![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
Contemporary Security Management, Fourth Edition, identifies and condenses into clear language the principal functions and responsibilities for security professionals in supervisory and managerial positions. Managers will learn to understand the mission of the corporate security department and how the mission intersects with the missions of other departments. The book assists managers with the critical interactions they will have with decision makers at all levels of an organization, keeping them aware of the many corporate rules, business laws, and protocols of the industry in which the corporation operates. Coverage includes the latest trends in ethics, interviewing, liability, and security-related standards. The book provides concise information on understanding budgeting, acquisition of capital equipment, employee performance rating, delegated authority, project management, counseling, and hiring. Productivity, protection of corporate assets, and monitoring of contract services and guard force operations are also detailed, as well as how to build quality relationships with leaders of external organizations, such as police, fire and emergency response agencies, and the Department of Homeland Security.
Investigations: 150 Things You Should Know, Second Edition, explores the essential tips and techniques for security investigations, providing a useful reference for those at any stage of their security career. This practical guide covers the legal guidelines that all investigators must follow. Through anecdotes, case studies and documented procedures, the authors present the most complete collection of investigative information available. Readers in the security and law enforcement fields will find this book easy to use and understand when seeking explanations about a wide variety of investigative topics, including constitutional law, documentary evidence, surveillance equipment, interviewing, interrogating and reporting.
The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. It also examines key questions on how these new technologies have lowered barriers for new entrants in the field and how they are likely to change market dynamics and affect customer choices. Set in the context of one of the early dot.com companies to enter physical security, the narrative is written for professionals from Chief Security Officers and systems integrators to product managers and investors.
As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.
The first book dedicated to the sociology of privatized security, this collection studies the important global trend of shifting security from public to private hands and the associated rise of Private Military and Security Companies (PMSCs) and their contractors. The volume first explores the trend itself, making important historical and theoretical revisions to the existing social science of private security. These chapters discuss why rulers buy, rent and create private militaries, why mercenaries have become private patriots, and why the legitimacy of military missions is undermined by the use of contractors. The next section challenges the idea that states have a monopoly on legitimate violence and questions our legal and economic assumptions about private security. The collection concludes with a discussion of the contractors themselves, focusing on gender, race, ethnicity, and other demographic factors. Featuring a mix of qualitative and quantitative methods and a range of theoretical and methodological innovations, this book will inspire sociologists to examine, with fresh eyes, the behind-the-scenes tension between the high drama of war and conflict and the mundane realities of privatized security contractors and their everyday lives.
Security Operations Center Guidebook: A Practical Guide for a Successful SOC provides everything security professionals need to create and operate a world-class Security Operations Center. It starts by helping professionals build a successful business case using financial, operational, and regulatory requirements to support the creation and operation of an SOC. It then delves into the policies and procedures necessary to run an effective SOC and explains how to gather the necessary metrics to persuade upper management that a company's SOC is providing value. This comprehensive text also covers more advanced topics, such as the most common Underwriter Laboratory (UL) listings that can be acquired, how and why they can help a company, and what additional activities and services an SOC can provide to maximize value to a company.
This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized. Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in Social implications and impacts Governance and management Architecture and modeling Commissioning and operations The future of SCADA and control systems security The book also includes four case studies of well-known public cyber security-related incidents. The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.
The East German Ministry of State Security, popularly known as the Stasi, was one of the largest and most intrusive secret police systems in world history. So extensive was the system of surveillance and control that in any given year throughout the 1970s and 1980s, about one in fifty of the 13 million East German adults were working for the Stasi either as an officer or as an informer. Drawing on original sources from the Stasi archives and the recollections of contemporary witnesses, The Stasi: Myth and Reality reveals the intricacies of the relationship between the Stasi enforcers, its agents and its targets/victims, and demonstrates how far the Stasi octopus extended its tentacles into people's lives and all spheres of society. The origins and developments of this vast system of repression are examined, as well as the motivation of the informers and the ways in which they penetrated the niches of East German society. The final chapters assess the ministry's failure to help overcome the GDR's inherent structural defects and demonstrate how the Stasi's bureaucratic procedures contributed to the implosion of the Communist system at the end of the 1980's.
