0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (8)
  • R500+ (291)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General

The Privatization of Police in America - An Analysis and Case Study (Paperback): James F. Pastor The Privatization of Police in America - An Analysis and Case Study (Paperback)
James F. Pastor
R914 R680 Discovery Miles 6 800 Save R234 (26%) Ships in 10 - 15 working days

Today the private security industry employs approximately 1.5 million people and spends over USD52 billion annually. In contrast, public police forces employ approximately 600,000 people and spend USD30 billion annually. Private policing promises to be a big part of the response to today's increased security concerns, as citizens realize that security is much more than the presence of guards and the perception of safety. This book addresses the impact and implications of private policing on public streets, and begins with a look at private policing from conceptual, historical, economic, legal and functional perspectives. These approaches provide the background for the text, which focuses on a private policing patrol program in a community on the south side of Chicago. The text also demonstrates a number of substantive legal and public policy issues which directly or indirectly relate to the provision of security services; some people see the need for a ""dual system"" of policing - one for the wealthy and one for the poor - and others see the provision of private security as the primary protective resource in contemporary America. The author also examines how private policing is different from and similar to public policing.

The Handbook of Security (Hardcover): Martin Gill The Handbook of Security (Hardcover)
Martin Gill
R4,362 Discovery Miles 43 620 Ships in 10 - 15 working days

"The Handbook of Security "is essential reading for all those engaged with the security world. This in-depth book collates the best research available for the security academic and professional. The book is divided into five parts. It begins with the study of security as a discipline, assessing the contribution made by different subject areas to the study of security. The second part looks as crime in organizations. The third part analyzes the various sub-sectors of security. A section on management issues precedes the final section looking at a mage of issues that impact on security.

Counterespionage for American Business (Paperback): Peter Pitorri Counterespionage for American Business (Paperback)
Peter Pitorri
R1,366 Discovery Miles 13 660 Ships in 10 - 15 working days

The idea of espionage has always carried a certain mystique, having grown its roots in the political and national defense spheres. Today, espionage must be taken seriously in the business arena as well. Having company secrets stolen by competitors is costly and can be lethal. Counterespionage for American Business is a how-to manual for security professionals that teaches secret methods counterespionage experts have been using for years to protect business information
Secret techniques you will learn include:
. screening employee applicants; how to use standard screening methods to defend against industrial espionage and violent persons
. how to design security education programs by teaching protection of critical business information
. how to avoid liability
Counterespionage for American Business also names the foreign countries that are conducting espionage against American business.

Learn how to protect your proprietary business information and reduce liability riskGuidlines on how small businesses can save thousands of dollars"

The Security Handbook (Paperback, 2nd edition): Philip Purpura The Security Handbook (Paperback, 2nd edition)
Philip Purpura
R1,631 Discovery Miles 16 310 Ships in 10 - 15 working days

The Security Handbook, Second Edition is a user-friendly guide for security officers and guards, covering everything from introductory information to advanced topics. Whether looking for entry into the profession or development within the security industry, this book offers the practical information, training, and need-to-know techniques for the realization of professional goals.
The Second Edition emphasizes the proper skills required to improve job performance -- customer service, security methods, patrolling, communicating, and report writing. Chapters cover such important topics as arrest law and procedure (including legal liability), self-defense and weapons, a new section on career planning, violence in the workplace, internal theft, burglary, robbery, terrorism, cybercrime, and first response during emergencies. Countermeasures to a variety of threats are explained throughout the book.
Experienced security officers, supervisors, and managers will also find the book useful in outlining the changing roles and responsibilities of the protection officer and for helping train their front line staff.
* Covers every important aspect of the security officer's job, with several new updates and access to online sources
* Defines key terms and outlines basic information before moving on to more advanced topics
* Each chapter includes an outline, chapter objectives, and follows with review questions to aid in the learning process
* Features numerous examples, illustrations, Web sites, case studies, and new "What if?" scenarios to relate theory to practice
* Serves as a comprehensive study guide for state mandated training and certification exams such as the Certified Protection Officer (CPO) program sponsored by the IFPO

