0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (5)
  • R500+ (330)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General

Intelligence and State Surveillance in Modern Societies - An International Perspective (Hardcover): Frederic Lemieux Intelligence and State Surveillance in Modern Societies - An International Perspective (Hardcover)
Frederic Lemieux
R2,732 Discovery Miles 27 320 Ships in 12 - 17 working days

Often described as 'two solitudes', law enforcement and national security intelligence agencies engage in intensive collaboration to address both international and domestic threats. This situation has blurred the lines between interior and exterior security; common crime and crime against the state; civil liberties, privacy, and intrusive surveillance activities; strategic national security intelligence and operational military intelligence requirements. National and local law enforcement agencies now conduct intelligence operations against international terrorist groups while national security intelligence organizations infiltrate organized crime and intercept citizens' communications on a daily basis. Other important trends are reshaping the state's surveillance and intelligence apparatus in modern societies, including the use of cyberspace for information collection, the expansion of surveillance technology penetrating citizens' everyday life, and the rise of the private sector as a primary surveillance facilitator or third party in national security intelligence collection and dissemination. This book will be of interest to those seeking to understand the intelligence environment in modern times, providing a broad understanding of current and emerging issues related to intelligence activities and offers a unique way of thinking about contemporary challenges in this field.

US National Cybersecurity - International Politics, Concepts and Organization (Paperback): Damien Van Puyvelde, Aaron Brantly US National Cybersecurity - International Politics, Concepts and Organization (Paperback)
Damien Van Puyvelde, Aaron Brantly
R1,463 Discovery Miles 14 630 Ships in 12 - 17 working days

This volume explores the contemporary challenges to US national cybersecurity. Taking stock of the field, it features contributions by leading experts working at the intersection between academia and government and offers a unique overview of some of the latest debates about national cybersecurity. These contributions showcase the diversity of approaches and issues shaping contemporary understandings of cybersecurity in the West, such as deterrence and governance, cyber intelligence and big data, international cooperation, and public-private collaboration. The volume's main contribution lies in its effort to settle the field around three main themes exploring the international politics, concepts, and organization of contemporary cybersecurity from a US perspective. Related to these themes, this volume pinpoints three pressing challenges US decision makers and their allies currently face as they attempt to govern cyberspace: maintaining international order, solving conceptual puzzles to harness the modern information environment, and coordinating the efforts of diverse partners. The volume will be of much interest to students of cybersecurity, defense studies, strategic studies, security studies, and IR in general.

The Insider Threat - Assessment and Mitigation of Risks (Hardcover): Eleanor E. Thompson The Insider Threat - Assessment and Mitigation of Risks (Hardcover)
Eleanor E. Thompson
R2,050 Discovery Miles 20 500 Ships in 12 - 17 working days

This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.

Soft Target Hardening - Protecting People from Attack (Hardcover, 2nd edition): Jennifer Hesterman Soft Target Hardening - Protecting People from Attack (Hardcover, 2nd edition)
Jennifer Hesterman
R6,425 Discovery Miles 64 250 Ships in 12 - 17 working days

The US government spends billions of dollars to secure strategic and tactical assets at home and abroad against enemy attack. However, as "hard targets" such as military installations and government buildings are further strengthened, vulnerable soft targets are increasingly in the crosshairs of terrorists and violent criminals. Attacks on crowded spaces such as churches, schools, malls, transportation hubs, and recreational venues result in more casualties and have a powerful effect on the psyche of the populace. Soft Target Hardening: Protecting People from Attack, Second Edition, continues the national dialogue started by the first edition by providing case studies, best practices, and methodologies for identifying soft target vulnerabilities and reducing risk in the United States and beyond. Soft target attacks steadily climbed in number and scale of violence since the first edition of this book. New tactics emerged, as terrorists continually hit the "reset button" with each attack. In this volatile, ever-changing security environment, plans to protect people and property must be fluid and adaptable. Along with new hardening tactics, such as the use of tactical deception to disguise, conceal, and divert, the author has updated the text with new case studies to reflect and respond to the fast-moving transformation in methods from more complex and organized forms of terror to simpler, yet still-devastating approaches. This book is a must-read for those who secure, own, and operate soft target facilities, and for citizens who want to protect themselves and their families from attack. Soft Target Hardening, Second Edition, was named the ASIS International Security Industry Book of the Year in 2019.

