0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (8)
  • R500+ (298)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General

Vision in Japanese Entrepreneurship - The Evolution of a Security Enterprise (Paperback): H.T. Shimazaki Vision in Japanese Entrepreneurship - The Evolution of a Security Enterprise (Paperback)
H.T. Shimazaki
R791 Discovery Miles 7 910 Ships in 10 - 15 working days

The service sector occupies a dominant position in the Japanese economy, yet few studies have looked at the way the industry developed. This book, first published in 1992, focuses on the growth and development of a major world security and communications corporation, SECOM. The success of the company has been rooted in the management strategies of Makoto Iida, who has shaped the company from a small localized business to an international industry at the forefront of innovation. The book first looks at the background of Makoto Iida, offering an insight into the nature of an entrepreneur and the issues this raises within the context of Japanese management styles. It then follows the company development stage by stage, assessing the importance of individual creativity in adapting and implementing traditional management techniques. It shows how strategies for human resources, service quality, new technology, globalization and corporate restructuring evolve within the context of a growing organization, and includes an analysis of the innovative marketing techniques and product development processes needed to sell security services to one of the world's safest countries.

Health, Safety, and Accident Management in the Chemical Process Industries - A Complete Compressed Domain Approach (Paperback,... Health, Safety, and Accident Management in the Chemical Process Industries - A Complete Compressed Domain Approach (Paperback, 2nd edition)
Ann Marie Flynn, Louis Theodore
R1,978 Discovery Miles 19 780 Ships in 10 - 15 working days

"Analyzes health and hazard risk assessment in commercial, industrial, and refining industries. Emphasizes legal requirements, emergency planning and response, safety equipment, process implementation, and occupational and environmental protection exposure guidelines. Presents applicatoins and calculations for risk analysis of real systems, as well as numerous end-of-chapter examples and references."

Software Deployment, Updating, and Patching (Paperback): Bill Stackpole, Patrick Hanrion Software Deployment, Updating, and Patching (Paperback)
Bill Stackpole, Patrick Hanrion
R1,803 Discovery Miles 18 030 Ships in 10 - 15 working days

The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations. Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing systems with the latest packs and patches. Written by two of Microsoft's top experts, this clear and concise manual demonstrates how to perform inventories of IT assets, test compatibility, target deployment, and evaluate management technologies. It also shows you how to create and implement your own deployment plans with recovery and remediation options, and how to recognize potential vulnerabilities.

Building an Effective Information Security Policy Architecture (Paperback): Sandy Bacik Building an Effective Information Security Policy Architecture (Paperback)
Sandy Bacik
R1,879 Discovery Miles 18 790 Ships in 10 - 15 working days

Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.

Researching National Security Intelligence - Multidisciplinary Approaches (Paperback): Stephen Coulthart, Michael... Researching National Security Intelligence - Multidisciplinary Approaches (Paperback)
Stephen Coulthart, Michael Landon-Murray, Damien Van Puyvelde; Contributions by Stephen Coulthart, Michael Landon-Murray, …
R935 R799 Discovery Miles 7 990 Save R136 (15%) Ships in 18 - 22 working days

Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.

Surviving the International War Zone - Security Lessons Learned and Stories from Police and Military Peacekeeping Forces... Surviving the International War Zone - Security Lessons Learned and Stories from Police and Military Peacekeeping Forces (Paperback)
Robert R Rail
R1,920 Discovery Miles 19 200 Ships in 10 - 15 working days

Few people are better able to describe how to survive in a war zone than those who have seen, experienced, and lived it first-hand. Comprised of a collection of original stories from international contributors, Surviving the International War Zone: Security Lessons Learned and Stories from Police and Military Peacekeeping Forces contains true accounts of unimaginable scenarios that could only occur in war-torn and conflict-ridden areas. Presenting accounts written by military and police officers who lived in different dangerous regions across the world, the book offers an inside look at the lives of the officers and the local people living in the war zone environment. Covering many facets of daily life, the book helps readers understand how to survive in deadly terrain. With contributions from soldiers and law enforcement personnel from 13 different countries who have lived and served in Iraq, Afghanistan, Sudan, Bosnia, Kosovo, East Timor, Cambodia, Haiti, and Liberia, the book includes practical tips for day-to-day life in a war zone. It examines topics such as: Surviving extreme temperatures and staying healthy Interacting with the indigenous population and cultural awareness Adjusting to the challenges of limited technology and resources Protecting oneself from the imminent threat of violence that is present in all war-torn regions Enhanced with photographs from the war zone, the stories in this volume range from accounts of unspeakable torture, to descriptions of deplorable living conditions, to moments of humor. Some of the stories will make you laugh; others may make you cry. Ultimately, the book provides an unparalleled insight into the full range of deep-seated and sometimes conflicting emotions of the people who have lived and served in war zones and have come home to tell about it.

Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed): Amy Zegart Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed)
Amy Zegart
R684 Discovery Miles 6 840 Ships in 10 - 15 working days

In this provocative and thoughtful book, Amy Zegart challenges the conventional belief that national security agencies work reasonably well to serve the national interest as they were designed to do. Using a new institutionalist approach, Zegart asks what forces shaped the initial design of the Central Intelligence Agency, the Joint Chiefs of Staff, and the National Security Council in ways that meant they were handicapped from birth.
Ironically, she finds that much of the blame can be ascribed to cherished features of American democracy--frequent elections, the separation of powers, majority rule, political compromise--all of which constrain presidential power and give Congress little incentive to create an effective foreign policy system. At the same time, bureaucrats in rival departments had the expertise, the staying power, and the incentives to sabotage the creation of effective competitors, and this is exactly what they did.
Historical evidence suggests that most political players did not consider broad national concerns when they forged the CIA, JCS, and NSC in the late 1940s. Although President Truman aimed to establish a functional foreign policy system, he was stymied by self-interested bureaucrats, legislators, and military leaders. The NSC was established by accident, as a byproduct of political compromise; Navy opposition crippled the JCS from the outset; and the CIA emerged without the statutory authority to fulfill its assigned role thanks to the Navy, War, State, and Justice departments, which fought to protect their own intelligence apparatus.
Not surprisingly, the new security agencies performed poorly as they struggled to overcome their crippled evolution. Only the NSC overcame its initial handicaps as several presidents exploited loopholes in the National Security Act of 1947 to reinvent the NSC staff. The JCS, by contrast, remained mired in its ineffective design for nearly forty years--i.e., throughout the Cold War--and the CIA's pivotal analysis branch has never recovered from its origins. In sum, the author paints an astonishing picture: the agencies Americans count on most to protect them from enemies abroad are, by design, largely incapable of doing so.

Contemporary Security Management (Paperback, 4th edition): David A. Patterson, John Fay Contemporary Security Management (Paperback, 4th edition)
David A. Patterson, John Fay
R2,205 Discovery Miles 22 050 Ships in 10 - 15 working days

Contemporary Security Management, Fourth Edition, identifies and condenses into clear language the principal functions and responsibilities for security professionals in supervisory and managerial positions. Managers will learn to understand the mission of the corporate security department and how the mission intersects with the missions of other departments. The book assists managers with the critical interactions they will have with decision makers at all levels of an organization, keeping them aware of the many corporate rules, business laws, and protocols of the industry in which the corporation operates. Coverage includes the latest trends in ethics, interviewing, liability, and security-related standards. The book provides concise information on understanding budgeting, acquisition of capital equipment, employee performance rating, delegated authority, project management, counseling, and hiring. Productivity, protection of corporate assets, and monitoring of contract services and guard force operations are also detailed, as well as how to build quality relationships with leaders of external organizations, such as police, fire and emergency response agencies, and the Department of Homeland Security.

The Five Technological Forces Disrupting Security - How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical... The Five Technological Forces Disrupting Security - How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age (Paperback)
Steve Van Til
R1,563 Discovery Miles 15 630 Ships in 10 - 15 working days

The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. It also examines key questions on how these new technologies have lowered barriers for new entrants in the field and how they are likely to change market dynamics and affect customer choices. Set in the context of one of the early dot.com companies to enter physical security, the narrative is written for professionals from Chief Security Officers and systems integrators to product managers and investors.

Investigations: 150 Things You Should Know (Paperback, 2nd edition): Lawrence Fennelly, Marianna Perry Investigations: 150 Things You Should Know (Paperback, 2nd edition)
Lawrence Fennelly, Marianna Perry
R1,488 Discovery Miles 14 880 Ships in 10 - 15 working days

Investigations: 150 Things You Should Know, Second Edition, explores the essential tips and techniques for security investigations, providing a useful reference for those at any stage of their security career. This practical guide covers the legal guidelines that all investigators must follow. Through anecdotes, case studies and documented procedures, the authors present the most complete collection of investigative information available. Readers in the security and law enforcement fields will find this book easy to use and understand when seeking explanations about a wide variety of investigative topics, including constitutional law, documentary evidence, surveillance equipment, interviewing, interrogating and reporting.

