0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (8)
  • R500+ (286)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General

The Handbook of Communication and Security (Paperback): Bryan C. Taylor, Hamilton Bean The Handbook of Communication and Security (Paperback)
Bryan C. Taylor, Hamilton Bean
R2,879 Discovery Miles 28 790 Ships in 10 - 15 working days

The Handbook of Communication and Security provides a comprehensive collection and synthesis of communication scholarship that engages security at multiple levels, including theoretical vs. practical, international vs. domestic, and public vs. private. The handbook includes chapters that leverage communication-based concepts and theories to illuminate and influence contemporary security conditions. Collectively, these chapters foreground and analyze the role of communication in shaping the economic, technological, and cultural contexts of security in the 21st century. This book is ideal for advanced undergraduate and postgraduate students and scholars in the numerous subfields of communication and security studies.

US National Cybersecurity - International Politics, Concepts and Organization (Paperback): Damien Van Puyvelde, Aaron Brantly US National Cybersecurity - International Politics, Concepts and Organization (Paperback)
Damien Van Puyvelde, Aaron Brantly
R1,545 Discovery Miles 15 450 Ships in 10 - 15 working days

This volume explores the contemporary challenges to US national cybersecurity. Taking stock of the field, it features contributions by leading experts working at the intersection between academia and government and offers a unique overview of some of the latest debates about national cybersecurity. These contributions showcase the diversity of approaches and issues shaping contemporary understandings of cybersecurity in the West, such as deterrence and governance, cyber intelligence and big data, international cooperation, and public-private collaboration. The volume's main contribution lies in its effort to settle the field around three main themes exploring the international politics, concepts, and organization of contemporary cybersecurity from a US perspective. Related to these themes, this volume pinpoints three pressing challenges US decision makers and their allies currently face as they attempt to govern cyberspace: maintaining international order, solving conceptual puzzles to harness the modern information environment, and coordinating the efforts of diverse partners. The volume will be of much interest to students of cybersecurity, defense studies, strategic studies, security studies, and IR in general.

The Insider Threat - Assessment and Mitigation of Risks (Hardcover): Eleanor E. Thompson The Insider Threat - Assessment and Mitigation of Risks (Hardcover)
Eleanor E. Thompson
R2,154 Discovery Miles 21 540 Ships in 10 - 15 working days

This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.

Soft Target Hardening - Protecting People from Attack (Hardcover, 2nd edition): Jennifer Hesterman Soft Target Hardening - Protecting People from Attack (Hardcover, 2nd edition)
Jennifer Hesterman
R6,790 Discovery Miles 67 900 Ships in 10 - 15 working days

The US government spends billions of dollars to secure strategic and tactical assets at home and abroad against enemy attack. However, as "hard targets" such as military installations and government buildings are further strengthened, vulnerable soft targets are increasingly in the crosshairs of terrorists and violent criminals. Attacks on crowded spaces such as churches, schools, malls, transportation hubs, and recreational venues result in more casualties and have a powerful effect on the psyche of the populace. Soft Target Hardening: Protecting People from Attack, Second Edition, continues the national dialogue started by the first edition by providing case studies, best practices, and methodologies for identifying soft target vulnerabilities and reducing risk in the United States and beyond. Soft target attacks steadily climbed in number and scale of violence since the first edition of this book. New tactics emerged, as terrorists continually hit the "reset button" with each attack. In this volatile, ever-changing security environment, plans to protect people and property must be fluid and adaptable. Along with new hardening tactics, such as the use of tactical deception to disguise, conceal, and divert, the author has updated the text with new case studies to reflect and respond to the fast-moving transformation in methods from more complex and organized forms of terror to simpler, yet still-devastating approaches. This book is a must-read for those who secure, own, and operate soft target facilities, and for citizens who want to protect themselves and their families from attack. Soft Target Hardening, Second Edition, was named the ASIS International Security Industry Book of the Year in 2019.