Strategic Security Management - A Risk Assessment Guide for Decision Makers, Second Edition (Hardcover, 2nd edition): Karim... Strategic Security Management - A Risk Assessment Guide for Decision Makers, Second Edition (Hardcover, 2nd edition)
Karim Vellani
R3,556 Discovery Miles 35 560 Ships in 12 - 17 working days

Strategic Security Management, Second Edition provides security leadership and decision-makers with a fresh perspective on threat, vulnerability, and risk assessment. The book offers a framework to look at applying security analysis and theory into practice for effective security program, implementation, management and evaluation. Chapters examine metric-based security resource allocation of countermeasures, including security procedures, utilization of personnel, and electronic measures. The new edition is fully updated to reflect the latest industry best-practices and includes contributions from security industry leaders-based on their years of professional experience-including Norman Bates, Robert Emery, Jack Follis, Steve Kaufer, Andrew Rubin, Michael Silva, and Ken Wheatley. Strategic Security Management, Second Edition will be a welcome addition to the security literature for all security professionals, security managers, and criminal justice students interested in understanding foundational security principles and their application.

Lloyd's MIU Handbook of Maritime Security (Hardcover): Rupert Herbert-Burns, Sam Bateman, Peter Lehr Lloyd's MIU Handbook of Maritime Security (Hardcover)
Rupert Herbert-Burns, Sam Bateman, Peter Lehr
R3,871 Discovery Miles 38 710 Ships in 12 - 17 working days

Managing the ever-changing nature and cross-disciplinary challenges of the maritime sector demands a complete understanding of the special characteristics of the maritime space. The complexity of the operations of ships, ports, shipping companies, and naval and coast guard maritime security operations-as well as the economic significance and the inherent security vulnerabilities of global maritime trade-requires a thorough, holistic and adaptable understanding of commercial, law enforcement and naval maritime security phenomena. Written by a team of expert contributors, this book identifies and assesses the issues inherent in developing and implementing maritime security measures. It examines the new maritime security environment, including the different but complementary interests of the shipping industry and national regulatory agencies. The coverage includes analyses of the different threats to maritime security and how they are perceived by different actors in the maritime domain. The editors evaluate the international and national legal frameworks developed for specific sectors and the responses that different nations have given to these initiatives. Comprehensive in scope, the volume addresses security concerns that pertain to a wide spectrum of commercial shipping and maritime security situations, regulatory frameworks, sector-specific vulnerabilities, regional nuances, and port facilities.

Public Safety and Security Administration (Paperback): P J. Ortmeier Public Safety and Security Administration (Paperback)
P J. Ortmeier
R1,496 Discovery Miles 14 960 Ships in 12 - 17 working days

This book addresses public safety and security from a holistic and visionary perspective. For the first time, safety and security organizations, as well as their administration, are brought together into an integrated work.
The protection of persons and property involves many public agencies and priivate organizations. Entities from the criminal jutics system (law enforcement, courts, corrections) as well as the fire service, private security and hazardous materials all contribute to public safety and security. This book addresses these entities, as well as safety and security issues, from a holistic and visionary perspective. It addresses criminal and non-criminal safety and security concerns, provides an overview of each entity (component) of the system of public safety and security, presents an overview of the administration process involved in planning, organizing, managing and evaluating public safety and security organizations and describes collateral functions of investigations, documentation and report writing.
Public safety and security organizations should not work in isolation. Rather, they should collaborate to protect persons and property. This book represents the first time all the public safety and security entities have been addressed in one text.

Focuses on the theories, concepts, practices and problems related to the present and future of public safety and security
Examines different strategies for problem solving which personnel working in the field may utilize
Synthesizes college-level lectures prepared, presented, and updated by the author over the past twenty years

Investigations 150 Things You Should Know (Paperback): Lawrence Fennelly, Louis Tyska Investigations 150 Things You Should Know (Paperback)
Lawrence Fennelly, Louis Tyska
R1,172 R1,104 Discovery Miles 11 040 Save R68 (6%) Ships in 12 - 17 working days

By covering the essential tips and techniques for investigators, Investigations: 150 Things You Should Know becomes a useful reference. By further covering the legal guidelines that investigators must follow, it becomes indispensable. Through anecdotes, case studies, and documented procedures the authors of this book have amassed the most complete collection of investigative information available.
This ready reference is for anyone interested in investigations. Readers in and out of the law enforcement field will find this book easy to use and understand when seeking explanations about a wide variety of investigative topics including: constitutional law, documentary evidence, interviewing and interrogating, and surveillance.