There have been a number of EU military operations in the last few years, evidence of a growing European military confidence, which in turn is a reflection of a developing competence in security matters. The creation of the European Union and its Common Foreign and Security Policy by the Maastricht Treaty of 1992 heralded this development, though the idea of a common defense can be traced to the beginnings of European integration. This book provides an analysis of the EU's evolving legal framework and powers on such matters, but it also recognizes that such a framework sits, sometimes uneasily, within the wider body of EU and International Law. The EU's security and defense policy also overlaps with those of other organizations such as the Organization for Security and Cooperation in Europe (OSCE), but more especially the North Atlantic Treaty Organization (NATO). EU relations with NATO have, in particular, caused some concern and are still evolving as both organizations seek to play a wider security role in the post-Cold War, and now post-9/11, era. With security now dominating political agendas at the domestic, regional and international levels, it is no surprise that the EU's concern for security has grown, and, following the Union's respect for the rule of law, has been shaped legally as well as politically. This book evaluates the progress of the Union in this regard in its international context and in its wider context of European integration generally. The analysis is in the main a legal one, but is placed squarely within wider historical and political perspectives.
Former police and military personnel possess attractive skill sets for the private security industry; however, the transition to the corporate arena is not without challenges. Competition for these jobs is fierce. Many candidates possess degrees in security management-some having spent their entire professional careers in private security. From Police to Security Professional: A Guide to a Successful Career Transition provides tips on overcoming the inherent obstacles law enforcement professionals face in making the switch and supplies a practical roadmap for entry into the private security world. The foundation of the book comes from the author's own journey and the many hurdles he encountered transitioning to private sector security. With his help, you'll learn: The unique skills, experience, and mentality required to enter into the private security industry from a law enforcement background The opportunities available and the different areas within the industry-including benefits and income potential How to properly evaluate your training portfolio How to tailor your resume to garner the attention of hiring executives The many professional associations and certifications that could be helpful in your career Vital to your ability to succeed is understanding that security management has evolved into a distinct profession in its own right-one that brings with it different education, experience, and skill sets that clearly differentiate it from law enforcement. This book will help you better understand and be prepared for the policies, processes, and a corporate environment that operates in a very different way than the police structure to which you are accustomed. With the author's help, you'll give yourself every advantage to get the job and succeed in your new career.
Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage as practiced by a range of nations from around the world-focusing on the mass scale in which information is being taken for China's growth and development. Supplying a current look at espionage, the book details the specific types of information China has targeted for its collection efforts in the past. It explains what China does to prepare for its massive collection efforts and describes what has been learned about China's efforts during various Congressional hearings, with expert advice and details from both the FBI and other government agencies. This book is the product of hundreds of hours of research, with material, both primary and secondary, reviewed, studied, and gleaned from numerous sources, including White House documentation and various government agencies. Within the text, you will learn the rationale and techniques used to obtain information in the past. You will see a bit of history over centuries where espionage has played a role in the economy of various countries and view some cases that have come to light when individuals were caught. The book supplies an understanding of how the economy of a nation can prosper or suffer, depending on whether that nation is protecting its intellectual property, or whether it is stealing such property for its own use. The text concludes by outlining specific measures that corporations and their employees can practice to protect their information and assets, both at home and abroad.
Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.
"Introduction to Security" has been the leading text on private
security for over thirty years. Celebrated for its balanced and
professional approach, this new edition gives future security
professionals a broad, solid base that prepares them to serve in a
variety of positions. Security is a diverse and rapidly growing
field that is immune to outsourcing. The author team as well as an
outstanding group of subject-matter experts combine their knowledge
and experience with a full package of materials geared to
experiential learning. As a recommended title for security
certifications, and an information source for the military, this is
an essential reference for all security professionals. This timely
revision expands on key topics and adds new material on important
issues in the 21st century environment such as the importance of
communication skills; the value of education; internet-related
security risks; changing business paradigms; and brand
protection.
In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.