Security Operations Center Guidebook - A Practical Guide for a Successful SOC (Paperback): Gregory Jarpey, Scott Mccoy Security Operations Center Guidebook - A Practical Guide for a Successful SOC (Paperback)
Gregory Jarpey, Scott Mccoy
R2,051 Discovery Miles 20 510 Ships in 10 - 15 working days

Security Operations Center Guidebook: A Practical Guide for a Successful SOC provides everything security professionals need to create and operate a world-class Security Operations Center. It starts by helping professionals build a successful business case using financial, operational, and regulatory requirements to support the creation and operation of an SOC. It then delves into the policies and procedures necessary to run an effective SOC and explains how to gather the necessary metrics to persuade upper management that a company's SOC is providing value. This comprehensive text also covers more advanced topics, such as the most common Underwriter Laboratory (UL) listings that can be acquired, how and why they can help a company, and what additional activities and services an SOC can provide to maximize value to a company.

Cyber Security Essentials (Hardcover): James Graham, Ryan Olson, Rick Howard Cyber Security Essentials (Hardcover)
James Graham, Ryan Olson, Rick Howard
R4,796 Discovery Miles 47 960 Ships in 10 - 15 working days

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback): Chuck Wilson Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback)
Chuck Wilson
R1,045 Discovery Miles 10 450 Ships in 10 - 15 working days

As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R4,785 Discovery Miles 47 850 Ships in 10 - 15 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

The Sociology of Privatized Security (Hardcover, 1st ed. 2019): Ori Swed, Thomas Crosbie The Sociology of Privatized Security (Hardcover, 1st ed. 2019)
Ori Swed, Thomas Crosbie
R3,140 Discovery Miles 31 400 Ships in 18 - 22 working days

The first book dedicated to the sociology of privatized security, this collection studies the important global trend of shifting security from public to private hands and the associated rise of Private Military and Security Companies (PMSCs) and their contractors. The volume first explores the trend itself, making important historical and theoretical revisions to the existing social science of private security. These chapters discuss why rulers buy, rent and create private militaries, why mercenaries have become private patriots, and why the legitimacy of military missions is undermined by the use of contractors. The next section challenges the idea that states have a monopoly on legitimate violence and questions our legal and economic assumptions about private security. The collection concludes with a discussion of the contractors themselves, focusing on gender, race, ethnicity, and other demographic factors. Featuring a mix of qualitative and quantitative methods and a range of theoretical and methodological innovations, this book will inspire sociologists to examine, with fresh eyes, the behind-the-scenes tension between the high drama of war and conflict and the mundane realities of privatized security contractors and their everyday lives.

Sports Travel Security (Paperback): Peter Tarlow Sports Travel Security (Paperback)
Peter Tarlow
R2,210 R1,839 Discovery Miles 18 390 Save R371 (17%) Ships in 10 - 15 working days

Sports Team Security examines the security needs for sports teams and events of all sizes. This groundbreaking book provides a fundamental model for sports team security that can be applied almost universally, from youth sports to the Super Bowl and World Cup. The book develops, compares, and contrasts current methodologies in sports security, for both amateur and professional athletes, examining which paradigms work best and under which circumstances. This valuable information is applicable to nearly anyone involved in the safety of athletes, including event managers, law enforcement, parents, school administrators and coaches, security practitioners, tourism industry professionals, and legal professionals. It explores areas rarely investigated, providing key advice for creating best practices and guidelines in sports team security.

The Stasi - Myth and Reality (Hardcover): Mike Dennis, Norman Laporte The Stasi - Myth and Reality (Hardcover)
Mike Dennis, Norman Laporte
R4,213 Discovery Miles 42 130 Ships in 10 - 15 working days

The East German Ministry of State Security, popularly known as the Stasi, was one of the largest and most intrusive secret police systems in world history. So extensive was the system of surveillance and control that in any given year throughout the 1970s and 1980s, about one in fifty of the 13 million East German adults were working for the Stasi either as an officer or as an informer. Drawing on original sources from the Stasi archives and the recollections of contemporary witnesses, The Stasi: Myth and Reality reveals the intricacies of the relationship between the Stasi enforcers, its agents and its targets/victims, and demonstrates how far the Stasi octopus extended its tentacles into people's lives and all spheres of society. The origins and developments of this vast system of repression are examined, as well as the motivation of the informers and the ways in which they penetrated the niches of East German society. The final chapters assess the ministry's failure to help overcome the GDR's inherent structural defects and demonstrate how the Stasi's bureaucratic procedures contributed to the implosion of the Communist system at the end of the 1980's.

