![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
In the latest edition, Philip Walker not only tackles the
electronic aspect of the design of a security system, but also
examines the human factor in such systems. In his own words:
'Electronic aids are added to enable security officers to do their
jobs better, but not to do their jobs for them'.
For two hundred years the provision of military security has been a central and defining function of the modern nation-state. The increasing reliance on private military and security companies in contemporary conflict marks a fundamental transformation in the organization of military violence, and it raises issues of accountability and ethics that are of particular concern to feminists. This privatization of force not only enables states to circumvent citizens' democratic control over questions of war and peace, but also undermines women's and minority groups' claims for greater inclusion in the military sphere. Gender and Private Security in Global Politics brings together key scholars from the fields of international relations, security studies, and gender studies to argue that privatization of military security is a deeply gendered process. The chapters employ a variety of feminist perspectives, including critical, postcolonial, poststructuralist, and queer feminist perspectives, as well as a wide range of methodological approaches including ethnography, participant-observation, genealogy, and discourse analysis. This is the first book to develop an extended feminist analysis of private militaries and to draw on feminist concerns regarding power, justice and equality to consider how to reform and regulate private forces.
Here is the Cape Town underworld laid bare, explored through the characters who control the protection industry, the bouncers and security at nightclubs and strip clubs. At the centre of this turf war is Nafiz Modack, the latest kingpin to have seized control of the industry, a man often in court on various charges, including extortion. Investigative journalist Caryn Dolley has followed Modack and his predecessors for six years as power has shifted in the nightclub security industry, and she focuses on how closely connected the criminal underworld is with the police services. In this suspenseful page turner of an investigation, she writes about the overlapping of the state with the underworld, the underworld with the upperworld, and how the associated violence is not confined to specific areas of Cape Town, but is happening inside hospitals, airports, clubs and restaurants and putting residents at risk. A book that lays bare the myth that violence and gangsterism in Cape Town is confined to the ganglands of the Cape Flats, wherever you find yourself, you’re only a hair’s breadth away from the enforcers.
Eight previous iterations of this text have proven to be highly regarded and considered the definitive training guide and instructional text for first-line security officers in both the private and public sectors. The material included in the newest version covers all the subjects essential to the training of protection officers. This valuable resource and its predecessors have been utilized worldwide by the International Foundation for Protection Officers since 1988, as the core curriculum for the Certified Protection Officer (CPO) Program. The Professional Protection Officer: Practical Security Strategies and Emerging Trends provides critical updates and fresh guidance, as well as diagrams and illustrations; all have been tailored to the training and certification needs of today's protection professionals.
Women in the Security Profession: A Practical Guide for Career Development is a resource for women considering a career in security, or for those seeking to advance to its highest levels of management. It provides a historical perspective on how women have evolved in the industry, as well as providing real-world tips and insights on how they can help shape its future. The comprehensive text helps women navigate their security careers, providing information on the educational requirements necessary to secure the wide-ranging positions in today's security field. Women in the Security Profession describes available development opportunities, offering guidance from experienced women professionals who have risen through the ranks of different security sectors.
Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or managerial positions. Covering everything needed from how to work with today's generation security force employees to the latest advances in the security industry, Security Supervision and Management, Fourth Edition, shows security officers how to become a more efficient and well-rounded security professional. Security Supervision and Management, Fourth Edition, is also the only text needed to prepare for the Certified in Security Supervision and Management (CSSM) designation offered by International Foundation for Protection Officers (IFPO). The IFPO also publishes The Professional Protection Officer: Practical Security Strategies and Emerging Trends, now in its 8th edition.
Since 9/11, business and industry has paid close attention to
security within their own organizations. In fact, at no other time
in modern history has business and industry been more concerned
with security issues. A new concern for security measures to combat
potential terrorism, sabotage, theft and disruption -- which could
bring any business to it's knees --has swept the nation. This has
opened up a huge opportunity for private investigators and security
professionals as consultants. Many retiring law enforcement and
security management professionals look to enter the private
security consulting market. Security consulting often involves
conducting in-depth security surveys so businesses will know
exactly where security holes are present and where they need
improvement to limit their exposure to various threats. The fourth
edition of "Security Consulting" introduces security and law
enforcement professionals to the career and business of security
consulting. It provides new and potential consultants with the
practical guidelines needed to start up and maintain a successful
independent practice. Updated and expanded information is included
on marketing, fees and expenses, forensic consulting, the use of
computers, and the need for professional growth.Useful sample forms
have been updated in addition tonew promotion opportunities and
keys to conducting research on the Web. - The only book of its kind dedicated to beginning a security consulting practice from the ground-up - Proven, practical methods to establish and run a security consulting business - Newchapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet - The most up-to-date best practices from the IAPSC"
Edward Snowden's revelations about the mass surveillance capabilities of the US National Security Agency (NSA) and other security services triggered an ongoing debate about the relationship between privacy and security in the digital world. This discussion has been dispersed into a number of national platforms, reflecting local political realities but also raising questions that cut across national public spheres. What does this debate tell us about the role of journalism in making sense of global events? This book looks at discussions of these debates in the mainstream media in the USA, United Kingdom, France, Germany, Russia and China. The chapters focus on editorials, commentaries and op-eds and look at how opinion-based journalism has negotiated key questions on the legitimacy of surveillance and its implications to security and privacy. The authors provide a thoughtful analysis of the possibilities and limits of 'transnational journalism' at a crucial time of political and digital change.