Comprehensive overview of investigation
Easily readable and accessible information supplies all the necessary elements for the beginner or expert investigator
Further investigative resources are listed in valuable appendices

Model Security Policies, Plans and Procedures (Paperback): John Fay Model Security Policies, Plans and Procedures (Paperback)
John Fay
R1,894 R1,752 Discovery Miles 17 520 Save R142 (7%) Ships in 12 - 17 working days

Model Security Policies, Plans, and Procedures contains sample security policy, planning, and procedural documents drawn from the proven experiences of hundreds of America's most successful corporations. If your job requires you to develop or update security policies, plans, or procedures, this book will be a highly valuable resource. The samples cover the key concepts of organizational protection. Putting the samples to use, either as presented or as drafting guides, can eliminate many hours of tedious research and writing.

Offers a practical mode of reference for security professionalsContains sample plans, policies and procedures

Risk Management for Security Professionals (Hardcover): Carl Roper Risk Management for Security Professionals (Hardcover)
Carl Roper
R1,936 Discovery Miles 19 360 Ships in 12 - 17 working days

This book describes the risk management methodology as a specific process, a theory, or a procedure for determining your assets, vulnerabilities, and threats and how security professionals can protect them.
Risk Management for Security Professionals is a practical handbook for security managers who need to learn risk management skills. It goes beyond the physical security realm to encompass all risks to which a company may be exposed. Risk Management as presented in this book has several goals:
Provides standardized common approach to risk management through a framework that effectively links security strategies and related costs to realistic threat assessment and risk levels
Offers flexible yet structured framework that can be applied to the risk assessment and decision support process in support of your business or organization
Increases awareness in terms of potential loss impacts, threats and vulnerabilities to organizational assets
Ensures that various security recommendations are based on an integrated assessment of loss impacts, threats, vulnerabilities and resource constraints

Risk management is essentially a process methodology that will provide a cost-benefit payback factor to senior management.
Provides a stand-alone guide to the risk management process
Helps security professionals learn the risk countermeasures and their pros and cons
Addresses a systematic approach to logical decision-making about the allocation of scarce security resources

CISO COMPASS - Navigating Cybersecurity Leadership Challenges with Insights from Pioneers (Hardcover): Todd Fitzgerald CISO COMPASS - Navigating Cybersecurity Leadership Challenges with Insights from Pioneers (Hardcover)
Todd Fitzgerald
R3,655 Discovery Miles 36 550 Ships in 9 - 15 working days

#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021! 2020 Cybersecurity CANON Hall of Fame Winner! Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.

Preventing and Managing Violence in Organizations - Workplace Violence, Targeted Violence, and Active Shooters (Hardcover):... Preventing and Managing Violence in Organizations - Workplace Violence, Targeted Violence, and Active Shooters (Hardcover)
Marc H. Siegel
R4,131 Discovery Miles 41 310 Ships in 12 - 17 working days

Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue. As such, the book's objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach. The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager. While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization's system of management and all its activities and functions. The "Introduction" section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization's overall business management strategy. The "Framework" section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The "Tactics and Control Measures" section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events. For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach. Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization's day-to-day activities-as an integral part of these activities-rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.

Private Security Law - Case Studies (Hardcover): David Maxwell Private Security Law - Case Studies (Hardcover)
David Maxwell
R1,426 Discovery Miles 14 260 Ships in 12 - 17 working days

Private Security Law: Case Studies is uniquely designed for the special needs of private security practitioners, students, and instructors. Part One of the book encompasses negligence, intentional torts, agency contracts, alarms, and damages. Part Two covers authority of the private citizen, deprivation of rights, and entrapment.
The factual cases presented in this book touch on the everyday duties of persons associated with the private security industry. Private Security Law: Case Studies provides a basic orientation to problems capable of inciting litigation. The information presented through case laws comes from cases chosen for their factual, realistic, and practical connection to the private security industry. This focused approach addresses specific problem areas of the industry and provides information necessary to a security manager to avert future loss.
Specially designed for private security practitioners, instructors, and students.
Examines cases that are practical, realistic and relevant to specific areas of private security.
Provides the information security managers need to avoid future problems.

