0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (8)
  • R500+ (301)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General

Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition): Rebecca Herold Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition)
Rebecca Herold
R4,206 Discovery Miles 42 060 Ships in 12 - 19 working days

Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:

  • Lists the laws and associated excerpts of the specific passages that require training and awareness
  • Contains a plethora of forms, examples, and samples in the book's 22 appendices
  • Highlights common mistakes that many organizations make
  • Directs readers to additional resources for more specialized information
  • Includes 250 awareness activities ideas and 42 helpful tips for trainers

Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization.

Praise for:

The first edition was outstanding. The new second edition is even better ... the definitive and indispensable guide for information security and privacy awareness and training professionals, worth every cent. As with the first edition, we recommend it unreservedly..
-NoticeBored.com

Japanese - Descriptive Grammar (Paperback): John Hinds Japanese - Descriptive Grammar (Paperback)
John Hinds
R2,290 Discovery Miles 22 900 Ships in 12 - 19 working days

First published in 1986. Routledge is an imprint of Taylor & Francis, an informa company.

NATO, Security and Risk Management - From Kosovo to Khandahar (Paperback): M.J. Williams NATO, Security and Risk Management - From Kosovo to Khandahar (Paperback)
M.J. Williams
R1,483 Discovery Miles 14 830 Ships in 12 - 19 working days

This new volume explores the crisis in transatlantic relations and analyses the role of NATO following the collapse of the Soviet Union. The book offers a unified theory of cooperation in the new security paradigm to explain the current state of transatlantic relations and NATO's failure to adequately transform itself into a security institution for the 21st century. It argues that a new preoccupation with risk filled the vacuum left by the collapse of the Soviet Union, and uses the literature of the Risk Society to analyse the strained politics of the North Atlantic community. Using case studies to show how the West has pursued a strategy of risk management, and the effect this has had on NATO's politics, the book argues that a better understanding of how risk affects Western political cohesion will allow policy makers a way of adapting the structure of NATO to make it more effective as a tool for security. Having analysed NATO's recent failings, the book offers a theory for the way in which it can become an active risk manager, through the replacement of its established structure by smaller, ad hoc groupings.

Targeted Violence - A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings (Hardcover, New):... Targeted Violence - A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings (Hardcover, New)
Glenn P. McGovern
R4,494 Discovery Miles 44 940 Ships in 12 - 19 working days

Drawn from case examples of incidents from around the world, Targeted Violence A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics used, and groups responsible for targeted killings and kidnappings. The author, a former SWAT and JTTF team member whose experience includes providing protection to diplomats, high-ranking military personnel, prosecutors, and organized crime informants presents a wealth of global statistics on assassinations, contract killings, and kidnappings that have occurred from 1950 to the present.

Leaving no stone unturned, the book breaks down the various incidents of targeted violence by region, country, month, day of the week, and time of day. It reports on likely locations for each type of attack, success rates, who is likely to initiate the attacks, and who they are most likely to target. The book s easy-to-follow format allows readers, experienced or not in personal protective work, to determine the types of attacks known to have occurred in any region.

This complete reference includes 35 case studies that examine attacks on motorcades and pedestrians dating back to 1973 highlighting the lessons to be learned from each example. It analyzes the modus operandi of individual assailants and groups in order to determine commonalities between targeted victims and why certain groups tend to target a specific type of individual. The text concludes with a chapter on victimology.

Just like anyone, assassins and hit men fall into routines and can become creatures of habit. By studying and understanding the collection of historical information contained in these pages, security, military, and law enforcement professionals responsible for providing protection will be better prepared to identify potential threats and develop the tactics needed to thwart such attacks.

Negotiating Claims - The Emergence of Indigenous Land Claim Negotiation Policies in Australia, Canada, New Zealand, and the... Negotiating Claims - The Emergence of Indigenous Land Claim Negotiation Policies in Australia, Canada, New Zealand, and the United States (Paperback)
Christa Scholtz
R1,561 Discovery Miles 15 610 Ships in 12 - 19 working days

Why do governments choose to negotiate indigenous land claims rather than resolve claims through some other means? In this book Scholtz explores why a government would choose to implement a negotiation policy, where it commits itself to a long-run strategy of negotiation over a number of claims and over a significant course of time.

Through an examination strongly grounded in archival research of post-World War Two government decision-making in four established democracies - Australia, Canada, New Zealand, and the United States - Scholtz argues that negotiation policies emerge when indigenous people mobilize politically prior to significant judicial determinations on land rights, and not after judicial change alone. Negotiating Claims links collective action and judicial change to explain the emergence of new policy institutions.

Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback): Todd Fitzgerald Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback)
Todd Fitzgerald
R1,539 Discovery Miles 15 390 Ships in 12 - 19 working days

Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.

NATO, Security and Risk Management - From Kosovo to Khandahar (Hardcover): M.J. Williams NATO, Security and Risk Management - From Kosovo to Khandahar (Hardcover)
M.J. Williams
R4,770 Discovery Miles 47 700 Ships in 12 - 19 working days

This new volume explores the crisis in transatlantic relations and analyses the role of NATO following the collapse of the Soviet Union. The book offers a unified theory of cooperation in the new security paradigm to explain the current state of transatlantic relations and NATO's failure to adequately transform itself into a security institution for the 21st century. It argues that a new preoccupation with risk filled the vacuum left by the collapse of the Soviet Union, and uses the literature of the Risk Society to analyse the strained politics of the North Atlantic community. Using case studies to show how the West has pursued a strategy of risk management, and the effect this has had on NATO's politics, the book argues that a better understanding of how risk affects Western political cohesion will allow policy makers a way of adapting the structure of NATO to make it more effective as a tool for security. Having analysed NATO's recent failings, the book offers a theory for the way in which it can become an active risk manager, through the replacement of its established structure by smaller, ad hoc groupings.

Small Arms and Security - New Emerging International Norms (Paperback): Denise Garcia Small Arms and Security - New Emerging International Norms (Paperback)
Denise Garcia
R1,503 Discovery Miles 15 030 Ships in 12 - 19 working days

This book examines the emergence of new international norms to govern the spread of small arms, and the extent to which these norms have been established in the policies and practices of states, regions and international organizations. It also attempts to establish criteria for assessing norm emergence, and to assess the process of norm development by comparing what actually happens at the multilateral level.
If norm-making on small arms and related multilateral negotiations have mostly dealt with 'illicit arms', and most of the norms examined here fall on the arms supplier side of the arms equation, the author argues that the creation of international norms and the setting of widely agreed standards amongst states on all aspects of the demand for, availability, and spread of both legal and illegal small arms and light weapons must become central to the multilateral coordination of policy responses in order to tackle the growing violence associated with small arms availability.
Small Arms and Security will be of interest to researchers and professionals in the fields of peace and conflict studies, global governance, international security and disarmament.

Small Arms and Security - New Emerging International Norms (Hardcover, New): Denise Garcia Small Arms and Security - New Emerging International Norms (Hardcover, New)
Denise Garcia
R4,630 Discovery Miles 46 300 Ships in 12 - 19 working days

This book examines the emergence of new international norms to govern the spread of small arms, and the extent to which these norms have been established in the policies and practices of states, regions and international organizations. It also attempts to establish criteria for assessing norm emergence, and to assess the process of norm development by comparing what actually happens at the multilateral level. If norm-making on small arms and related multilateral negotiations have mostly dealt with 'illicit arms', and most of the norms examined here fall on the arms supplier side of the arms equation, the author argues that the creation of international norms and the setting of widely agreed standards amongst states on all aspects of the demand for, availability, and spread of both legal and illegal small arms and light weapons must become central to the multilateral coordination of policy responses in order to tackle the growing violence associated with small arms availability. Small Arms and Security will be of interest to researchers and professionals in the fields of peace and conflict studies, global governance, international security and disarmament.

Private Security in Africa - From the Global Assemblage to the Everyday (Hardcover): Doctor Paul Higate, Mats Utas Private Security in Africa - From the Global Assemblage to the Everyday (Hardcover)
Doctor Paul Higate, Mats Utas
R3,034 Discovery Miles 30 340 Ships in 12 - 19 working days

Across Africa, growing economic inequality, instability and urbanization have led to the rapid spread of private security providers. While these PSPs have already had a significant impact on African societies, their impact has so far received little in the way of comprehensive analysis. Drawing on a wide range of disciplinary approaches, and encompassing anthropology, sociology and political science, Private Security in Africa offers unique insight into the lives and experiences of security providers and those affected by them, as well as into the fragile state context which has allowed them to thrive. Featuring original empirical research and case studies ranging from private policing in South Africa to the recruitment of Sierra Leoneans for private security work in Iraq, the book considers the full implications of PSPs for security and the state, not only for Africa but for the world as a whole.