Database technology can be used for various ends, ranging from promotion of democracy to strengthening of nationalism to shoring up authoritarian regimes through misinformation. Its use affects every layer of society: from individuals to households to local governments, and is a consuming issue in the United States Governments stance on privacy, security, and technology.
This text provides critical information to help organizations improve their emergency communications, including the tools, automation technology, and processes of crisis notification. To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain the situation, campus personnel need to communicate immediately and efficiently, not only with the students, faculty, and staff, but also the local police, federal law enforcement, and media. Effective emergency notification makes things "right," it allows the right message to reach the right people at the right time—facilitating the right response. Emergency Notification explains how. This book offers must-know information for business security, senior management, human resources staff, government policymakers, and emergency planners, examining what, when, how, why, and with whom to communicate during crises. This text also covers risk communication, message mapping, information loading, audience comprehension, and practical issues like testing emergency notification systems.
This practical reference provides the basics for instituting a
corporate anti-fraud program that helps prepare corporate security
professionals and other corporate managers for fighting corporate
fraud from inside the company. It provides an exceptional
foundation for security professionals or business executives
involved in developing and implementing a corporate anti-fraud
program as part of a corporate assets protection program.
This book addresses public safety and security from a holistic and
visionary perspective. For the first time, safety and security
organizations, as well as their administration, are brought
together into an integrated work.
Model Security Policies, Plans, and Procedures contains sample
security policy, planning, and procedural documents drawn from the
proven experiences of hundreds of America's most successful
corporations. If your job requires you to develop or update
security policies, plans, or procedures, this book will be a highly
valuable resource. The samples cover the key concepts of
organizational protection. Putting the samples to use, either as
presented or as drafting guides, can eliminate many hours of
tedious research and writing.
This book describes the risk management methodology as a specific
process, a theory, or a procedure for determining your assets,
vulnerabilities, and threats and how security professionals can
protect them. Risk management is essentially a process methodology that will
provide a cost-benefit payback factor to senior management.
This detailed volume and accompanying CD-ROM focus on the set electronic transaction (SET) system and review the fundamentals through to practical instruction on how to develop and implement the entire SET system. Topics addressed include: electronic commerce and the various payment and security systems that have led to online credit card commerce; cryptographic extensions utilized by the SET system; and the technical details behind SET, from purchase initiation, through certificate management, to data transport protocols. Actual programming examples and computer code to construct and roll out the SET system are also included. The book should be of interest to business executives as well as engineers.
Private Security Law: Case Studies is uniquely designed for the
special needs of private security practitioners, students, and
instructors. Part One of the book encompasses negligence,
intentional torts, agency contracts, alarms, and damages. Part Two
covers authority of the private citizen, deprivation of rights, and
entrapment.
This is a truly unique collection of 39 articles written by
authorities or based on authoritative research. It goes beyond
locks, lighting, and alarms to offer provocative viewpoints on a
variety of security topics. The book looks beyond everyday applications and routines to an
understanding of the social significance of careers in security. It
will be of interest to practitioners in all sectors as well as
students at all levels.
There have been a number of EU military operations in the last few years, evidence of a growing European military confidence, which in turn is a reflection of a developing competence in security matters. The creation of the European Union and its Common Foreign and Security Policy by the Maastricht Treaty of 1992 heralded this development, though the idea of a common defense can be traced to the beginnings of European integration. This book provides an analysis of the EU's evolving legal framework and powers on such matters, but it also recognizes that such a framework sits, sometimes uneasily, within the wider body of EU and International Law. The EU's security and defense policy also overlaps with those of other organizations such as the Organization for Security and Cooperation in Europe (OSCE), but more especially the North Atlantic Treaty Organization (NATO). EU relations with NATO have, in particular, caused some concern and are still evolving as both organizations seek to play a wider security role in the post-Cold War, and now post-9/11, era. With security now dominating political agendas at the domestic, regional and international levels, it is no surprise that the EU's concern for security has grown, and, following the Union's respect for the rule of law, has been shaped legally as well as politically. This book evaluates the progress of the Union in this regard in its international context and in its wider context of European integration generally. The analysis is in the main a legal one, but is placed squarely within wider historical and political perspectives.
"Effective Physical Security, " Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors work that set the standard: "Handbook of Loss Prevention and Crime Prevention, " Fifth Edition. Designed for easy reference, "Effective Physical Security"
contains important coverage of environmental design, security
surveys, locks, lighting, and CCTV as well as new chapters covering
the latest in the ISO standards for Risk Assessmentand Risk
Management, physical security planning, network systems
infrastructure, and environmental design. This new edition
continues to serve as a valuable reference for experienced security
practitioners as well as students in undergraduate and graduate
security programs.
