


Originally inspired by the horrific evacuation challenges of 9/11, this groundbreaking book is the result of 10 years of research into global best practices for getting everyone out safely — every time!
- First ever, all-in-one, practical resource for evacuating people of all ages and health conditions from all kinds of workplaces, including small offices, skyscrapers, business and college campuses, industrial plants, stores, hospitals, and schools.

These new tools for Colleges and Universities; Public and Private K-12 Schools; Manufacturing and Distribution; and, for Businesses of all types and sizes give you what you need to get your Business Continuity, Crisis Management and Resilience programs going!
Collect information and evaluate your business environment, identify and reduce risks, analyze business operations, analyze alternatives to respond to disruptions, develop a comprehensive Business Continuity Plan, and to prepare for and respond to hazards-specific events with The Template for Comprehensive Business Continuity Management to Enhance Your Organization’s Resilience.
In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider’s The Manager’s Guide to Cybersecurity Law: Essentials for Today’s Business, lets you integrate legal issues into your security program.
Tari Schreider, a board-certified information security practitioner with a criminal justice administration background, has written a much-needed book that bridges the gap between cybersecurity programs and cybersecurity law. He says, “My nearly 40 years in the fields of cybersecurity, risk management, and disaster recovery have taught me some immutable truths. One of these truths is that failure to consider the law when developing a cybersecurity program results in a protective façade or false sense of security.”

A failure or accident brings your business to a sudden halt. How did it happen? What is at the root of the problem? What keeps it from happening again? Good…

So much to learn – so little time. You are committed to creating a strong organization, ready to survive under all conditions. You need expert advice for best practices…

Information Security Policies Made Easy is the “gold standard” information security policy template library, with over 1500 pre-written information security policies covering 200+ security topics. Based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with 10,000+ customers in 60 countries. Take the work out of creating, writing, and implementing security policies.
Information Security Policies Made Easy has everything you need to build a robust security policy program, delivered by electronic download.

Collect information and evaluate your business environment, identify and reduce risks, analyze business operations, analyze alternatives to respond to disruptions, develop a comprehensive Business Continuity Plan, and to prepare for and respond to hazards-specific events with The Template for Comprehensive Business Continuity Management to Enhance Your Organization’s Resilience.

Check out Rothstein Publishing 's latest eBook Collection titles! Here are a few of our newest titles:
The Manager's Guide to Terrorism, Risk, and Insurance: Essentials for Today's Business
As a manager, you're aware of terrorist acts, are considering the risks, but sense that you need more background. How might terrorism occur? How is it part of risk and threat planning? What insurance strategies might protect your company from financial loss? In a few short chapters, The Manager's Guide to Terrorism, Risk, and Insurance: Essentials for Today'™s Business fills in the blanks for you.
Information Security Policies Made Easy is the “gold standard” information security policy template library, with over 1500 pre-written information security policies covering over 200 security topics. Based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with over 10,000 customers in 60 countries. Take the work out of creating, writing, and implementing security policies.
Information Security Policies Made Easy has everything you need to build a robust security policy program.