0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R250 - R500 (7)
  • R500+ (298)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General

Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition): Philip Walker Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition)
Philip Walker
R1,992 Discovery Miles 19 920 Ships in 10 - 15 working days

In the latest edition, Philip Walker not only tackles the electronic aspect of the design of a security system, but also examines the human factor in such systems. In his own words: 'Electronic aids are added to enable security officers to do their jobs better, but not to do their jobs for them'.
Today, with the escalation of crime and growing concerns for security, there has been a great increase in the number of electronic security systems. Unfortunately, despite improvements in reliability in terms of equipment manufacture, false alarms do still occur, and they waste a large amount of police time; approximately ninety out of one hundred alarms investigated by the police are false. In the light of this, the new edition of Electronic Security Systems couldn't come at a better time, as it deals extensively with methods of reducing false alarms, allowing the police to concentrate on real breeches of security, and thus ultimately to reduce crime.
The extensive and unusual combination of experience that Philip Walker has in the world of electronics, communications and as a security consulting engineer makes him eminently qualified to tackle such subjects.
At only 30, this hardback book is an essential addition to your security collection. It has 320 pages packed with advice and technical knowledge, 40 photographs and 25 line diagrams and a good index.

Comprehensive coverage of electronic security systems
Written by an experienced security professional
Fully updated to examine new equipment with extensive help on avoiding false alarms"

Gender and Private Security in Global Politics (Hardcover): Maya Eichler Gender and Private Security in Global Politics (Hardcover)
Maya Eichler
R3,575 Discovery Miles 35 750 Ships in 10 - 15 working days

For two hundred years the provision of military security has been a central and defining function of the modern nation-state. The increasing reliance on private military and security companies in contemporary conflict marks a fundamental transformation in the organization of military violence, and it raises issues of accountability and ethics that are of particular concern to feminists. This privatization of force not only enables states to circumvent citizens' democratic control over questions of war and peace, but also undermines women's and minority groups' claims for greater inclusion in the military sphere. Gender and Private Security in Global Politics brings together key scholars from the fields of international relations, security studies, and gender studies to argue that privatization of military security is a deeply gendered process. The chapters employ a variety of feminist perspectives, including critical, postcolonial, poststructuralist, and queer feminist perspectives, as well as a wide range of methodological approaches including ethnography, participant-observation, genealogy, and discourse analysis. This is the first book to develop an extended feminist analysis of private militaries and to draw on feminist concerns regarding power, justice and equality to consider how to reform and regulate private forces.

The Professional Protection Officer - Practical Security Strategies and Emerging Trends (Paperback, 2nd edition): Sandi J.... The Professional Protection Officer - Practical Security Strategies and Emerging Trends (Paperback, 2nd edition)
Sandi J. Davies, Lawrence Fennelly
R1,374 Discovery Miles 13 740 Ships in 10 - 15 working days

Eight previous iterations of this text have proven to be highly regarded and considered the definitive training guide and instructional text for first-line security officers in both the private and public sectors. The material included in the newest version covers all the subjects essential to the training of protection officers. This valuable resource and its predecessors have been utilized worldwide by the International Foundation for Protection Officers since 1988, as the core curriculum for the Certified Protection Officer (CPO) Program. The Professional Protection Officer: Practical Security Strategies and Emerging Trends provides critical updates and fresh guidance, as well as diagrams and illustrations; all have been tailored to the training and certification needs of today's protection professionals.

Emergency Notification (Hardcover): Robert C. Chandler Emergency Notification (Hardcover)
Robert C. Chandler
R1,536 Discovery Miles 15 360 Ships in 18 - 22 working days

This text provides critical information to help organizations improve their emergency communications, including the tools, automation technology, and processes of crisis notification. To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain the situation, campus personnel need to communicate immediately and efficiently, not only with the students, faculty, and staff, but also the local police, federal law enforcement, and media. Effective emergency notification makes things "right," it allows the right message to reach the right people at the right time—facilitating the right response. Emergency Notification explains how. This book offers must-know information for business security, senior management, human resources staff, government policymakers, and emergency planners, examining what, when, how, why, and with whom to communicate during crises. This text also covers risk communication, message mapping, information loading, audience comprehension, and practical issues like testing emergency notification systems.