"Private Security and the Law, 4th Edition," is a unique
resource that provides analysis of practices in the security
industry as they relate to law, regulation, licensure, and
constitutional questions of case and statutory authority.This
bookdescribes the legal requirements facedin the area of private
security.It emphasizes the liability problems common to security
operations, including negligence and tortious liability, civil
actions frequently litigated, and strategies to avoid legal actions
that affect business efficiency.The textalso examines the
constitutional and due-process dimensions of private security both
domestically and internationally, including recent cases and trends
that will set pace for future private security laws and
regulations. As private security becomes more closely involved in
national and international security, cases like Blackwater are
examined. Charles Nemeth takesyou step by step through the analysis
of case law as it applies to situations commonly faced in the
private security practice, providing a solid introduction to the
legal and ethical standards that shape the industry. *Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"
With half of all new businesses failing in the first two years,
every aspect of good business planning must be considered, but loss
prevention is very often overlooked. Most small business owners
grapple with the day to day challenges of sales and marketing,
never realizing that the shadow of shrinkage is expanding daily,
waiting to reveal itself in the annual inventory results. Ravaged
by theft and paperwork losses, the already tight profit margin can
shrink into oblivion. Loss Prevention and the Small Business opens
the eyes of the reader to the reality of shrinkage in all its
guises including shoplifting, fraud, and embezzlement. Armed with
this awareness, the security specialist or owner/manager can
utilize the many strategies to both inhibit losses and aggressively
pursue those persons and processes that cause losses.
"Contemporary Security Management, 3rd Edition "teaches security
professionals how to operate an efficient security department and
how to integrate smoothly with other groups inside and outside
their own organizations. Fay demonstrates the specifics of security
management: * how to organize, plan, develop and manage a security
operation. * how to identify vulnerabilities. * how to determine
the protective resources required to offset threats. * how to
implement all necessary physical and IT security measures. Security
professionals share the responsibility for mitigating damage,
serving as a resource to an Emergency Tactical Center, assisting
the return of business continuity, and liaising with local response
agencies such as police and fire departments, emergency medical
responders, and emergency warning centers. At the organizational
level, the book addresses budgeting, employee performance,
counseling, hiring and termination, employee theft and other
misconduct, and offers sound advice on building constructive
relationships with organizational peers and company
management.
This book begins by laying out a history of espionage that clearly
shows that when a new technology or technique becomes available to
the information gatherers in public and private sectors, they can
quickly be adopted for Netspionage use. It then moves on to
describe how the Internet and associated technologies have already
revolutionized the collection and analysis of competitive
information. The convergence of dependency on networked and
exploitation tools (often propagated by "hackers," "cyberpunks,"
and even intelligence agencies) has already resulted in several
incidents that foreshadow the perilous future. Close study of these
incidents demonstrates how difficult yet how important it is to
confront the challenges of "netspionage" and its less intrusive
cousins. The authors present a set of the known incidents and then
outline protective measures that will reduce the potential and
consequences of netspionage.
Internal loss is one of the most costly forms of loss. Embezzlement
is one of the least detected and prosecuted forms of internal
theft. Preventing Corporate Embezzlement is a professional
reference that offers solutions. Managers, auditors and others
charged with protecting assets must achieve a heightened awareness
of embezzlement. They need to recognize and understand the
opportunities, methods, and varieties of embezzlement, as well as
establish internal controls that will prevent and detect
embezzlement.
The September 11, 2001, attacks on the World Trade Center and the Pentagon raised numerous questions about American and international aviation security. Former Director of Security of the International Air Transport Association Rodney Wallis suggests that the failure to maximize U.S. domestic air security, which left air travelers vulnerable to attack, lay largely with the carriers themselves. He contends that future policies should parallel the standards of the International Civil Aviation Organization. Wallis considers the Aviation and Transportation Security Act adopted by the U.S. Congress in the wake of September 11 and offers a modus operandi to the FAA that would enable them to maximize the benefits this legislation provides to air travelers. This important work reviews past government reactions to the threat posed by air terrorism and questions whether these were effective responses or merely window dressing. It also includes practical advice for air travelers on how to maximize their own security when flying on international routes by monitoring airport and airline security for themselves. |
You may like...
Security Intelligence Services in New…
K. Williams, D. Deletant
Hardcover
R1,418
Discovery Miles 14 180
Interviewing Vulnerable Suspects…
Jane Tudor-Owen, Celine van Golde, …
Paperback
R1,064
Discovery Miles 10 640
Premises Security - A Guide for Security…
William Blake, Walter F. Bradley
Paperback
R1,603
Discovery Miles 16 030
Bounty Hunters, Marshals, and Sheriffs…
Jacqueline Pope
Hardcover
|