Handbook of SCADA/Control Systems Security (Hardcover, 2nd edition): Robert Radvanovsky, Jacob Brodsky Handbook of SCADA/Control Systems Security (Hardcover, 2nd edition)
Robert Radvanovsky, Jacob Brodsky; Burt G. Look
R4,244 Discovery Miles 42 440 Ships in 10 - 15 working days

This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized. Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in Social implications and impacts Governance and management Architecture and modeling Commissioning and operations The future of SCADA and control systems security The book also includes four case studies of well-known public cyber security-related incidents. The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.

Securitising Russia - The Domestic Politics of Vladimir Putin (Hardcover, New): Edwin Bacon, Bettina Renz, Julian Cooper Securitising Russia - The Domestic Politics of Vladimir Putin (Hardcover, New)
Edwin Bacon, Bettina Renz, Julian Cooper
R2,373 R2,212 Discovery Miles 22 120 Save R161 (7%) Ships in 10 - 15 working days

Securitising Russia shows the impact of twenty-first-century security concerns on the way Russia is ruled. It demonstrates how President Putin has wrestled with terrorism, immigration, media freedom, religious pluralism, and economic globalism, and argues that fears of a return to old-style authoritarianism oversimplify the complex context of contemporary Russia. The book focuses on the internal security issues common to many states in the early twenty-first-century, and places them in the particular context of Russia. Detailed analysis of the place of security in Russia's political discourse and policy-making reveals nuances often missing from overarching assessments of Russia today. To characterise the Putin regime as the 'KGB-resurgent' is to miss vital continuities, contexts, and on-going political conflicts which make up the contemporary Russian scene. Securitising Russia draws together current debates about whether Russia is a 'normal' country developing its own democratic and market structures, or a nascent authoritarian regime returning to the past. -- .

Effective Security Management (Hardcover, 6th edition): Charles A. Sennewald, Curtis Baillie Effective Security Management (Hardcover, 6th edition)
Charles A. Sennewald, Curtis Baillie
R1,702 Discovery Miles 17 020 Ships in 10 - 15 working days

Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers. The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media.

From Police to Security Professional - A Guide to a Successful Career Transition (Paperback): Michael S. D'Angelo From Police to Security Professional - A Guide to a Successful Career Transition (Paperback)
Michael S. D'Angelo
R1,563 Discovery Miles 15 630 Ships in 10 - 15 working days

Former police and military personnel possess attractive skill sets for the private security industry; however, the transition to the corporate arena is not without challenges. Competition for these jobs is fierce. Many candidates possess degrees in security management-some having spent their entire professional careers in private security. From Police to Security Professional: A Guide to a Successful Career Transition provides tips on overcoming the inherent obstacles law enforcement professionals face in making the switch and supplies a practical roadmap for entry into the private security world. The foundation of the book comes from the author's own journey and the many hurdles he encountered transitioning to private sector security. With his help, you'll learn: The unique skills, experience, and mentality required to enter into the private security industry from a law enforcement background The opportunities available and the different areas within the industry-including benefits and income potential How to properly evaluate your training portfolio How to tailor your resume to garner the attention of hiring executives The many professional associations and certifications that could be helpful in your career Vital to your ability to succeed is understanding that security management has evolved into a distinct profession in its own right-one that brings with it different education, experience, and skill sets that clearly differentiate it from law enforcement. This book will help you better understand and be prepared for the policies, processes, and a corporate environment that operates in a very different way than the police structure to which you are accustomed. With the author's help, you'll give yourself every advantage to get the job and succeed in your new career.

Trade Secret Theft, Industrial Espionage, and the China Threat (Hardcover, New): Carl Roper Trade Secret Theft, Industrial Espionage, and the China Threat (Hardcover, New)
Carl Roper
R4,227 Discovery Miles 42 270 Ships in 10 - 15 working days

Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage as practiced by a range of nations from around the world-focusing on the mass scale in which information is being taken for China's growth and development. Supplying a current look at espionage, the book details the specific types of information China has targeted for its collection efforts in the past. It explains what China does to prepare for its massive collection efforts and describes what has been learned about China's efforts during various Congressional hearings, with expert advice and details from both the FBI and other government agencies. This book is the product of hundreds of hours of research, with material, both primary and secondary, reviewed, studied, and gleaned from numerous sources, including White House documentation and various government agencies. Within the text, you will learn the rationale and techniques used to obtain information in the past. You will see a bit of history over centuries where espionage has played a role in the economy of various countries and view some cases that have come to light when individuals were caught. The book supplies an understanding of how the economy of a nation can prosper or suffer, depending on whether that nation is protecting its intellectual property, or whether it is stealing such property for its own use. The text concludes by outlining specific measures that corporations and their employees can practice to protect their information and assets, both at home and abroad.