Women in the Security Profession - A Practical Guide for Career Development (Paperback): Sandi J. Davies Women in the Security Profession - A Practical Guide for Career Development (Paperback)
Sandi J. Davies
R1,379 Discovery Miles 13 790 Ships in 10 - 15 working days

Women in the Security Profession: A Practical Guide for Career Development is a resource for women considering a career in security, or for those seeking to advance to its highest levels of management. It provides a historical perspective on how women have evolved in the industry, as well as providing real-world tips and insights on how they can help shape its future. The comprehensive text helps women navigate their security careers, providing information on the educational requirements necessary to secure the wide-ranging positions in today's security field. Women in the Security Profession describes available development opportunities, offering guidance from experienced women professionals who have risen through the ranks of different security sectors.

Security Supervision and Management - Theory and Practice of Asset Protection (Paperback, 4th edition): Ifpo Security Supervision and Management - Theory and Practice of Asset Protection (Paperback, 4th edition)
Ifpo; Edited by Sandi J. Davies, Brion P. Gilbride, Chris A. Hertig
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or managerial positions. Covering everything needed from how to work with today's generation security force employees to the latest advances in the security industry, Security Supervision and Management, Fourth Edition, shows security officers how to become a more efficient and well-rounded security professional. Security Supervision and Management, Fourth Edition, is also the only text needed to prepare for the Certified in Security Supervision and Management (CSSM) designation offered by International Foundation for Protection Officers (IFPO). The IFPO also publishes The Professional Protection Officer: Practical Security Strategies and Emerging Trends, now in its 8th edition.

Journalism and the Nsa Revelations - Privacy, Security and the Press (Hardcover): Adrienne Russell, Risto Kunelius, Heikki... Journalism and the Nsa Revelations - Privacy, Security and the Press (Hardcover)
Adrienne Russell, Risto Kunelius, Heikki Heikkila, Dmitry Yagodin
R3,332 Discovery Miles 33 320 Ships in 10 - 15 working days

Edward Snowden's revelations about the mass surveillance capabilities of the US National Security Agency (NSA) and other security services triggered an ongoing debate about the relationship between privacy and security in the digital world. This discussion has been dispersed into a number of national platforms, reflecting local political realities but also raising questions that cut across national public spheres. What does this debate tell us about the role of journalism in making sense of global events? This book looks at discussions of these debates in the mainstream media in the USA, United Kingdom, France, Germany, Russia and China. The chapters focus on editorials, commentaries and op-eds and look at how opinion-based journalism has negotiated key questions on the legitimacy of surveillance and its implications to security and privacy. The authors provide a thoughtful analysis of the possibilities and limits of 'transnational journalism' at a crucial time of political and digital change.

Security Consulting (Paperback, 4th edition): Charles A. Sennewald Security Consulting (Paperback, 4th edition)
Charles A. Sennewald
R1,107 Discovery Miles 11 070 Ships in 10 - 15 working days

Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, at no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption -- which could bring any business to it's knees --has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in-depth security surveys so businesses will know exactly where security holes are present and where they need improvement to limit their exposure to various threats. The fourth edition of "Security Consulting" introduces security and law enforcement professionals to the career and business of security consulting. It provides new and potential consultants with the practical guidelines needed to start up and maintain a successful independent practice. Updated and expanded information is included on marketing, fees and expenses, forensic consulting, the use of computers, and the need for professional growth.Useful sample forms have been updated in addition tonew promotion opportunities and keys to conducting research on the Web.