U.S. Government Counterterrorism: A Guide to Who Does What is the first readily available, unclassified guide to the many U.S. government agencies, bureau offices, and programs involved in all aspects of countering terrorism domestically and overseas. The authors, veterans of the U.S. government's counterterrorism efforts, present a rare insider's view of the counterterrorism effort, addressing such topics as government training initiatives, weapons of mass destruction, interagency coordination, research and development, and the congressional role in policy and budget issues. Includes a Foreword by Brian Michael Jenkins, Senior Advisor RAND Corporation Individual chapters describe the various agencies, their bureaus, and offices that develop and implement the counterterrorism policies and programs, providing a useful unclassified guide to government officials at all levels as well as students and others interested in how the U.S. counters terrorism. The book also discusses the challenges involved in coordinating the counterterrorism efforts at federal, state, and local levels and explains how key terror events influenced the development of programs, agencies, and counterterrorism legislation. The legislative underpinnings and tools of the U.S. counterterrorism efforts are covered as are the oft-debated issues of defining terrorism itself and efforts to counter violent extremism. In addition to outlining the specific agencies and programs, the authors provide unique insights into the broader context of counterterrorism efforts and developments in the last 10-plus years since 9/11 and they raise future considerations given recent landscape-altering global events. The authors were interviewed by National Defense Magazine in a January 23, 2012 article entitled Counterterrorism 101: Navigating the Bureaucratic Maze. They were interviewed on April 30, 2012 by Federal News Radio. Michael Kraft was also interviewed on June 27, 2014 by Federal News Radio.
With nearly 20 percent of the world 's population located in China, what happens there is significant to all nations. Sweeping changes have altered the cultural landscape of China, and as opportunities for wealth have grown in recent years, so have opportunities for crime. Police Reform in China provides a rare and insightful glimpse of policing in the midst of such change. The book begins with a historical account of police reform in the region since 2000. Next, it discusses the difficulties encountered in trying to understand Chinese policing, such as outdated perceptions, misinformation, cultural ignorance, ideological hegemony, and problems with paternalistic attitudes. The book recommends studying China from a local perspective informed by local research and data, suggesting that understanding China requires a cultural shift to the Chinese way of life in "thinking" and, more importantly, "feeling." The author then summarizes selected policy papers from Gongan Yanjiu, a leading international policy journal. He first documents how the thinking and aspirations of various generations of Chinese leaders from Mao to Deng, and now Jiang and Hu, came to affect Chinese policing in theory and practice. He then addresses the emergence of a police legitimacy crisis as evidenced by the deterioration of public image and rebellions against police authority. Demonstrating how old ideologies are increasingly in conflict with the values and lifestyles of a new mentality, the book discusses steps that can be taken to improve professionalism. The final chapters investigate such problems as abuses of discretion and the improper use of firearms and highlight the importance of understanding the Chinese people, culture, values, and interests in order to truly effectuate successful police reform.
Since 9/11, the terms homeland security and terrorism have become firmly entrenched in our lexicon. The days of walking through a simple metal detector at the airport are over, and our security landscape is forever changed. Terrorism and Homeland Security: Perspectives, Thoughts, and Opinions brings together the work of academic researchers and law enforcement and intelligence personnel to present a sober appraisal of the issues surrounding the current state of our security infrastructure. Topics highlighted in this thought-provoking volume include:
An examination of the causes and effects of terrorism and the complicated issues surrounding homeland security, this thought-provoking anthology provides a broad perspective for understanding the threat we face and how we can best meet the challenges of 21st century homeland security.
Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:
Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization. Praise for: The first edition was outstanding. The new second edition is
even better ... the definitive and indispensable guide for
information security and privacy awareness and training
professionals, worth every cent. As with the first edition, we
recommend it unreservedly..
First published in 1986. Routledge is an imprint of Taylor & Francis, an informa company.