Security Management - A Critical Thinking Approach (Hardcover): Michael Land, Truett Ricks, Bobby Ricks Security Management - A Critical Thinking Approach (Hardcover)
Michael Land, Truett Ricks, Bobby Ricks
R2,796 Discovery Miles 27 960 Ships in 10 - 15 working days

Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.

Coercion - The Power to Hurt in International Politics (Hardcover): Kelly M. Greenhill, Peter Krause Coercion - The Power to Hurt in International Politics (Hardcover)
Kelly M. Greenhill, Peter Krause
R3,286 Discovery Miles 32 860 Ships in 10 - 15 working days

From the rising significance of non-state actors to the increasing influence of regional powers, the nature and conduct of international politics has arguably changed dramatically since the height of the Cold War. Yet much of the literature on deterrence and compellence continues to draw (whether implicitly or explicitly) upon assumptions and precepts formulated in-and predicated upon-politics in a state-centric, bipolar world. Coercion moves beyond these somewhat hidebound premises and examines the critical issue of coercion in the 21st century, with a particular focus on new actors, strategies and objectives in this very old bargaining game. The chapters in this volume examine intra-state, inter-state, and transnational coercion and deterrence as well as both military and non-military instruments of persuasion, thus expanding our understanding of coercion for conflict in the 21st century. ? Scholars have analyzed the causes, dynamics, and effects of coercion for decades, but previous works have principally focused on a single state employing conventional military means to pressure another state to alter its behavior. In contrast, this volume captures fresh developments, both theoretical and policy relevant. This chapters in this volume focus on tools (terrorism, sanctions, drones, cyber warfare, intelligence, and forced migration), actors (insurgents, social movements, and NGOs) and mechanisms (trilateral coercion, diplomatic and economic isolation, foreign-imposed regime change, coercion of nuclear proliferators, and two-level games) that have become more prominent in recent years, but which have yet to be extensively or systematically addressed in either academic or policy literatures.

Introduction to Security (Hardcover, 9th edition): Robert Fischer, Edward Halibozek, David Walters Introduction to Security (Hardcover, 9th edition)
Robert Fischer, Edward Halibozek, David Walters
R1,591 Discovery Miles 15 910 Ships in 10 - 15 working days

"Introduction to Security" has been the leading text on private security for over thirty years. Celebrated for its balanced and professional approach, this new edition gives future security professionals a broad, solid base that prepares them to serve in a variety of positions. Security is a diverse and rapidly growing field that is immune to outsourcing. The author team as well as an outstanding group of subject-matter experts combine their knowledge and experience with a full package of materials geared to experiential learning. As a recommended title for security certifications, and an information source for the military, this is an essential reference for all security professionals. This timely revision expands on key topics and adds new material on important issues in the 21st century environment such as the importance of communication skills; the value of education; internet-related security risks; changing business paradigms; and brand protection.
New sections on terrorism and emerging security threats like cybercrime and piracy Top industry professionals from aerospace and computer firms join instructors from large academic programs as co-authors and contributors Expanded ancillaries for both instructors and students, including interactive web-based video and case studies

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Electronic Security Systems - Reducing…
Philip Walker Hardcover R1,992 Discovery Miles 19 920
Patriotic Information Systems
Todd Loendorf, G.David Garson Hardcover R2,595 Discovery Miles 25 950
Security Supervision and Management…
Ifpo Paperback R1,521 Discovery Miles 15 210
Security Intelligence Services in New…
K. Williams, D. Deletant Hardcover R1,418 Discovery Miles 14 180
Risk Management for Security…
Carl Roper Hardcover R1,849 Discovery Miles 18 490
The Handbook of Security
Martin Gill Hardcover R4,362 Discovery Miles 43 620
Model Security Policies, Plans and…
John Fay Paperback R1,675 Discovery Miles 16 750
The Professional Protection Officer…
Sandi J. Davies, Lawrence Fennelly Paperback R1,374 Discovery Miles 13 740
Gender and Private Security in Global…
Maya Eichler Hardcover R3,575 Discovery Miles 35 750
Women in the Security Profession - A…
Sandi J. Davies Paperback R1,379 Discovery Miles 13 790

 

Partners