The Business of Criminal Justice - A Guide for Theory and Practice (Hardcover): Daniel Adrian Doss, Chengqi Guo, Joo Young Lee The Business of Criminal Justice - A Guide for Theory and Practice (Hardcover)
Daniel Adrian Doss, Chengqi Guo, Joo Young Lee
R5,686 Discovery Miles 56 860 Ships in 12 - 19 working days

This book represents the manifestation of a new presentation of old perspectives within the discipline of criminal justice. It contains practical considerations of rendering such decisions, it is expected to be an appropriate reference among practitioner personnel.

Private Security and Domestic Violence - The Risks and Benefits of Private Security Companies Working With Victims of Domestic... Private Security and Domestic Violence - The Risks and Benefits of Private Security Companies Working With Victims of Domestic Violence (Hardcover)
Diarmaid Harkin
R4,464 Discovery Miles 44 640 Ships in 12 - 19 working days

Private companies are increasingly involved with the security of domestic violence victims. This has manifested in a number of ways, including private security companies working in partnership with domestic violence services, the proliferation of security-technology companies that seek a market within the domestic violence sector, and governments contracting private companies to provide security provision for victims. Private Security and Domestic Violence offers a world-first analysis of the risks and benefits of for-profit businesses engaging with a vulnerable and underprotected section of society. Based on original data gathered in Australia, this book provides internationally relevant insights on the dangers but also the potential benefits of increasing private sector involvement with victims of domestic abuse. It offers a unique crossover of the literature on private security, crime prevention and domestic violence. Aimed at scholars, policymakers, and frontline workers within the domestic violence sector, Private Security and Domestic Violence documents experimental new collaborations and partnerships between the private, community and governmental spheres and makes a case for the suitable regulatory solutions to be put in place to successfully manage private security involvement with domestic violence victims. By outlining the risks and the benefits of this new form of security provision and detailing a potential model of regulation, this book offers a pathway for improving how we provide for a chronically underprotected population. It will be of interest to criminology and criminal justice students and researchers engaged in studies of abuse, domestic violence, violent crime, victims and victimology, crime prevention, and security.

The Stasi - Myth and Reality (Paperback): Mike Dennis, Norman Laporte The Stasi - Myth and Reality (Paperback)
Mike Dennis, Norman Laporte
R1,957 Discovery Miles 19 570 Ships in 12 - 19 working days

A study of the powerful and much-feared East German Ministry of State Security from its establishment in 1950 to its fall in 1990.

The Stasi was a central institution of the GDR, and this book illuminates the nature and operation of the entire East German regime, addressing one of the most important topics in modern German history. The emphasis is primarily on the key years under Erich Honecker, who was Head of State from 1976 and ousted in 1989. The book looks at all aspects of the control, operation and impact of the security police, their methods, targets, structure, accountability, and in particular the crucial question of how far they were an arm of the ruling communist party or were themselves a virtually autonomous political actor.

Asset Protection and Security Management Handbook (Hardcover): James Walsh Asset Protection and Security Management Handbook (Hardcover)
James Walsh
R4,079 Discovery Miles 40 790 Ships in 12 - 19 working days

The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.

Based on the ASIS asset protection course, the text provides information vital to security planning and operational requirements. It addresses the most comonly recognized issues in the field and explores the future of asset protection management. The authors examine the latest in crime detection, prevention, and interrogation techniques. The Asset Protection and Security Management Handbook will not only help you to explore effective security training and educational programs for your organization, but will also help you discover proven methods of selling your security program to top management.

The Inside Man - Evaluating Security Communication Failures at a United States Commercial Airport (Hardcover): Stacey L. Tyler The Inside Man - Evaluating Security Communication Failures at a United States Commercial Airport (Hardcover)
Stacey L. Tyler
R1,637 Discovery Miles 16 370 Ships in 12 - 19 working days

Organizational communication impacts service efficiency and productivity. An increase in federal funding to strengthen communication within the airport stakeholders has failed to deliver expected results. The purpose of this qualitative case study is to explore whether miscommunication among the TSA agents and airport employees relates to effective implementation of airport security policies. The central research question focuses on the degree to which miscommunication between the TSA and airlines regarding prohibited items at security checkpoints impeded the effective execution of federal law regarding carry on luggage on commercial aircraft. Using Weick's organizational information theory, this study examines the implementation of airport security policy focusing on communication between government and industry organizations. A sample of 13 private airline employees and 7 airport employees at a large U.S. commercial airport participated in the study. Data was collected via semi structured interview questions. Data was coded and analyzed following an inductive coding strategy. According to study results, there is very little evidence of miscommunications between government and airline stakeholders regarding policy changes and expectations related to security procedures. However, miscommunication about the same policy changes to consumers confuses travelers, which may explain incidences of prohibited items at the security checkpoints. Implications for positive social change related to this study may assist policy makers in clarifying language to better inform travelers about security changes and prohibited items, the objective of which will promote safer flying experiences, reduce the potential for harm, and result in more expedient traveling.