Seen But Not Heard - Placing Children and Youth on the Security Governance Agenda (Paperback): Nosworthy David Seen But Not Heard - Placing Children and Youth on the Security Governance Agenda (Paperback)
Nosworthy David
R949 Discovery Miles 9 490 Ships in 12 - 17 working days

For all those who read the pages of this important study, they will undoubtedly appreciate the important responsibility the security sector has towards children. It will enable them to think through how child protection strategies can become an integral part of efforts to create a more secure and better world. What is particularly impressive is that the reflection and arguments presented here bring together and combine a common vision of the priorities that influence the security sector and civil society, and this fact alone is full of promise for it envisages investments in children today that will benefit the young people who will become the leaders of tomorrow. The book offers an excellent opportunity to broaden the debate on conflict and children away from just child soldiers, but to focus also on young people in general and the active contribution that they have to make to peacebuilding and social development. From a security governance perspective there is a clear responsibility on the part of multiple actors at multiple layers to formulate the collaborative approaches required to provide a secure environment for all children everywhere.

Intelligence on the Frontier Between State and Civil Society (Hardcover): Karen Lund Petersen, Kira Ronn Intelligence on the Frontier Between State and Civil Society (Hardcover)
Karen Lund Petersen, Kira Ronn
R4,133 Discovery Miles 41 330 Ships in 12 - 17 working days

Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security.

A Comprehensive Look at Fraud Identification and Prevention (Hardcover): James R. Youngblood A Comprehensive Look at Fraud Identification and Prevention (Hardcover)
James R. Youngblood
R3,263 Discovery Miles 32 630 Ships in 12 - 17 working days

Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention. The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include: Employee theft and fraud Organizational fraud Identity theft and fraud Fraud against the elderly Internet, computer, and e-mail fraud Ponzi and pyramid schemes The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers. Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.

Cultural Property Security - Protecting Museums, Historic Sites, Archives, and Libraries (Hardcover): Daniel J Benny Cultural Property Security - Protecting Museums, Historic Sites, Archives, and Libraries (Hardcover)
Daniel J Benny
R4,144 Discovery Miles 41 440 Ships in 12 - 17 working days

The protection and security of cultural properties is of primary concern to the thousands of federal, state, county, city, and private institutions entrusted with housing and displaying our national heritage and history of our society. Cultural property security is of global importance as well, with tens of thousands of institutions internationally tasked with protecting and maintaining relics and artifacts of social, cultural, and historical significance. Cultural Property Security offers powerful protection guidelines to security departments tasked with safeguarding popular historical sites, museums, and libraries and the historical artifacts they house. Presenting practical, ready-to-implement solutions in a clear writing style, the book: Provides a working definition of cultural properties Identifies the threats against cultural properties from crime and terrorism, particularly in regions with political or civil unrest Offers guidance in threat assessment Identifies the physical security measures and technology that can be used to protect such institutions Presents guidelines for establishing a protective service department for cultural properties Describes proper arrest and post-arrest protocols Includes a list of online resources for further information related to the protection of cultural properties Complete with dozens of photos, the book establishes leading industry best practices to identify the various threats to cultural properties and protect them. Dr. Daniel J. Benny has more than 35 years of security management experience and has served as a Director of Protective Services for the state of Pennsylvania's Historic and Museum Commission. His insight is invaluable to those responsible for securing these institutions from internal and external threats.

Crime Prevention - Approaches, Practices, and Evaluations (Paperback, 11th edition): Steven P Lab Crime Prevention - Approaches, Practices, and Evaluations (Paperback, 11th edition)
Steven P Lab
R2,094 Discovery Miles 20 940 Ships in 12 - 17 working days

Clear, comprehensive approach to crime prevention introduces undergraduates to the breadth of this field, showing students how to assess tactics and their impact in reducing crime or fear of victimization The market leader in a course taught in Criminal Justice, Criminology, and Sociology programs world-wide Foundational principles of crime prevention with global examples plus a curated collection of online resources for instructors and students makes this book the best choice for Crime Prevention and Crime Control courses

Boko Haram - Security Considerations and the Rise of an Insurgency (Hardcover): Ona Ekhomu Boko Haram - Security Considerations and the Rise of an Insurgency (Hardcover)
Ona Ekhomu
R3,550 Discovery Miles 35 500 Ships in 12 - 17 working days