- The only book of its kind dedicated to beginning a security consulting practice from the ground-up

- Proven, practical methods to establish and run a security consulting business

- Newchapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet

- The most up-to-date best practices from the IAPSC"

Contemporary Security Management (Hardcover, 3rd edition): John Fay Contemporary Security Management (Hardcover, 3rd edition)
John Fay
R1,479 Discovery Miles 14 790 Ships in 10 - 15 working days

"Contemporary Security Management, 3rd Edition "teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management.
Comprehensive introduction to security and IT security management principlesDiscussion of both public and private sector roles, as well as the increasingly common privatizing of government functionsNew experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter

Patriotic Information Systems (Hardcover): Todd Loendorf, G.David Garson Patriotic Information Systems (Hardcover)
Todd Loendorf, G.David Garson
R2,595 Discovery Miles 25 950 Ships in 18 - 22 working days

Database technology can be used for various ends, ranging from promotion of democracy to strengthening of nationalism to shoring up authoritarian regimes through misinformation. Its use affects every layer of society: from individuals to households to local governments, and is a consuming issue in the United States Governments stance on privacy, security, and technology.

Fighting Fraud - How to Establish and Manage an Anti-Fraud Program (Paperback): Gerald L. Kovacich Fighting Fraud - How to Establish and Manage an Anti-Fraud Program (Paperback)
Gerald L. Kovacich
R1,130 Discovery Miles 11 300 Ships in 10 - 15 working days

This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company. It provides an exceptional foundation for security professionals or business executives involved in developing and implementing a corporate anti-fraud program as part of a corporate assets protection program.
The author's intent is to provide the reader with a practitioner's guide (a "how-to" book), augmented by some background information to put it all in perspective. The approach used should enable the readers to immediately put in place a useful anti-fraud program under the leadership of the corporate security officer (CSO), or other corporate professional.
* Shows professionals how to save their companies money.
* Provides a roadmap for developing an anti-fraud program.
* Allows security professionals to tailor their anti-fraud program to their own corporate environment.
* Explains how fraud is costing corporations a competitive edge in the global marketplace.

Public Safety and Security Administration (Paperback): P J. Ortmeier Public Safety and Security Administration (Paperback)
P J. Ortmeier
R1,435 Discovery Miles 14 350 Ships in 10 - 15 working days

This book addresses public safety and security from a holistic and visionary perspective. For the first time, safety and security organizations, as well as their administration, are brought together into an integrated work.
The protection of persons and property involves many public agencies and priivate organizations. Entities from the criminal jutics system (law enforcement, courts, corrections) as well as the fire service, private security and hazardous materials all contribute to public safety and security. This book addresses these entities, as well as safety and security issues, from a holistic and visionary perspective. It addresses criminal and non-criminal safety and security concerns, provides an overview of each entity (component) of the system of public safety and security, presents an overview of the administration process involved in planning, organizing, managing and evaluating public safety and security organizations and describes collateral functions of investigations, documentation and report writing.
Public safety and security organizations should not work in isolation. Rather, they should collaborate to protect persons and property. This book represents the first time all the public safety and security entities have been addressed in one text.

Focuses on the theories, concepts, practices and problems related to the present and future of public safety and security
Examines different strategies for problem solving which personnel working in the field may utilize
Synthesizes college-level lectures prepared, presented, and updated by the author over the past twenty years

Model Security Policies, Plans and Procedures (Paperback): John Fay Model Security Policies, Plans and Procedures (Paperback)
John Fay
R1,675 Discovery Miles 16 750 Ships in 10 - 15 working days

Model Security Policies, Plans, and Procedures contains sample security policy, planning, and procedural documents drawn from the proven experiences of hundreds of America's most successful corporations. If your job requires you to develop or update security policies, plans, or procedures, this book will be a highly valuable resource. The samples cover the key concepts of organizational protection. Putting the samples to use, either as presented or as drafting guides, can eliminate many hours of tedious research and writing.