This new volume explores the crisis in transatlantic relations and analyses the role of NATO following the collapse of the Soviet Union. The book offers a unified theory of cooperation in the new security paradigm to explain the current state of transatlantic relations and NATO's failure to adequately transform itself into a security institution for the 21st century. It argues that a new preoccupation with risk filled the vacuum left by the collapse of the Soviet Union, and uses the literature of the Risk Society to analyse the strained politics of the North Atlantic community. Using case studies to show how the West has pursued a strategy of risk management, and the effect this has had on NATO's politics, the book argues that a better understanding of how risk affects Western political cohesion will allow policy makers a way of adapting the structure of NATO to make it more effective as a tool for security. Having analysed NATO's recent failings, the book offers a theory for the way in which it can become an active risk manager, through the replacement of its established structure by smaller, ad hoc groupings.
Drawn from case examples of incidents from around the world, Targeted Violence A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics used, and groups responsible for targeted killings and kidnappings. The author, a former SWAT and JTTF team member whose experience includes providing protection to diplomats, high-ranking military personnel, prosecutors, and organized crime informants presents a wealth of global statistics on assassinations, contract killings, and kidnappings that have occurred from 1950 to the present. Leaving no stone unturned, the book breaks down the various incidents of targeted violence by region, country, month, day of the week, and time of day. It reports on likely locations for each type of attack, success rates, who is likely to initiate the attacks, and who they are most likely to target. The book s easy-to-follow format allows readers, experienced or not in personal protective work, to determine the types of attacks known to have occurred in any region. This complete reference includes 35 case studies that examine attacks on motorcades and pedestrians dating back to 1973 highlighting the lessons to be learned from each example. It analyzes the modus operandi of individual assailants and groups in order to determine commonalities between targeted victims and why certain groups tend to target a specific type of individual. The text concludes with a chapter on victimology. Just like anyone, assassins and hit men fall into routines and can become creatures of habit. By studying and understanding the collection of historical information contained in these pages, security, military, and law enforcement professionals responsible for providing protection will be better prepared to identify potential threats and develop the tactics needed to thwart such attacks.
Why do governments choose to negotiate indigenous land claims
rather than resolve claims through some other means? In this book
Scholtz explores why a government would choose to implement a
negotiation policy, where it commits itself to a long-run strategy
of negotiation over a number of claims and over a significant
course of time. Through an examination strongly grounded in archival research of post-World War Two government decision-making in four established democracies - Australia, Canada, New Zealand, and the United States - Scholtz argues that negotiation policies emerge when indigenous people mobilize politically prior to significant judicial determinations on land rights, and not after judicial change alone. Negotiating Claims links collective action and judicial change to explain the emergence of new policy institutions.
This book examines the emergence of new international norms to
govern the spread of small arms, and the extent to which these
norms have been established in the policies and practices of
states, regions and international organizations. It also attempts
to establish criteria for assessing norm emergence, and to assess
the process of norm development by comparing what actually happens
at the multilateral level.
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.
This new volume explores the crisis in transatlantic relations and analyses the role of NATO following the collapse of the Soviet Union. The book offers a unified theory of cooperation in the new security paradigm to explain the current state of transatlantic relations and NATO's failure to adequately transform itself into a security institution for the 21st century. It argues that a new preoccupation with risk filled the vacuum left by the collapse of the Soviet Union, and uses the literature of the Risk Society to analyse the strained politics of the North Atlantic community. Using case studies to show how the West has pursued a strategy of risk management, and the effect this has had on NATO's politics, the book argues that a better understanding of how risk affects Western political cohesion will allow policy makers a way of adapting the structure of NATO to make it more effective as a tool for security. Having analysed NATO's recent failings, the book offers a theory for the way in which it can become an active risk manager, through the replacement of its established structure by smaller, ad hoc groupings. |
![]() ![]() You may like...
Advances in Business ICT: New Ideas from…
Tomasz Pelech-Pilichowski, Maria Mach-Krol, …
Hardcover
Proceedings of International Symposium…
Nageswara S.V. Rao, Richard R. Brooks, …
Hardcover
R5,126
Discovery Miles 51 260
Even Convexity and Optimization…
Maria D. Fajardo, Miguel A. Goberna, …
Hardcover
R1,525
Discovery Miles 15 250
|