is considering whether it should pursue branding as a strategic investment. Through interpretation of case data and video from focus groups, students deduce the consumer (cognitive, psychological, and economic), environmental, and company factors that are conducive to branding, thereby illuminating their understanding of when it makes sense to brand. Analysis of extensive survey data allows students to consider the secondary question about how to brand as they formulate brand-positioning recommendations. Includes color exhibits.

The Security Council as Global Legislator (Global Institutions)

by Trudy Fraser Vesselin Popovski

Security Council resolutions have undergone an important evolution over the last two decades. While continuing its traditional role of determining state-specific threats to peace and engaging accordingly in various peaceful or coercive measures, the Security Council has also adopted resolutions that have effectively imposed legal obligations on all United Nations member states. This book seeks to move away from the discussions of whether the Security Council – in the current composition and working methods – is representative, capable or productive. Rather it assesses whether legislative activity by the Security Council can be beneficial to international peace and security. The authors examine and critique the capacities of the Security Council to address thematic international threats - such as terrorism, weapons proliferations, targeting of civilians, recruitment of child soldiers, piracy – as an alternative to the traditional model of addressing country-specific situations on a case-by-case basis. Ultimately, the book seeks to assess the efficacy of the Security Council as global legislator in terms of complementing the Security Council’s mandate for the maintenance of international peace and security with a preventative and norm-setting capacity. The book presents views from a diverse range of Security Council stakeholders including academic scholars, political analysts, and international lawyers. This resource will be of great interest to students of international relations, international organizations and international security studies alike.

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

by Hilary Walton

Security Culture starts from the premise that, even with good technical tools and security processes, an organisation is still vulnerable without a strong culture and a resilient set of behaviours in relation to people risk. Hilary Walton combines her research and her unique work portfolio to provide proven security culture strategies with practical advice on their implementation. And she does so across the board: from management buy-in, employee development and motivation, right through to effective metrics for security culture activities. There is still relatively little integrated and structured advice on how you can embed security in the culture of your organisation. Hilary Walton draws all the best ideas together, including a blend of psychology, risk and security, to offer a security culture interventions toolkit from which you can pick and choose as you design your security culture programme - whether in private or public settings. Applying the techniques included in Security Culture will enable you to introduce or enhance a culture in which security messages stick, employees comply with policies, security complacency is challenged, and managers and employees understand the significance of this critically important, business-as-usual, function.

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer

by Perry Carpenter Kai Roer

Mitigate human risk and bake security into your organization&’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture. The topic of security culture is mysterious and confusing to most leaders. But it doesn&’t have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer, two veteran cybersecurity strategists deliver experience-driven, actionable insights into how to transform your organization&’s security culture and reduce human risk at every level. This book exposes the gaps between how organizations have traditionally approached human risk and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization. The book offers: An expose of what security culture really is and how it can be measured A careful exploration of the 7 dimensions that comprise security culture Practical tools for managing your security culture program, such as the Security Culture Framework and the Security Culture Maturity Model Insights into building support within the executive team and Board of Directors for your culture management programAlso including several revealing interviews from security culture thought leaders in a variety of industries, The Security Culture Playbook is an essential resource for cybersecurity professionals, risk and compliance managers, executives, board members, and other business leaders seeking to proactively manage and reduce risk.

Security De-Engineering: Solving the Problems in Information Risk Management

by Ian Tibble

As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems i

Refine Search

Showing 99,501 through 99,525 of 100,000 results