Business Continuity Planning - Protecting Your Organization's Life (Hardcover): Ken Doughty Business Continuity Planning - Protecting Your Organization's Life (Hardcover)
Ken Doughty
R4,057 Discovery Miles 40 570 Ships in 12 - 19 working days

From fires, floods, and power outages to hackers and software problems, companies need to protect against a variety of threats. Business Continuity Planning takes a best practices approach to provide a comprehensive continuity solution. It details how to build a plan to handle disruptions in business, keep vital operations up and running, and prevent losses that occur when productivity is crippled or security is compromised. The book explains how to evaluate a current plan for completeness and how to monitor and maintain it to ensure it remains up-to-date.

Corporate Security in the Asia-Pacific Region - Crisis, Crime, Fraud, and Misconduct (Paperback): Christopher J. Cubbage, CPP,... Corporate Security in the Asia-Pacific Region - Crisis, Crime, Fraud, and Misconduct (Paperback)
Christopher J. Cubbage, CPP, David J. Brooks, PhD
R1,888 Discovery Miles 18 880 Ships in 12 - 19 working days

As corporations and governments become more litigious and risk averse, international risk management becomes more complex. Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct examines real cases of corporate crisis, crime, fraud, and other misconduct that corporate security professionals need to be aware of to effectively protect people, operations, and assets within the region. Current security threats and risks are addressed to help readers conduct an informed risk assessment and analysis of operational risk. Providing detailed guidance on how to address the unique threats and risks in this dynamic and growing business environment, the book: Presents an overview of the region, with relevant historical background Offers recent case examples of crime and common issues facing a given region or country Highlights the range and frequency of corporate security-related breaches and crimes specific to countries in the region Provides detailed write-ups of every country in the region including the major players-Japan, China, India, Indonesia, Singapore, Malaysia, Thailand, and the Philippines Outlines security best practices for navigating the political and law enforcement challenges involved with operating in the region This book provides readers with the regional snapshot and geo-political background needed to understand the cultural differences, challenges, and the state of affairs for any country in the region. Filled with detailed cases of crime, theft of trade secrets, risk factors, and best practices, this book provides the real-world understanding you'll need to conduct better-informed security management that will lead to improved decisions on how to protect your people and assets in the Asia-Pacific region.

Vision in Japanese Entrepreneurship - The Evolution of a Security Enterprise (Hardcover): H.T. Shimazaki Vision in Japanese Entrepreneurship - The Evolution of a Security Enterprise (Hardcover)
H.T. Shimazaki
R2,623 R2,277 Discovery Miles 22 770 Save R346 (13%) Ships in 12 - 19 working days

The service sector occupies a dominant position in the Japanese economy, yet few studies have looked at the way the industry developed. This book, first published in 1992, focuses on the growth and development of a major world security and communications corporation, SECOM. The success of the company has been rooted in the management strategies of Makoto Iida, who has shaped the company from a small localized business to an international industry at the forefront of innovation. The book first looks at the background of Makoto Iida, offering an insight into the nature of an entrepreneur and the issues this raises within the context of Japanese management styles. It then follows the company development stage by stage, assessing the importance of individual creativity in adapting and implementing traditional management techniques. It shows how strategies for human resources, service quality, new technology, globalization and corporate restructuring evolve within the context of a growing organization, and includes an analysis of the innovative marketing techniques and product development processes needed to sell security services to one of the world's safest countries.