Boko Haram analyzes the activities and atrocities of Nigeria's Jihadi terrorist group, Boko Haram, in the context of global religious fundamentalism and extremism. The book traces the early beginnings of the religious sect, the conversion of its leader to radical Islam in 2002, and the group's campaign of violence beginning in 2009 and continuing to the present. The group's attacks against a variety of targets are examined in detail as are their general tactics and strategies. The Nigerian government response is also examined in order to provide critical lessons to counterterrorism planners, policy and government officials, and scholars. The initial military response was hampered by capability and legislative constraints including a lack of arms and ammunition, a lack of modern counterterrorism equipment, training gaps, leadership issues, intelligence gaps, politicization of the conflict, and limited support to the Nigerian military by the international community. Boko Haram looks at the work that has been done thus far, and what work needs to continue, to make gains to combat, marginalize, and ultimately defeat Boko Haram and resolve the conflict facing Nigeria. Key features: Outlines the history of Boko Haram and its emergence in Nigeria Provides the latest developments on fundamentalism in Nigeria, the growth of Boko Haram and the government response Focuses on the attacks, attack methodology and targeting of Boko Haram, addressing best-practice countermeasures Examines Boko Haram's ties to other Islamist groups including ISIL/ISIS and others Details the importance for international cooperation in responding to Boko Haram's activities and threats. About the Author: Dr. Ona Ekhomu, CFE, CPP, CSP, PCI, CPOI was born in Irrua, Nigeria. He holds the PhD from University of Pittsburgh. A policy analyst and security expert, Ekhomu is Chairman Trans-World Security Systems Ltd. and Chairman School of Management and Security (Lagos, Nigeria). President of Trans-World Security Systems Inc. of Chicago, Illinois, USA, Ekhomu is also a lecturer in the Sociology Department of the University of Lagos, Nigeria. He is President of the Association of Industrial Security and Safety Operators of Nigeria; Africa Representative of the International Foundation for Protection Officers; and former Regional Vice-President (West and Central Africa) of ASIS International. Ekhomu is author of Kidnap: Face to Face with Death (2014) and Effective Personal & Corporate Security (2009).

The Complete Guide for CPP Examination Preparation (Hardcover, 2nd edition): Anthony V. DiSalvatore (CPP, PSP & PCI) The Complete Guide for CPP Examination Preparation (Hardcover, 2nd edition)
Anthony V. DiSalvatore (CPP, PSP & PCI)
R3,880 Discovery Miles 38 800 Ships in 12 - 17 working days

Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.

The Privatization of Israeli Security (Hardcover): Shir Hever The Privatization of Israeli Security (Hardcover)
Shir Hever
R2,233 R2,092 Discovery Miles 20 920 Save R141 (6%) Ships in 12 - 17 working days

Between 1994-2014, Israel's security service was transformed, becoming one of the most extreme examples of privatised security in the world. This book is an investigation into this period and the conditions that created 'Occupation Inc.': the institution of a private military-security-industrial complex. State sponsored violence is increasing as a result of this securitisation, but why is it necessary, and what are its implications? In this book, Shir Hever considers the impact of the ongoing Palestinian resistance to Israeli occupation, the influence of U.S. military aid and the rise of neoliberalism in Israel, to make sense of this dramatic change in security policy. Through the lens of political economy, this book shows how the Israeli security elites turn violence into a commodity in order to preserve their status and wealth, providing a fresh new perspective on the Israeli occupation.

Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed): Amy Zegart Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed)
Amy Zegart
R751 Discovery Miles 7 510 Ships in 12 - 17 working days

In this provocative and thoughtful book, Amy Zegart challenges the conventional belief that national security agencies work reasonably well to serve the national interest as they were designed to do. Using a new institutionalist approach, Zegart asks what forces shaped the initial design of the Central Intelligence Agency, the Joint Chiefs of Staff, and the National Security Council in ways that meant they were handicapped from birth.
Ironically, she finds that much of the blame can be ascribed to cherished features of American democracy--frequent elections, the separation of powers, majority rule, political compromise--all of which constrain presidential power and give Congress little incentive to create an effective foreign policy system. At the same time, bureaucrats in rival departments had the expertise, the staying power, and the incentives to sabotage the creation of effective competitors, and this is exactly what they did.
Historical evidence suggests that most political players did not consider broad national concerns when they forged the CIA, JCS, and NSC in the late 1940s. Although President Truman aimed to establish a functional foreign policy system, he was stymied by self-interested bureaucrats, legislators, and military leaders. The NSC was established by accident, as a byproduct of political compromise; Navy opposition crippled the JCS from the outset; and the CIA emerged without the statutory authority to fulfill its assigned role thanks to the Navy, War, State, and Justice departments, which fought to protect their own intelligence apparatus.
Not surprisingly, the new security agencies performed poorly as they struggled to overcome their crippled evolution. Only the NSC overcame its initial handicaps as several presidents exploited loopholes in the National Security Act of 1947 to reinvent the NSC staff. The JCS, by contrast, remained mired in its ineffective design for nearly forty years--i.e., throughout the Cold War--and the CIA's pivotal analysis branch has never recovered from its origins. In sum, the author paints an astonishing picture: the agencies Americans count on most to protect them from enemies abroad are, by design, largely incapable of doing so.

