0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (7)
  • R500+ (299)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General

Gender and Private Security in Global Politics (Hardcover): Maya Eichler Gender and Private Security in Global Politics (Hardcover)
Maya Eichler
R3,872 Discovery Miles 38 720 Ships in 12 - 19 working days

For two hundred years the provision of military security has been a central and defining function of the modern nation-state. The increasing reliance on private military and security companies in contemporary conflict marks a fundamental transformation in the organization of military violence, and it raises issues of accountability and ethics that are of particular concern to feminists. This privatization of force not only enables states to circumvent citizens' democratic control over questions of war and peace, but also undermines women's and minority groups' claims for greater inclusion in the military sphere. Gender and Private Security in Global Politics brings together key scholars from the fields of international relations, security studies, and gender studies to argue that privatization of military security is a deeply gendered process. The chapters employ a variety of feminist perspectives, including critical, postcolonial, poststructuralist, and queer feminist perspectives, as well as a wide range of methodological approaches including ethnography, participant-observation, genealogy, and discourse analysis. This is the first book to develop an extended feminist analysis of private militaries and to draw on feminist concerns regarding power, justice and equality to consider how to reform and regulate private forces.

The Enforcers - Inside Cape Town's Deadly Nightclub Battles (Paperback): Caryn Dolley The Enforcers - Inside Cape Town's Deadly Nightclub Battles (Paperback)
Caryn Dolley 1
R295 R250 Discovery Miles 2 500 Save R45 (15%) In Stock

Here is the Cape Town underworld laid bare, explored through the characters who control the protection industry, the bouncers and security at nightclubs and strip clubs.

At the centre of this turf war is Nafiz Modack, the latest kingpin to have seized control of the industry, a man often in court on various charges, including extortion. Investigative journalist Caryn Dolley has followed Modack and his predecessors for six years as power has shifted in the nightclub security industry, and she focuses on how closely connected the criminal underworld is with the police services. In this suspenseful page turner of an investigation, she writes about the overlapping of the state with the underworld, the underworld with the upperworld, and how the associated violence is not confined to specific areas of Cape Town, but is happening inside hospitals, airports, clubs and restaurants and putting residents at risk.

A book that lays bare the myth that violence and gangsterism in Cape Town is confined to the ganglands of the Cape Flats, wherever you find yourself, you’re only a hair’s breadth away from the enforcers.

Multllinguallsm, the Judicial Authority and Security Services - Belgium, Europe, South Africa, Southern Africa (Paperback): Kas... Multllinguallsm, the Judicial Authority and Security Services - Belgium, Europe, South Africa, Southern Africa (Paperback)
Kas Deprez, Theo du Plessis, Lut Teck
R610 Discovery Miles 6 100 Ships in 7 - 10 working days

This work deals with international principles regarding the use of language in the administration of justice, and looks at the way in which multilingual countries such as Belgium and Switzerland approach this complex problem. The title then compares language practice in the judiciary and security services in South Africa and some countries of the Southern African Development Community against the background of evolving language policy in the region. This title discusses the use of official languages in a specific domain of government from the point of view that a language cannot be regarded as official simplu because a constitution prescribes it. Important conclusions are drawn regarding the role of the multilingual state.

Journalism and the Nsa Revelations - Privacy, Security and the Press (Hardcover): Adrienne Russell, Risto Kunelius, Heikki... Journalism and the Nsa Revelations - Privacy, Security and the Press (Hardcover)
Adrienne Russell, Risto Kunelius, Heikki Heikkila, Dmitry Yagodin
R3,609 Discovery Miles 36 090 Ships in 12 - 19 working days

Edward Snowden's revelations about the mass surveillance capabilities of the US National Security Agency (NSA) and other security services triggered an ongoing debate about the relationship between privacy and security in the digital world. This discussion has been dispersed into a number of national platforms, reflecting local political realities but also raising questions that cut across national public spheres. What does this debate tell us about the role of journalism in making sense of global events? This book looks at discussions of these debates in the mainstream media in the USA, United Kingdom, France, Germany, Russia and China. The chapters focus on editorials, commentaries and op-eds and look at how opinion-based journalism has negotiated key questions on the legitimacy of surveillance and its implications to security and privacy. The authors provide a thoughtful analysis of the possibilities and limits of 'transnational journalism' at a crucial time of political and digital change.

Emergency Notification (Hardcover): Robert C. Chandler Emergency Notification (Hardcover)
Robert C. Chandler
R1,744 Discovery Miles 17 440 Ships in 10 - 15 working days

This text provides critical information to help organizations improve their emergency communications, including the tools, automation technology, and processes of crisis notification. To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain the situation, campus personnel need to communicate immediately and efficiently, not only with the students, faculty, and staff, but also the local police, federal law enforcement, and media. Effective emergency notification makes things "right," it allows the right message to reach the right people at the right time—facilitating the right response. Emergency Notification explains how. This book offers must-know information for business security, senior management, human resources staff, government policymakers, and emergency planners, examining what, when, how, why, and with whom to communicate during crises. This text also covers risk communication, message mapping, information loading, audience comprehension, and practical issues like testing emergency notification systems.