Offers a practical mode of reference for security professionalsContains sample plans, policies and procedures

Risk Management for Security Professionals (Hardcover): Carl Roper Risk Management for Security Professionals (Hardcover)
Carl Roper
R1,849 Discovery Miles 18 490 Ships in 10 - 15 working days

This book describes the risk management methodology as a specific process, a theory, or a procedure for determining your assets, vulnerabilities, and threats and how security professionals can protect them.
Risk Management for Security Professionals is a practical handbook for security managers who need to learn risk management skills. It goes beyond the physical security realm to encompass all risks to which a company may be exposed. Risk Management as presented in this book has several goals:
Provides standardized common approach to risk management through a framework that effectively links security strategies and related costs to realistic threat assessment and risk levels
Offers flexible yet structured framework that can be applied to the risk assessment and decision support process in support of your business or organization
Increases awareness in terms of potential loss impacts, threats and vulnerabilities to organizational assets
Ensures that various security recommendations are based on an integrated assessment of loss impacts, threats, vulnerabilities and resource constraints

Risk management is essentially a process methodology that will provide a cost-benefit payback factor to senior management.
Provides a stand-alone guide to the risk management process
Helps security professionals learn the risk countermeasures and their pros and cons
Addresses a systematic approach to logical decision-making about the allocation of scarce security resources

Secure Electronic Transactions - Introduction and Technical Reference (Hardcover): Larry Loeb Secure Electronic Transactions - Introduction and Technical Reference (Hardcover)
Larry Loeb
R2,050 Discovery Miles 20 500 Ships in 18 - 22 working days

This detailed volume and accompanying CD-ROM focus on the set electronic transaction (SET) system and review the fundamentals through to practical instruction on how to develop and implement the entire SET system. Topics addressed include: electronic commerce and the various payment and security systems that have led to online credit card commerce; cryptographic extensions utilized by the SET system; and the technical details behind SET, from purchase initiation, through certificate management, to data transport protocols. Actual programming examples and computer code to construct and roll out the SET system are also included. The book should be of interest to business executives as well as engineers.

Private Security Law - Case Studies (Hardcover): David Maxwell Private Security Law - Case Studies (Hardcover)
David Maxwell
R1,367 Discovery Miles 13 670 Ships in 10 - 15 working days

Private Security Law: Case Studies is uniquely designed for the special needs of private security practitioners, students, and instructors. Part One of the book encompasses negligence, intentional torts, agency contracts, alarms, and damages. Part Two covers authority of the private citizen, deprivation of rights, and entrapment.
The factual cases presented in this book touch on the everyday duties of persons associated with the private security industry. Private Security Law: Case Studies provides a basic orientation to problems capable of inciting litigation. The information presented through case laws comes from cases chosen for their factual, realistic, and practical connection to the private security industry. This focused approach addresses specific problem areas of the industry and provides information necessary to a security manager to avert future loss.
Specially designed for private security practitioners, instructors, and students.
Examines cases that are practical, realistic and relevant to specific areas of private security.
Provides the information security managers need to avoid future problems.

European Security Law (Hardcover, New): Martin Trybus, Nigel White European Security Law (Hardcover, New)
Martin Trybus, Nigel White
R2,565 Discovery Miles 25 650 Ships in 10 - 15 working days

There have been a number of EU military operations in the last few years, evidence of a growing European military confidence, which in turn is a reflection of a developing competence in security matters. The creation of the European Union and its Common Foreign and Security Policy by the Maastricht Treaty of 1992 heralded this development, though the idea of a common defense can be traced to the beginnings of European integration. This book provides an analysis of the EU's evolving legal framework and powers on such matters, but it also recognizes that such a framework sits, sometimes uneasily, within the wider body of EU and International Law. The EU's security and defense policy also overlaps with those of other organizations such as the Organization for Security and Cooperation in Europe (OSCE), but more especially the North Atlantic Treaty Organization (NATO). EU relations with NATO have, in particular, caused some concern and are still evolving as both organizations seek to play a wider security role in the post-Cold War, and now post-9/11, era. With security now dominating political agendas at the domestic, regional and international levels, it is no surprise that the EU's concern for security has grown, and, following the Union's respect for the rule of law, has been shaped legally as well as politically. This book evaluates the progress of the Union in this regard in its international context and in its wider context of European integration generally. The analysis is in the main a legal one, but is placed squarely within wider historical and political perspectives.