Bouncers - Violence and Governance in the Night-Time Economy (Paperback, Revised): Dick Hobbs, Philip Hadfield, Stuart Lister,... Bouncers - Violence and Governance in the Night-Time Economy (Paperback, Revised)
Dick Hobbs, Philip Hadfield, Stuart Lister, Simon Winlow
R792 Discovery Miles 7 920 Ships in 10 - 15 working days

In recent years, the expansion of night-time leisure has emerged as a key indicator of post-industrial urban prosperity, attracting investment, creating employment and re-generating the built environment. These leisure economies are youth-dominated, focusing upon the sale and consumption of alcohol. Unprecedented numbers of young people now flock to town centres that are crammed with bars, pubs and clubs, and the resulting violent disorder has over run police resources that remain geared to the drinking patterns and alcohol cultures of previous generations. Post-industrial re-structuring has spawned an increasingly complex mass of night-time leisure options through which numerous licit and illicit commercial opportunities flow. Yet, regardless of the fashionable and romantic notions of many contemporary urban theorists, it is alcohol, mass intoxication and profit rather than 'cultural regeneration,' which lies at the heart of this rapidly expanding dimension of post-industrial urbanism. Private security in the bulky form of bouncers fills the void left by the public police. These men (only 7% are women), whose activities are barely regulated by the State, are dominated by a powerful subculture rooted in routine violence and intimidation. Using ethnography, participant observation and extensive interviews with all the main players, this controversial book charts the emergence of the bouncer as one of the most graphic symbols in the iconography of post industrial Britain.

Business and Security - Public-Private Sector Relationships in a New Security Environment (Hardcover): Alyson J.K. Bailes,... Business and Security - Public-Private Sector Relationships in a New Security Environment (Hardcover)
Alyson J.K. Bailes, Isabel Frommelt
R1,305 Discovery Miles 13 050 Ships in 10 - 15 working days

The private business sector suffered both directly and indirectly from the terrorist strikes of 11 September 2001. Many business workers perished in the New York World Trade Center, and the insurance, transport, and tourism industries were hard hit by the aftermath. Restrictions imposed in the name of security made business travel and the movement of goods more complicated. The private sector was called upon to support the fight against terrorism actively with tougher controls on money transfers and on the export of dangerous materials and technologies. These events offered a striking case of the growing interdependence of the private and public sectors in tackling present-day security challenges. The impact of the private sector, for good or ill, in areas of conflict has long been recognized. Private business is at the centre of the latest concerns over the vulnerability of crucial infrastructures, including energy supply. Systematic public-private sector consultation and partnership are needed to tackle these problems, but neither the principles nor comprehensive mechanisms for such cooperation have yet been identified. This book brings together reflections on general and specific aspects of public-private sector interaction, from a variety of experts in business, government, international organizations, and the academic world. For completeness and balance, it also enquires into the costs of security and includes perspectives from Africa and the Arab world. It offers new reference material to help in the further exploration of this important subject.

Bouncers - Violence and Governance in the Night-time Economy (Hardcover, New): Dick Hobbs, Philip Hadfield, Stuart Lister,... Bouncers - Violence and Governance in the Night-time Economy (Hardcover, New)
Dick Hobbs, Philip Hadfield, Stuart Lister, Simon Winlow
R1,358 Discovery Miles 13 580 Ships in 10 - 15 working days

This book is the first attempt to understand Britain's night-time economy, the violence that pervades it, and the bouncers whose job it is to prevent it. Walk down any high street after dark and the shadows of bouncers will loom large, for they are the most visible form of control available in the youth-orientated zones of our cities after dark. Britain's rapidly expanding night-life is one of the country's most vibrant economic spheres, but it has created huge problems of violence and disorder. Using ethnography, participant observation, and extensive interviews with all the main players, this controversial book charts the emergence of the bouncer as one of the most graphic symbols in the iconography of post industrial Britain.

Private Security Vol 1 (Paperback): B. George, M Button Private Security Vol 1 (Paperback)
B. George, M Button
R1,389 Discovery Miles 13 890 Ships in 18 - 22 working days

Private security is now a multi-billion pound industry employing more personnel than the police. The authors provide incisive insights into the security world, scanning its weaknesses and exploring its potential. Based upon original research, supported by years of experience, they suggest that new ways of looking at the modern security world are long overdue. Private Security is a highly innovative book containing a wealth of up-to-date material. It is the definitive guide to the security world.

Prototype (Paperback): Jason Dean Prototype (Paperback)
Jason Dean
R298 R274 Discovery Miles 2 740 Save R24 (8%) Ships in 9 - 17 working days

A single breakthrough could change the world forever.Having just completed a complex recovery assignment, covert salvage specialist Korso is in no mood to take on another job so soon, but he has little choice when he's contacted by Cole Ashcroft, an ex-colleague who's calling in a debt. An official at the US Embassy in Bulgaria has approached Cole with a well-paying salvage job, but only if he can persuade Korso to plan the whole operation. A chemist for a pharmaceutical company has secretly developed a revolutionary glaucoma pill, one with an unexpected side effect that could make it the discovery of the century. But the chemist has since been found dead, and the prototypes are missing... Aware that ownership of these pills could shift the balance of military power overnight, the embassy man offers to pay Korso handsomely to locate and recover them using any means necessary. But with a job this big Korso also knows he'll have to assemble a team to help him, and that brings its own set of problems. Because with potential profits in the billions, can he really trust anyone...? A full-throttle thriller that will keep you guessing to the very end, perfect for fans of Mark Greaney, Ben Coes and Adam Hamdy.

Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed): Amy Zegart Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed)
Amy Zegart
R691 Discovery Miles 6 910 Ships in 18 - 22 working days

In this provocative and thoughtful book, Amy Zegart challenges the conventional belief that national security agencies work reasonably well to serve the national interest as they were designed to do. Using a new institutionalist approach, Zegart asks what forces shaped the initial design of the Central Intelligence Agency, the Joint Chiefs of Staff, and the National Security Council in ways that meant they were handicapped from birth.
Ironically, she finds that much of the blame can be ascribed to cherished features of American democracy--frequent elections, the separation of powers, majority rule, political compromise--all of which constrain presidential power and give Congress little incentive to create an effective foreign policy system. At the same time, bureaucrats in rival departments had the expertise, the staying power, and the incentives to sabotage the creation of effective competitors, and this is exactly what they did.
Historical evidence suggests that most political players did not consider broad national concerns when they forged the CIA, JCS, and NSC in the late 1940s. Although President Truman aimed to establish a functional foreign policy system, he was stymied by self-interested bureaucrats, legislators, and military leaders. The NSC was established by accident, as a byproduct of political compromise; Navy opposition crippled the JCS from the outset; and the CIA emerged without the statutory authority to fulfill its assigned role thanks to the Navy, War, State, and Justice departments, which fought to protect their own intelligence apparatus.
Not surprisingly, the new security agencies performed poorly as they struggled to overcome their crippled evolution. Only the NSC overcame its initial handicaps as several presidents exploited loopholes in the National Security Act of 1947 to reinvent the NSC staff. The JCS, by contrast, remained mired in its ineffective design for nearly forty years--i.e., throughout the Cold War--and the CIA's pivotal analysis branch has never recovered from its origins. In sum, the author paints an astonishing picture: the agencies Americans count on most to protect them from enemies abroad are, by design, largely incapable of doing so.

Master of War - Blackwater USA's Erik Prince and the Business of War (Paperback): Suzanne Simons Master of War - Blackwater USA's Erik Prince and the Business of War (Paperback)
Suzanne Simons
R426 Discovery Miles 4 260 Ships in 18 - 22 working days

"Suzanne Simons is a masterful storyteller. But make no mistake-Master of War is not a work of fiction...A powerful and true account." -Wolf Blitzer, anchor, CNN's The Situation Room Master of War is the riveting true story of Eric Prince, the ex-Navy SEAL who founded Blackwater and built the world's largest military contractor, privatizing war for client nations around the world. A CNN producer and anchor, Suzanne Simons is the first journalist to get deep inside Blackwater-and, as a result of her unprecedented access, Master of War provides the most complete and revelatory account of the rise of this powerful corporate army and the remarkable entrepreneur who brought it into being, while offering an eye-opening, behind-the-scenes look at the wars in Iraq and Afghanistan.

Preventing and Managing Violence in Organizations - Workplace Violence, Targeted Violence, and Active Shooters (Hardcover):... Preventing and Managing Violence in Organizations - Workplace Violence, Targeted Violence, and Active Shooters (Hardcover)
Marc H. Siegel
R4,486 Discovery Miles 44 860 Ships in 10 - 15 working days

Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue. As such, the book's objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach. The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager. While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization's system of management and all its activities and functions. The "Introduction" section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization's overall business management strategy. The "Framework" section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The "Tactics and Control Measures" section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events. For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach. Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization's day-to-day activities-as an integral part of these activities-rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.

A Comprehensive Look at Fraud Identification and Prevention (Hardcover): James R. Youngblood A Comprehensive Look at Fraud Identification and Prevention (Hardcover)
James R. Youngblood
R3,524 Discovery Miles 35 240 Ships in 10 - 15 working days

Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention. The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include: Employee theft and fraud Organizational fraud Identity theft and fraud Fraud against the elderly Internet, computer, and e-mail fraud Ponzi and pyramid schemes The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers. Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.