Science and Technology of Terrorism and Counterterrorism (Paperback, 2nd edition): Tushar K. Ghosh, Mark A. Prelas, Dabir S.... Science and Technology of Terrorism and Counterterrorism (Paperback, 2nd edition)
Tushar K. Ghosh, Mark A. Prelas, Dabir S. Viswanath, Sudarshan K. Loyalka; Thomas M. Haladyna
R2,029 Discovery Miles 20 290 Ships in 12 - 19 working days

Traditionally, resources on terrorism and counterterrorism tend to focus on the social, behavioral, and legal aspects of the subject, with minimal emphasis on the scientific and technological aspects. Taking into account these practical considerations, the second edition of Science and Technology of Terrorism and Counterterrorism discusses the nature of terrorism and the materials used by terrorists. It describes how intelligence professionals and law enforcement personnel can detect and destroy these materials, and how they can deal with terrorist groups. This volume begins by introducing the shift in analysis of terrorist attacks after September 11, 2001 and summarizes selected case studies. It discusses the origin and nature of terrorism and the factors involved in diplomacy. Covering a broad range of topics, the book examines: Aerosol dispersion of toxic materials Bioterrorism and the manufacture, detection, and delivery of biological agents Agricultural terrorism Nuclear terrorism and nuclear weapons systems, threats, and safeguards Chemical terrorism, including manufacture, detection, delivery, and decontamination Cyber-terrorism Personal protective equipment The role of government at federal, state, and local levels The role of international agencies and their resources, capabilities, and responsibilities The National Infrastructure Protection Plan As terrorist activities increase globally, it is critical that those charged with protecting the public understand the myriad of ways in which terrorists operate. While we cannot predict where, when, and how terrorists will strike, our vigilance in staying abreast of the terrorist threat is the only way to have a fighting chance against those who seek to destroy our world.

Practical Hacking Techniques and Countermeasures (Hardcover): Mark D Spivey Practical Hacking Techniques and Countermeasures (Hardcover)
Mark D Spivey
R5,070 Discovery Miles 50 700 Ships in 12 - 19 working days

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

The Privatization of Israeli Security (Paperback): Shir Hever The Privatization of Israeli Security (Paperback)
Shir Hever
R648 Discovery Miles 6 480 Ships in 12 - 19 working days

Between 1994-2014, Israel's security service was transformed, becoming one of the most extreme examples of privatised security in the world. This book is an investigation into this period and the conditions that created 'Occupation Inc.': the institution of a private military-security-industrial complex. State sponsored violence is increasing as a result of this securitisation, but why is it necessary, and what are its implications? In this book, Shir Hever considers the impact of the ongoing Palestinian resistance to Israeli occupation, the influence of U.S. military aid and the rise of neoliberalism in Israel, to make sense of this dramatic change in security policy. Through the lens of political economy, this book shows how the Israeli security elites turn violence into a commodity in order to preserve their status and wealth, providing a fresh new perspective on the Israeli occupation.

Emergency Response and Hazardous Chemical Management - Principles and Practices (Hardcover): Clyde B. Strong, T.Rick Irvin Emergency Response and Hazardous Chemical Management - Principles and Practices (Hardcover)
Clyde B. Strong, T.Rick Irvin
R4,949 Discovery Miles 49 490 Ships in 12 - 19 working days

Management of hazardous chemicals and materials-particularly during emergency release situations-is a critical part of routine training required for workers and professionals in the chemical, petroleum and manufacturing industries. Proper storage of highly reactive chemical agents, correct choice of protective clothing and safety issues in confined spaces are vital to operating facilities. Inattention to these and other issues covered in this book can result in a loss of life, dispersal of toxic chemical agents into the environment, or fire and explosion and subsequent legal liabilities.Emergency Response and Hazardous Chemical Management: Principles and Practices provides a concise reference for management and workers on the important issues regarding the use and management of hazardous chemicals as well as the critical issues in the emergency response management of uncontrolled releases of hazardous agents. This book combines practical information on hazardous chemical response and environmental management with scientific and management issues important in the development of sound chemical management planning. Important current topics such as hazardous chemical management in confined spaces are also covered in detail.

Personal Security - A Guide for International Travelers (Hardcover): Tanya Spencer Personal Security - A Guide for International Travelers (Hardcover)
Tanya Spencer
R5,820 Discovery Miles 58 200 Ships in 12 - 19 working days