Security Surveillance Centers - Design, Implementation, and Operation (Hardcover): Anthony V. DiSalvatore Security Surveillance Centers - Design, Implementation, and Operation (Hardcover)
Anthony V. DiSalvatore
R3,986 Discovery Miles 39 860 Ships in 12 - 17 working days

Unlike current books on the market that focus primarily on the technical aspects of surveillance and protection, Security Surveillance Centers: Design, Implementation, and Operation focuses on the operation of a security surveillance center. This text explains in detail the role of security surveillance, as well as the critical aspects of the design, implementation, and operation of security surveillance centers of all sizes. Step-by-step coverage of policy and procedures, as well as the inclusion of industry-specific operational forms, guarantee a practical, user-friendly text for all levels of readers. Intended for any individuals or organizations currently employing security surveillance systems, this book is an asset for all users, from trainees to supervisors, seeking to create a more secure environment for themselves and for others.

Effective Physical Security (Paperback, 4th edition): Lawrence Fennelly Effective Physical Security (Paperback, 4th edition)
Lawrence Fennelly
R1,372 Discovery Miles 13 720 Ships in 12 - 17 working days

"Effective Physical Security, " Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors work that set the standard: "Handbook of Loss Prevention and Crime Prevention, " Fifth Edition.

Designed for easy reference, "Effective Physical Security" contains important coverage of environmental design, security surveys, locks, lighting, and CCTV as well as new chapters covering the latest in the ISO standards for Risk Assessmentand Risk Management, physical security planning, network systems infrastructure, and environmental design. This new edition continues to serve as a valuable reference for experienced security practitioners as well as students in undergraduate and graduate security programs.
Required reading for the ASIS Physical Security Professional Certification (PSP) and recommended reading for the CPP certification Provides detailed coverage of Physical Security in an easily accessible reference format with content divided into three major parts: Design, Equipment, and Operations Each chapter is written by a recognized expert security specialist "

Private Security and the Law (Hardcover, 4th edition): Charles Nemeth Private Security and the Law (Hardcover, 4th edition)
Charles Nemeth
R1,595 R1,504 Discovery Miles 15 040 Save R91 (6%) Ships in 12 - 17 working days

"Private Security and the Law, 4th Edition," is a unique resource that provides analysis of practices in the security industry as they relate to law, regulation, licensure, and constitutional questions of case and statutory authority.This bookdescribes the legal requirements facedin the area of private security.It emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency.The textalso examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that will set pace for future private security laws and regulations. As private security becomes more closely involved in national and international security, cases like Blackwater are examined. Charles Nemeth takesyou step by step through the analysis of case law as it applies to situations commonly faced in the private security practice, providing a solid introduction to the legal and ethical standards that shape the industry.

*Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Digital Blood on Their Hands - The…
Andrew Jenkinson Paperback R881 Discovery Miles 8 810
Cognitive Risk
James Bone, Jessie H Lee Paperback R1,123 Discovery Miles 11 230
Privacy in Practice - Establish and…
Alan Tang Paperback R1,390 Discovery Miles 13 900
PKI Implementation and Infrastructures
Julian Ashbourn Paperback R1,110 Discovery Miles 11 100
Zero Trust Journey Across the Digital…
Abbas Kudrati, Binil A. Pillai Paperback R1,414 Discovery Miles 14 140
The Auditor's Guide to Blockchain…
Shaun Aghili Hardcover R3,052 Discovery Miles 30 520
Ransomware and Cybercrime
Andrew Jenkinson Paperback R963 Discovery Miles 9 630
Multllinguallsm, the Judicial Authority…
Kas Deprez, Theo du Plessis, … Paperback R590 R546 Discovery Miles 5 460
The Security Hippie
Barak Engel Paperback R1,110 Discovery Miles 11 100
PKI Implementation and Infrastructures
Julian Ashbourn Hardcover R3,016 Discovery Miles 30 160

 

Partners