Hospitality Security - Managing Security in Today's Hotel, Nightlife, Entertainment, and Tourism Environment (Paperback,... Hospitality Security - Managing Security in Today's Hotel, Nightlife, Entertainment, and Tourism Environment (Paperback, 2nd edition)
Darrell Clifton
R2,013 Discovery Miles 20 130 Ships in 10 - 15 working days

Outlines risk assessments in which threats and vulnerabilities are calculated with probabilities to determine risk Presents how to establish a security plan, and, in this, how to determine the best deployment of various layers of control to mitigate risks Offers an overview of budgeting-determining, advocating for, and implementing the security program based on allotted funding Details how to document policies into a security manual, training manual, emergency procedures manual, and incident action plan Provides the ins and outs of staffing including scheduling, wages, deployment, and contract security Examines training best practices including physical security, emergency response and procedures, as well as specialized topics such as use of force and patrol procedures Explains prostitution and human trafficking, presenting sections with a focus on awareness and prevention

Cultural Property Security - Protecting Museums, Historic Sites, Archives, and Libraries (Hardcover): Daniel J Benny Cultural Property Security - Protecting Museums, Historic Sites, Archives, and Libraries (Hardcover)
Daniel J Benny
R4,498 Discovery Miles 44 980 Ships in 10 - 15 working days

The protection and security of cultural properties is of primary concern to the thousands of federal, state, county, city, and private institutions entrusted with housing and displaying our national heritage and history of our society. Cultural property security is of global importance as well, with tens of thousands of institutions internationally tasked with protecting and maintaining relics and artifacts of social, cultural, and historical significance. Cultural Property Security offers powerful protection guidelines to security departments tasked with safeguarding popular historical sites, museums, and libraries and the historical artifacts they house. Presenting practical, ready-to-implement solutions in a clear writing style, the book: Provides a working definition of cultural properties Identifies the threats against cultural properties from crime and terrorism, particularly in regions with political or civil unrest Offers guidance in threat assessment Identifies the physical security measures and technology that can be used to protect such institutions Presents guidelines for establishing a protective service department for cultural properties Describes proper arrest and post-arrest protocols Includes a list of online resources for further information related to the protection of cultural properties Complete with dozens of photos, the book establishes leading industry best practices to identify the various threats to cultural properties and protect them. Dr. Daniel J. Benny has more than 35 years of security management experience and has served as a Director of Protective Services for the state of Pennsylvania's Historic and Museum Commission. His insight is invaluable to those responsible for securing these institutions from internal and external threats.

Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Paperback):... Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Paperback)
Bruce Turner
R1,218 Discovery Miles 12 180 Ships in 10 - 15 working days

Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the 'mailroom to the boardroom' follows the story of a young banker who moved into the internal auditing profession as part of the 'new breed', then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.

Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Hardcover): Douglas J Landoll Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Hardcover)
Douglas J Landoll
R4,070 Discovery Miles 40 700 Ships in 10 - 15 working days

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.

Boko Haram - Security Considerations and the Rise of an Insurgency (Hardcover): Ona Ekhomu Boko Haram - Security Considerations and the Rise of an Insurgency (Hardcover)
Ona Ekhomu
R3,796 Discovery Miles 37 960 Ships in 10 - 15 working days

Boko Haram analyzes the activities and atrocities of Nigeria's Jihadi terrorist group, Boko Haram, in the context of global religious fundamentalism and extremism. The book traces the early beginnings of the religious sect, the conversion of its leader to radical Islam in 2002, and the group's campaign of violence beginning in 2009 and continuing to the present. The group's attacks against a variety of targets are examined in detail as are their general tactics and strategies. The Nigerian government response is also examined in order to provide critical lessons to counterterrorism planners, policy and government officials, and scholars. The initial military response was hampered by capability and legislative constraints including a lack of arms and ammunition, a lack of modern counterterrorism equipment, training gaps, leadership issues, intelligence gaps, politicization of the conflict, and limited support to the Nigerian military by the international community. Boko Haram looks at the work that has been done thus far, and what work needs to continue, to make gains to combat, marginalize, and ultimately defeat Boko Haram and resolve the conflict facing Nigeria. Key features: Outlines the history of Boko Haram and its emergence in Nigeria Provides the latest developments on fundamentalism in Nigeria, the growth of Boko Haram and the government response Focuses on the attacks, attack methodology and targeting of Boko Haram, addressing best-practice countermeasures Examines Boko Haram's ties to other Islamist groups including ISIL/ISIS and others Details the importance for international cooperation in responding to Boko Haram's activities and threats. About the Author: Dr. Ona Ekhomu, CFE, CPP, CSP, PCI, CPOI was born in Irrua, Nigeria. He holds the PhD from University of Pittsburgh. A policy analyst and security expert, Ekhomu is Chairman Trans-World Security Systems Ltd. and Chairman School of Management and Security (Lagos, Nigeria). President of Trans-World Security Systems Inc. of Chicago, Illinois, USA, Ekhomu is also a lecturer in the Sociology Department of the University of Lagos, Nigeria. He is President of the Association of Industrial Security and Safety Operators of Nigeria; Africa Representative of the International Foundation for Protection Officers; and former Regional Vice-President (West and Central Africa) of ASIS International. Ekhomu is author of Kidnap: Face to Face with Death (2014) and Effective Personal & Corporate Security (2009).