Patriotic Information Systems (Hardcover): Todd Loendorf, G.David Garson Patriotic Information Systems (Hardcover)
Todd Loendorf, G.David Garson
R2,934 Discovery Miles 29 340 Ships in 12 - 19 working days

Database technology can be used for various ends, ranging from promotion of democracy to strengthening of nationalism to shoring up authoritarian regimes through misinformation. Its use affects every layer of society: from individuals to households to local governments, and is a consuming issue in the United States Governments stance on privacy, security, and technology.

Technology Development for Security Practitioners (Hardcover, 1st ed. 2021): Babak Akhgar, Dimitrios Kavallieros, Evangelos... Technology Development for Security Practitioners (Hardcover, 1st ed. 2021)
Babak Akhgar, Dimitrios Kavallieros, Evangelos Sdongos
R3,108 Discovery Miles 31 080 Ships in 10 - 15 working days

This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com

Secure Electronic Transactions - Introduction and Technical Reference (Hardcover): Larry Loeb Secure Electronic Transactions - Introduction and Technical Reference (Hardcover)
Larry Loeb
R2,331 Discovery Miles 23 310 Ships in 10 - 15 working days

This detailed volume and accompanying CD-ROM focus on the set electronic transaction (SET) system and review the fundamentals through to practical instruction on how to develop and implement the entire SET system. Topics addressed include: electronic commerce and the various payment and security systems that have led to online credit card commerce; cryptographic extensions utilized by the SET system; and the technical details behind SET, from purchase initiation, through certificate management, to data transport protocols. Actual programming examples and computer code to construct and roll out the SET system are also included. The book should be of interest to business executives as well as engineers.

The Privatization of Police in America - An Analysis and Case Study (Paperback): James F. Pastor The Privatization of Police in America - An Analysis and Case Study (Paperback)
James F. Pastor
R992 R731 Discovery Miles 7 310 Save R261 (26%) Ships in 12 - 19 working days

Today the private security industry employs approximately 1.5 million people and spends over USD52 billion annually. In contrast, public police forces employ approximately 600,000 people and spend USD30 billion annually. Private policing promises to be a big part of the response to today's increased security concerns, as citizens realize that security is much more than the presence of guards and the perception of safety. This book addresses the impact and implications of private policing on public streets, and begins with a look at private policing from conceptual, historical, economic, legal and functional perspectives. These approaches provide the background for the text, which focuses on a private policing patrol program in a community on the south side of Chicago. The text also demonstrates a number of substantive legal and public policy issues which directly or indirectly relate to the provision of security services; some people see the need for a ""dual system"" of policing - one for the wealthy and one for the poor - and others see the provision of private security as the primary protective resource in contemporary America. The author also examines how private policing is different from and similar to public policing.

How Safe Are Our Skies? - Assessing the Airlines' Response to Terrorism (Hardcover): Rodney Wallis How Safe Are Our Skies? - Assessing the Airlines' Response to Terrorism (Hardcover)
Rodney Wallis
R1,645 Discovery Miles 16 450 Ships in 10 - 15 working days

The September 11, 2001, attacks on the World Trade Center and the Pentagon raised numerous questions about American and international aviation security. Former Director of Security of the International Air Transport Association Rodney Wallis suggests that the failure to maximize U.S. domestic air security, which left air travelers vulnerable to attack, lay largely with the carriers themselves. He contends that future policies should parallel the standards of the International Civil Aviation Organization. Wallis considers the Aviation and Transportation Security Act adopted by the U.S. Congress in the wake of September 11 and offers a modus operandi to the FAA that would enable them to maximize the benefits this legislation provides to air travelers.

This important work reviews past government reactions to the threat posed by air terrorism and questions whether these were effective responses or merely window dressing. It also includes practical advice for air travelers on how to maximize their own security when flying on international routes by monitoring airport and airline security for themselves.

