65 results on '"Vellani, Karim H."'
Search Results
2. Risk Assessments
3. Identifying Assets in Need of Protection
4. Crime Prevention Theories
5. Strategic Security Management
6. Security Measures
7. Crime Analysis
8. Data-Driven Security
9. Threat Assessments
10. Project Management
11. The Need for Effective Consulting Websites
12. Security measures
13. Asset identification and security inventory
14. Risk assessments
15. Crime analysis
16. Prevention
17. Introduction
18. Vulnerability assessments
19. Project management
20. Threat assessments
21. Data-driven security
22. Security's critical role in combating sex trafficking.
23. Results of the 2020 Healthcare Crime Survey.
24. Evidence, anecdotes, and actions: A summary of the 2019 Healthcare Crime Survey and other IAHSS Foundation research.
25. A refined model for estimating the industry-average number of security staff for hospitals.
26. Chapter 5 - The Need for Effective Consulting Websites
27. Don't Let Your Guard Down
28. Information Security: A Guide to Protecting Your Information and Computer Systems from Hackers
29. Security + Service = Satisfaction
30. CRIME Stoppers
31. Violence against healthcare workers: persistent trends and appropriate responses.
32. Principles of Security Management
33. The battle against violence in U.S. hospitals: an analysis of the recent IAHSS Foundation's healthcare crim e surveys.
34. A data-driven model for estimating industry average numbers of hospital security staff.
35. The 2014 IHSSF crime survey.
36. Reducing violence in healthcare facilities.
37. Security Convergence: Managing Enterprise Security Risks
38. Critical Infrastructure: Homeland Security and Emergency Preparedness
39. Demystifying Terrorism: Terrorism Awareness Training Course
40. Computer Security: 20 Things Every Employee Should Know
41. Staffing benchmarks: a model for determining how many security officers are enough.
42. For healthcare security professionals: using crime analysis to solve problems in 15 small steps.
43. Enterprise Security with EJB and CORBA. (Reviews)
44. Foreword.
45. Identity Theft Handbook: Detection, Prevention, and Security.
46. Enterprise Security (Book).
47. Information Security (Book Review).
48. The battle against violence in U.S. hospitals: an analysis of the recent I IAHSS Foundation's healthcare crime surveys.
49. Vulnerability and risk assessment in the environment of care.
50. The gentle art of threat assessment.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.