Effective Physical Security (Paperback, 4th edition): Lawrence Fennelly Effective Physical Security (Paperback, 4th edition)
Lawrence Fennelly
R1,317 Discovery Miles 13 170 Ships in 10 - 15 working days

"Effective Physical Security, " Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors work that set the standard: "Handbook of Loss Prevention and Crime Prevention, " Fifth Edition.

Designed for easy reference, "Effective Physical Security" contains important coverage of environmental design, security surveys, locks, lighting, and CCTV as well as new chapters covering the latest in the ISO standards for Risk Assessmentand Risk Management, physical security planning, network systems infrastructure, and environmental design. This new edition continues to serve as a valuable reference for experienced security practitioners as well as students in undergraduate and graduate security programs.
Required reading for the ASIS Physical Security Professional Certification (PSP) and recommended reading for the CPP certification Provides detailed coverage of Physical Security in an easily accessible reference format with content divided into three major parts: Design, Equipment, and Operations Each chapter is written by a recognized expert security specialist "

Private Security and the Law (Hardcover, 4th edition): Charles Nemeth Private Security and the Law (Hardcover, 4th edition)
Charles Nemeth
R1,440 Discovery Miles 14 400 Ships in 10 - 15 working days

"Private Security and the Law, 4th Edition," is a unique resource that provides analysis of practices in the security industry as they relate to law, regulation, licensure, and constitutional questions of case and statutory authority.This bookdescribes the legal requirements facedin the area of private security.It emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency.The textalso examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that will set pace for future private security laws and regulations. As private security becomes more closely involved in national and international security, cases like Blackwater are examined. Charles Nemeth takesyou step by step through the analysis of case law as it applies to situations commonly faced in the private security practice, providing a solid introduction to the legal and ethical standards that shape the industry.

*Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"

How Safe Are Our Skies? - Assessing the Airlines' Response to Terrorism (Hardcover): Rodney Wallis How Safe Are Our Skies? - Assessing the Airlines' Response to Terrorism (Hardcover)
Rodney Wallis
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

The September 11, 2001, attacks on the World Trade Center and the Pentagon raised numerous questions about American and international aviation security. Former Director of Security of the International Air Transport Association Rodney Wallis suggests that the failure to maximize U.S. domestic air security, which left air travelers vulnerable to attack, lay largely with the carriers themselves. He contends that future policies should parallel the standards of the International Civil Aviation Organization. Wallis considers the Aviation and Transportation Security Act adopted by the U.S. Congress in the wake of September 11 and offers a modus operandi to the FAA that would enable them to maximize the benefits this legislation provides to air travelers.

This important work reviews past government reactions to the threat posed by air terrorism and questions whether these were effective responses or merely window dressing. It also includes practical advice for air travelers on how to maximize their own security when flying on international routes by monitoring airport and airline security for themselves.