Strategic Security Management - A Risk Assessment Guide for Decision Makers, Second Edition (Paperback, 2nd edition): Karim... Strategic Security Management - A Risk Assessment Guide for Decision Makers, Second Edition (Paperback, 2nd edition)
Karim Vellani
R1,882 Discovery Miles 18 820 Ships in 10 - 15 working days

Strategic Security Management, Second Edition provides security leadership and decision-makers with a fresh perspective on threat, vulnerability, and risk assessment. The book offers a framework to look at applying security analysis and theory into practice for effective security program, implementation, management and evaluation. Chapters examine metric-based security resource allocation of countermeasures, including security procedures, utilization of personnel, and electronic measures. The new edition is fully updated to reflect the latest industry best-practices and includes contributions from security industry leaders-based on their years of professional experience-including Norman Bates, Robert Emery, Jack Follis, Steve Kaufer, Andrew Rubin, Michael Silva, and Ken Wheatley. Strategic Security Management, Second Edition will be a welcome addition to the security literature for all security professionals, security managers, and criminal justice students interested in understanding foundational security principles and their application.

Preventing and Managing Violence in Organizations - Workplace Violence, Targeted Violence, and Active Shooters (Paperback):... Preventing and Managing Violence in Organizations - Workplace Violence, Targeted Violence, and Active Shooters (Paperback)
Marc H. Siegel
R1,969 Discovery Miles 19 690 Ships in 10 - 15 working days

Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue. As such, the book's objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach. The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager. While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization's system of management and all its activities and functions. The "Introduction" section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization's overall business management strategy. The "Framework" section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The "Tactics and Control Measures" section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events. For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach. Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization's day-to-day activities-as an integral part of these activities-rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.

The Complete Guide for CPP Examination Preparation (Hardcover, 2nd edition): Anthony V. DiSalvatore (CPP, PSP & PCI) The Complete Guide for CPP Examination Preparation (Hardcover, 2nd edition)
Anthony V. DiSalvatore (CPP, PSP & PCI)
R4,106 Discovery Miles 41 060 Ships in 10 - 15 working days

Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.

Professional Security Management - A Strategic Guide (Hardcover, 3rd Edition): Charles Swanson Professional Security Management - A Strategic Guide (Hardcover, 3rd Edition)
Charles Swanson
R1,700 Discovery Miles 17 000 Ships in 10 - 15 working days

Historically, security managers have tended to be sourced from either the armed forces or law enforcement. But the increasing complexity of the organisations employing them, along with the technologies employed by them, is forcing an evolution and expansion of the role, and security managers must meet this challenge in order to succeed in their field and protect the assets of their employers. Risk management, crisis management, continuity management, strategic business operations, data security, IT, and business communications all fall under the purview of the security manager.

This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses. It covers the basics of strategy, risk, and technology from the perspective of the security manager, focussing only on the 'need to know'. The reader will benefit from an understanding of how risk management aligns its functional aims with the strategic goals and operations of the organisation.

This essential book supports professional vocational accreditation and qualifications, such as the Chartered Security Professional (CSyP) or Certified Protection Professional (CPP), and advises on pathways to higher education qualifications in the fields of security and risk management. It is ideal for any risk manager looking to further their training and development, as well as being complementary for risk and security management programs with a focus on practice.