Terror, Security, and Money - Balancing the Risks, Benefits, and Costs of Homeland Security (Hardcover, New): John Mueller,... Terror, Security, and Money - Balancing the Risks, Benefits, and Costs of Homeland Security (Hardcover, New)
John Mueller, Mark Stewart
R4,455 Discovery Miles 44 550 Ships in 12 - 19 working days

In seeking to evaluate the efficacy of post-9/11 homeland security expenses--which have risen by more than a trillion dollars, not including war costs--the common query has been, "Are we safer?" This, however, is the wrong question. Of course we are "safer"--the posting of a single security guard at one building's entrance enhances safety. The correct question is, "Are any gains in security worth the funds expended?"
In this engaging, readable book, John Mueller and Mark Stewart apply risk and cost-benefit evaluation techniques to answer this very question. This analytical approach has been used throughout the world for decades by regulators, academics, and businesses--but, as a recent National Academy of Science study suggests, it has never been capably applied by the people administering homeland security funds. Given the limited risk terrorism presents, expenses meant to lower it have for the most part simply not been worth it. For example, to be considered cost-effective, increased American homeland security expenditures would have had each year to have foiled up to 1,667 attacks roughly like the one intended on Times Square in 2010--more than four a day. Cataloging the mistakes that the US has made--and continues to make--in managing homeland security programs, Terror, Security, andMoney has the potential to redirect our efforts toward a more productive and far more cost-effective course.

The Handbook of Security (Hardcover): Martin Gill The Handbook of Security (Hardcover)
Martin Gill
R4,726 Discovery Miles 47 260 Ships in 12 - 19 working days

"The Handbook of Security "is essential reading for all those engaged with the security world. This in-depth book collates the best research available for the security academic and professional. The book is divided into five parts. It begins with the study of security as a discipline, assessing the contribution made by different subject areas to the study of security. The second part looks as crime in organizations. The third part analyzes the various sub-sectors of security. A section on management issues precedes the final section looking at a mage of issues that impact on security.

Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback): Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback)
Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee
R1,088 Discovery Miles 10 880 Ships in 9 - 17 working days

* Offers context while providing a coherent, applied overview of a wide range of suspect vulnerabilities and how to address them when interviewing * Serves as a practical guide to interviewing vulnerable suspects for both uniform police and detectives. * The only book on interviewing vulnerable suspects that includes the most up-to-date legal considerations and challenges of modern society

Security Intelligence Services in New Democracies - The Czech Republic, Slovakia and Romania (Hardcover, New title): K.... Security Intelligence Services in New Democracies - The Czech Republic, Slovakia and Romania (Hardcover, New title)
K. Williams, D. Deletant
R1,609 Discovery Miles 16 090 Ships in 10 - 15 working days

The first account of the secret police in Eastern Europe after 1989, this book uses a wide range of sources, including archives, to identify what has and has not changed since the end of Communism. After explaining the structure and workings of two of the area's most feared services, Czechoslovakia's StB and Romania's Securitate, the authors detail the creation of new security intelligence institutions, the development of contacts with the West, and forms of democratic control.

Computational Intelligence for Cybersecurity Management and Applications (Hardcover): Yassine Maleh, Mamoun Alazab, Soufyane... Computational Intelligence for Cybersecurity Management and Applications (Hardcover)
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
R3,415 Discovery Miles 34 150 Ships in 9 - 17 working days

1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.

Private Security Law - Case Studies (Hardcover): David Maxwell Private Security Law - Case Studies (Hardcover)
David Maxwell
R2,111 Discovery Miles 21 110 Ships in 12 - 19 working days

Private Security Law: Case Studies is uniquely designed for the special needs of private security practitioners, students, and instructors. Part One of the book encompasses negligence, intentional torts, agency contracts, alarms, and damages. Part Two covers authority of the private citizen, deprivation of rights, and entrapment.
The factual cases presented in this book touch on the everyday duties of persons associated with the private security industry. Private Security Law: Case Studies provides a basic orientation to problems capable of inciting litigation. The information presented through case laws comes from cases chosen for their factual, realistic, and practical connection to the private security industry. This focused approach addresses specific problem areas of the industry and provides information necessary to a security manager to avert future loss.
Specially designed for private security practitioners, instructors, and students.
Examines cases that are practical, realistic and relevant to specific areas of private security.
Provides the information security managers need to avoid future problems.

Cognitive Risk (Paperback): James Bone, Jessie H Lee Cognitive Risk (Paperback)
James Bone, Jessie H Lee
R1,128 Discovery Miles 11 280 Ships in 12 - 19 working days

Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.

Geospatial Technologies and Homeland Security - Research Frontiers and Future Challenges (Hardcover, 2008 ed.): Daniel Sui Geospatial Technologies and Homeland Security - Research Frontiers and Future Challenges (Hardcover, 2008 ed.)
Daniel Sui
R5,992 R4,757 Discovery Miles 47 570 Save R1,235 (21%) Ships in 12 - 19 working days

Homeland security and context In the Geographical Dimensions of Terrorism (GDOT) (Cutter et al. 2003), the first book after 9/11 to address homeland security and geography, we developed several thematic research agendas and explored intersections between geographic research and the importance of context, both geographical and political, in relationship to the concepts of terrorism and security. It is good to see that a great deal of new thought and research continues to flow from that initial research agenda, as illustrated by many of the papers of this new book, entitled Geospatial Technologies and Homeland Security: Research Frontiers and Future Challenges. Context is relevant not only to understanding homeland security issues broadly, but also to the conduct of research on geospatial technologies. It is impossible to understand the implications of a homeland security strategy, let alone hope to make predictions, conduct meaningful modeling and research, or assess the value and dangers of geospatial technologies, without consideration of overarching political, social, economic, and geographic contexts within which these questions are posed.