Maintain peace of mind while you are working or living abroad-wherever and however you travel. As an international traveler, you know there are risks. But are you doing everything you can to protect yourself and your belongings? Whether you are traveling for work or pleasure, Personal Security: A Guide for International Travelers enables you to prevent security incidents and react in life-saving ways during a crisis. This comprehensive manual answers questions such as: Which criteria should you use for selecting the safest hotel or airline? How to deal with corrupt officials? What are special considerations for women, families, elderly, or travelers with disabilities? What support can you expect from your organization and what are your responsibilities? Benefit from lessons learned from leading experts and seasoned travelers Learn how criminals select their targets and manipulate situations, whether for street crime or serious attack such as kidnapping or terrorism See yourself from the local perspective Deal with common travel inconveniences and stress factors proactively Improve your situational awareness Increase your effectiveness by realistically assessing threats Make the most out of the opportunities that traveling brings Tanya Spencer has traveled extensively to high-risk destinations and has trained 1000s of people how to safely navigate the complexities of international travel. Emphasizing prevention, the book covers medical, cultural, and political considerations, so you understand exactly what you must do before and while you are abroad. It provides flexible frameworks, models, and tools that allow you to easily apply the wealth of tips and advice to any travel situation you might face. Before your next trip, benefit from these time-tested strategies for proactively managing travel risks.

Terrorist Recognition Handbook - A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Third... Terrorist Recognition Handbook - A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Third Edition (Hardcover, 3rd edition)
Desmond Wenger, Malcolm W. Nance
R5,860 Discovery Miles 58 600 Ships in 12 - 19 working days

First published in 2003, Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities remains one of the only books available to provide detailed information on terrorist methodology revealing terrorist motivation, organizational structure, planning, financing, and operational tactics to carry out attacks. This fully revised and updated third edition contains the detailed analysis and history of prior editions with completely new case studies and information on new and emerging terrorist practices and trends. Updates to the third edition include: The newest geopolitical challenges and terrorism to emerge from the geopolitical climate post-Arab Spring Details on the newest attack tactics and procedures of al-Qaeda including al-Qaeda of the Arabian Peninsula, the Islamic Maghreb, and East and North Africa Lessons learned from recent terrorist operations and information gained from plots foiled by the FBI in the U.S. Current strategic factors and regional variables affecting global terrorism and regional insurgencies Potential points of failure in terrorist operations where plots can be most easily detected and disrupted The increasing trend of self radicalized, Internet- educated "lone wolf" operations, as demonstrated in the Boston Marathon bombing The rebirth of U.S. and European militia groups Written for counterterrorism practitioners who risk their lives to uncover planned attacks on civilian populations, this book will serve as a guide to train intelligence operatives, law enforcement entities, and military intelligence agents and soldiers to recognize and disrupt the various stages of developing terrorist plots.

Business Theft and Fraud - Detection and Prevention (Hardcover): James R. Youngblood Business Theft and Fraud - Detection and Prevention (Hardcover)
James R. Youngblood
R5,820 Discovery Miles 58 200 Ships in 12 - 19 working days

Business Theft and Fraud: Detection and Prevention offers a broad perspective on business-related theft, providing a detailed discussion of numerous avenues of theft, including internal and external fraud, organized retail crime, mortgage fraud, cyber fraud, and extortion. Combining current research and the author's extensive experience with loss prevention and security, this professional text identifies industry trouble areas and offers techniques to combat business theft, such as how to identify sales underreporting, track sales by shifts, and educate employees on computer-related fraud. This publication is critical for those involved with loss prevention, security, or criminal justice. Business Theft and Frauds accessible, franchise-oriented scope will help many professionals identify and thwart threats in the evolving business world.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
African Artificial Intelligence…
Mark Nasila Paperback R350 R312 Discovery Miles 3 120
A Theory of Objects
Martin Abadi, Luca Cardelli Hardcover R6,554 Discovery Miles 65 540
Multi-Level Simulation for VLSI Design
D. D. Hill, D. R. Coelho Hardcover R3,000 Discovery Miles 30 000
Design Patterns
Erich Gamma, Richard Helm, … Paperback R996 Discovery Miles 9 960
Smart and Sustainable Collaborative…
Luis M. Camarinha-Matos, Xavier Boucher, … Hardcover R6,500 Discovery Miles 65 000
An Invitation to Analytic Combinatorics…
Stephen Melczer Hardcover R3,919 Discovery Miles 39 190
Advances in Computers, Volume 124
Suyel Namasudra Hardcover R4,998 R4,188 Discovery Miles 41 880
Handbook of Logic and Proof Techniques…
Steven G. Krantz Hardcover R1,545 Discovery Miles 15 450
Biological Water - Physicochemical…
Gertz I. Likhtenshtein Hardcover R4,615 Discovery Miles 46 150
Gamma-Convergence for Beginners
Andrea Braides Hardcover R4,170 Discovery Miles 41 700

 

Partners