Table of Contents

1 Private security and the development of the Security Manager

2 Security risk management and strategic business awareness

3 Critical Security Areas

3.1 Security Risk Management

3.2 Crime Prevention through Environmental Design and Situational Crime Prevention

3.3 Physical and Electronic Security Systems

3.4 The Security Survey and Security Audit

3.5 Business Resilience

Risk Management

Crisis Management

Disaster Management

Business Continuity Management

3.6 The Chief Security Officer (CSO) and the Chief Information Security Officer(CISO)

3.7 Cyber Crime

3.8 Critical National Infrastructure

3.9 Terrorism and Counter Terrorism

3.10 Aviation and Maritime Security Management

3.11 Supply Chain Security Management

3.12 Hostile Environment Awareness

3.13 Strategic Business Awareness

3.14 Fraud Investigations

3.15 Retail Loss Prevention

3.16 Workplace Investigations

3.17 Academic and vocational qualifications

3.18 Conclusion

Bibliography

Index

Security Management - A Critical Thinking Approach (Paperback): Michael Land, Truett Ricks, Bobby Ricks Security Management - A Critical Thinking Approach (Paperback)
Michael Land, Truett Ricks, Bobby Ricks
R2,084 Discovery Miles 20 840 Ships in 10 - 15 working days

Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.

Fighting to the End - The Pakistan Army's Way of War (Paperback): C.Christine Fair Fighting to the End - The Pakistan Army's Way of War (Paperback)
C.Christine Fair
R1,247 Discovery Miles 12 470 Ships in 10 - 15 working days

Since Pakistan was founded in 1947, its army has dominated the state. The military establishment has locked the country in an enduring rivalry with India, with the primary aim of wresting Kashmir from it. To that end, Pakistan initiated three wars over Kashmir-in 1947, 1965, and 1999-and failed to win any of them. Today, the army continues to prosecute this dangerous policy by employing non-state actors under the security of its ever-expanding nuclear umbrella. It has sustained a proxy war in Kashmir since 1989 using Islamist militants, as well as supporting non-Islamist insurgencies throughout India and a country-wide Islamist terror campaign that have brought the two countries to the brink of war on several occasions. In addition to these territorial revisionist goals, the Pakistani army has committed itself to resisting India's slow but inevitable rise on the global stage. Despite Pakistan's efforts to coerce India, it has achieved only modest successes at best. Even though India vivisected Pakistan in 1971, Pakistan continues to see itself as India's equal and demands the world do the same. The dangerous methods that the army uses to enforce this self-perception have brought international opprobrium upon Pakistan and its army. And in recent years, their erstwhile proxies have turned their guns on the Pakistani state itself. Why does the army persist in pursuing these revisionist policies that have come to imperil the very viability of the state itself, from which the army feeds? In Fighting to the End, C. Christine Fair argues that the answer lies, at least partially, in the strategic culture of the army. Through an unprecedented analysis of decades' worth of the army's own defense publications, she concludes that from the army's distorted view of history, it is victorious as long as it can resist India's purported drive for regional hegemony as well as the territorial status quo. Simply put, acquiescence means defeat. Fighting to the End convincingly shows that because the army is unlikely to abandon these preferences, Pakistan will remain a destabilizing force in world politics for the foreseeable future.

CISO COMPASS - Navigating Cybersecurity Leadership Challenges with Insights from Pioneers (Hardcover): Todd Fitzgerald CISO COMPASS - Navigating Cybersecurity Leadership Challenges with Insights from Pioneers (Hardcover)
Todd Fitzgerald
R3,960 Discovery Miles 39 600 Ships in 10 - 15 working days

#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021! 2020 Cybersecurity CANON Hall of Fame Winner! Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Security Supervision and Management…
Ifpo Paperback R1,521 Discovery Miles 15 210
The Enforcers - Inside Cape Town's…
Caryn Dolley Paperback  (1)
R295 R264 Discovery Miles 2 640
Public Safety and Security…
P J. Ortmeier Paperback R1,435 Discovery Miles 14 350
Fighting Fraud - How to Establish and…
Gerald L. Kovacich Paperback R1,130 Discovery Miles 11 300
Model Security Policies, Plans and…
John Fay Paperback R1,675 Discovery Miles 16 750
Journalism and the Nsa Revelations…
Adrienne Russell, Risto Kunelius, … Hardcover R3,655 Discovery Miles 36 550
Bounty Hunters, Marshals, and Sheriffs…
Jacqueline Pope Hardcover R2,049 Discovery Miles 20 490
Private Security Law - Case Studies
David Maxwell Hardcover R1,367 Discovery Miles 13 670
Challenges to US and Mexican Police and…
Peter E. Tarlow Hardcover R2,924 Discovery Miles 29 240
European Security Law
Martin Trybus, Nigel White Hardcover R2,565 Discovery Miles 25 650

 

Partners