The Privatization of Police in America - An Analysis and Case Study (Paperback): James F. Pastor The Privatization of Police in America - An Analysis and Case Study (Paperback)
James F. Pastor
R914 R680 Discovery Miles 6 800 Save R234 (26%) Ships in 10 - 15 working days

Today the private security industry employs approximately 1.5 million people and spends over USD52 billion annually. In contrast, public police forces employ approximately 600,000 people and spend USD30 billion annually. Private policing promises to be a big part of the response to today's increased security concerns, as citizens realize that security is much more than the presence of guards and the perception of safety. This book addresses the impact and implications of private policing on public streets, and begins with a look at private policing from conceptual, historical, economic, legal and functional perspectives. These approaches provide the background for the text, which focuses on a private policing patrol program in a community on the south side of Chicago. The text also demonstrates a number of substantive legal and public policy issues which directly or indirectly relate to the provision of security services; some people see the need for a ""dual system"" of policing - one for the wealthy and one for the poor - and others see the provision of private security as the primary protective resource in contemporary America. The author also examines how private policing is different from and similar to public policing.

The Handbook of Security (Hardcover): Martin Gill The Handbook of Security (Hardcover)
Martin Gill
R4,362 Discovery Miles 43 620 Ships in 10 - 15 working days

"The Handbook of Security "is essential reading for all those engaged with the security world. This in-depth book collates the best research available for the security academic and professional. The book is divided into five parts. It begins with the study of security as a discipline, assessing the contribution made by different subject areas to the study of security. The second part looks as crime in organizations. The third part analyzes the various sub-sectors of security. A section on management issues precedes the final section looking at a mage of issues that impact on security.

Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback): Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback)
Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee
R1,009 Discovery Miles 10 090 Ships in 9 - 17 working days

* Offers context while providing a coherent, applied overview of a wide range of suspect vulnerabilities and how to address them when interviewing * Serves as a practical guide to interviewing vulnerable suspects for both uniform police and detectives. * The only book on interviewing vulnerable suspects that includes the most up-to-date legal considerations and challenges of modern society

Security Intelligence Services in New Democracies - The Czech Republic, Slovakia and Romania (Hardcover, New title): K.... Security Intelligence Services in New Democracies - The Czech Republic, Slovakia and Romania (Hardcover, New title)
K. Williams, D. Deletant
R1,418 Discovery Miles 14 180 Ships in 18 - 22 working days

The first account of the secret police in Eastern Europe after 1989, this book uses a wide range of sources, including archives, to identify what has and has not changed since the end of Communism. After explaining the structure and workings of two of the area's most feared services, Czechoslovakia's StB and Romania's Securitate, the authors detail the creation of new security intelligence institutions, the development of contacts with the West, and forms of democratic control.

Computational Intelligence for Cybersecurity Management and Applications (Hardcover): Yassine Maleh, Mamoun Alazab, Soufyane... Computational Intelligence for Cybersecurity Management and Applications (Hardcover)
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
R3,153 Discovery Miles 31 530 Ships in 9 - 17 working days

1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Geospatial Technologies and Homeland…
Daniel Sui Hardcover R4,219 Discovery Miles 42 190
Privacy in Practice - Establish and…
Alan Tang Paperback R1,329 Discovery Miles 13 290
Cognitive Risk
James Bone, Jessie H Lee Paperback R1,074 Discovery Miles 10 740
Bounty Hunters, Marshals, and Sheriffs…
Jacqueline Pope Hardcover R2,049 Discovery Miles 20 490
Introduction to Terrorism
David H. McElreath, Carl J. Jensen, … Hardcover R2,311 R2,180 Discovery Miles 21 800
Managing the Insider Threat - No Dark…
Nick Catrantzos Hardcover R3,582 R3,071 Discovery Miles 30 710
Nonproliferation Issues For Weapons of…
Mark A. Prelas, Michael Peck Hardcover R5,340 Discovery Miles 53 400
Managing A Network Vulnerability…
Thomas R. Peltier, Justin Peltier, … Paperback R2,465 Discovery Miles 24 650
PKI Implementation and Infrastructures
Julian Ashbourn Paperback R1,098 Discovery Miles 10 980
Cybersecurity - Ethics, Legal, Risks…
Ishaani Priyadarshini, Chase Cotton Hardcover R3,634 Discovery Miles 36 340

 

Partners