PKI Implementation and Infrastructures (Paperback): Julian Ashbourn PKI Implementation and Infrastructures (Paperback)
Julian Ashbourn
R1,185 Discovery Miles 11 850 Ships in 9 - 17 working days

1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback)
Alan Tang
R1,436 Discovery Miles 14 360 Ships in 12 - 19 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback): Andrew Jenkinson Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback)
Andrew Jenkinson
R950 Discovery Miles 9 500 Ships in 9 - 17 working days

- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.

Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition)
Nick Catrantzos
R4,058 Discovery Miles 40 580 Ships in 9 - 17 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

Introduction to Terrorism (Hardcover): David H. McElreath, Carl J. Jensen, Michael Wigginton, Chester L. Quarles, Stephen... Introduction to Terrorism (Hardcover)
David H. McElreath, Carl J. Jensen, Michael Wigginton, Chester L. Quarles, Stephen Mallory
R2,508 R2,359 Discovery Miles 23 590 Save R149 (6%) Ships in 12 - 19 working days

It can take the form of a Molotov Cocktail or a Suicide Bomber detonating within a crowd. It can be a sophisticated electronic explosive device or a bomb in a shoe. Today's terrorism threats, and their constant assault on global security continues to be a menace of great concern.

Providing a hands-on look inside the ugly, blood-stained world of global terrorism, Introduction to Terrorism covers the evolution of terrorism, its growing sophistication, and its cynical indifference to human life. It begins by covering the history of terrorism and showing how the threats have changed since the September 11, 2001 attacks. It examines the methods America has chosen to guard against and deal with these threats using its military, government, and civilian agencies.

Illustrating and examining current and future challenges, this state-of-the-art text follows a flow model developed and successfully taught in the classroom at several colleges and universities. Designed to follow the standard academic semester (one chapter per week), the book's content, style, presentation, and organization have been class-tested and validated.

Next-Generation Enterprise Security and Governance (Hardcover): Mohiuddin Ahmed, Nour Moustafa, Abu Barkat, Paul Haskell-Dowland Next-Generation Enterprise Security and Governance (Hardcover)
Mohiuddin Ahmed, Nour Moustafa, Abu Barkat, Paul Haskell-Dowland
R2,734 Discovery Miles 27 340 Ships in 9 - 17 working days

The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises' advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today's age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.

Nonproliferation Issues For Weapons of Mass Destruction (Hardcover): Mark A. Prelas, Michael Peck Nonproliferation Issues For Weapons of Mass Destruction (Hardcover)
Mark A. Prelas, Michael Peck
R5,788 Discovery Miles 57 880 Ships in 12 - 19 working days

Nonproliferation Issues for Weapons of Mass Destruction provides an understanding of WMD proliferation risks by bridging complex technical and political issues. The text begins by defining the world conditions that foster proliferation, followed by an analysis of characteristics of various classes of WMDs, including nuclear, biological, and chemical weapons. It then explores the effectiveness of arms control, discussing current nonproliferation problems, nonproliferation prior to the fall of the USSR, and weapons safeguards.
The book analyzes the future of these weapons, discussing delivery systems and potential use by states, terrorist groups, and individuals. The text concludes with a discussion of what can be done to limit the impact of WMDs. This volume enables a realistic understanding of the relative risks that WMDs present to our way of life.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
An Essay Concerning Human Understanding…
John Locke Paperback R575 Discovery Miles 5 750
A Few Days in Athens - Being the…
Frances Wright Paperback R456 Discovery Miles 4 560
The Last Time I Saw Paris
Elliot Paul Paperback R472 R394 Discovery Miles 3 940
Soldiers - Great Stories Of War And…
Max Hastings Paperback R350 Discovery Miles 3 500
People's War - New Light On The Struggle…
Anthea Jeffery Paperback  (1)
R320 R271 Discovery Miles 2 710
Yale Needs Women - How the First Group…
Anne Gardiner Perkins Paperback R455 Discovery Miles 4 550
The Academic Questions - Treatise De…
Marcus Tullius Cicero Paperback R725 Discovery Miles 7 250
Media ethics in South African context…
Lucas M. Oosthuizen Paperback  (1)
R569 R536 Discovery Miles 5 360
An Essay Concerning Human Understanding
John Locke Paperback R842 Discovery Miles 8 420
My Friend Anne Frank
Hannah Pick-Goslar Paperback R476 Discovery Miles 4 760

 

Partners