Security Intelligence Services in New Democracies - The Czech Republic, Slovakia and Romania (Hardcover, New title): K.... Security Intelligence Services in New Democracies - The Czech Republic, Slovakia and Romania (Hardcover, New title)
K. Williams, D. Deletant
R1,418 Discovery Miles 14 180 Ships in 18 - 22 working days

The first account of the secret police in Eastern Europe after 1989, this book uses a wide range of sources, including archives, to identify what has and has not changed since the end of Communism. After explaining the structure and workings of two of the area's most feared services, Czechoslovakia's StB and Romania's Securitate, the authors detail the creation of new security intelligence institutions, the development of contacts with the West, and forms of democratic control.

Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback): Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback)
Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee
R1,064 Discovery Miles 10 640 Ships in 9 - 17 working days

* Offers context while providing a coherent, applied overview of a wide range of suspect vulnerabilities and how to address them when interviewing * Serves as a practical guide to interviewing vulnerable suspects for both uniform police and detectives. * The only book on interviewing vulnerable suspects that includes the most up-to-date legal considerations and challenges of modern society

Geospatial Technologies and Homeland Security - Research Frontiers and Future Challenges (Hardcover, 2008 ed.): Daniel Sui Geospatial Technologies and Homeland Security - Research Frontiers and Future Challenges (Hardcover, 2008 ed.)
Daniel Sui
R4,219 Discovery Miles 42 190 Ships in 18 - 22 working days

Homeland security and context In the Geographical Dimensions of Terrorism (GDOT) (Cutter et al. 2003), the first book after 9/11 to address homeland security and geography, we developed several thematic research agendas and explored intersections between geographic research and the importance of context, both geographical and political, in relationship to the concepts of terrorism and security. It is good to see that a great deal of new thought and research continues to flow from that initial research agenda, as illustrated by many of the papers of this new book, entitled Geospatial Technologies and Homeland Security: Research Frontiers and Future Challenges. Context is relevant not only to understanding homeland security issues broadly, but also to the conduct of research on geospatial technologies. It is impossible to understand the implications of a homeland security strategy, let alone hope to make predictions, conduct meaningful modeling and research, or assess the value and dangers of geospatial technologies, without consideration of overarching political, social, economic, and geographic contexts within which these questions are posed.

Premises Security - A Guide for Security Professionals and Attorneys (Paperback): William Blake, Walter F. Bradley Premises Security - A Guide for Security Professionals and Attorneys (Paperback)
William Blake, Walter F. Bradley
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

Premises Security: A Guide for Attorneys and Security Professionals guides the security professional through the ins and outs of premises security liability. Premises security litigation claims represent a serious financial threat to owners and occupiers of property. This book provides an overview of risk assessment techniques, identification of reasonable security measures, legal issues and litigation strategies.
Premises security litigation is increasing at a dramatic rate and has a significant negative impact on corporate profits. Realizing the increasing costs of litigation, business owners and other interested parties are initiating proactive measures to provide adequate security. Attorneys can use this book as a security resource for providing legal advice to their clients and during the litigation process. Security professionals will be better able to propose and implement reasonable and appropriate security measures. The format of providing information in response to specific questions carries the reader through a logical and sequential method for understanding the legal concepts of premises liability, the identification of reasonable and appropriate protection measures, and how to acquire premises security information.
This is a practical, concise and informative guide. This book can be used in a proactive prevention mode as well as a reactive response to litigation claims. It explains what security professionals should be thinking about and planning for when it comes to protecting people on their premises. It also provides a common base of knowledge for attorneys and security professionals that does not exist in any other publication.

Designed to meet the needs of both attorneys and security professionals
Covers both liability and security issues
Appendices provide detailed premises security information to facilitate a proactive approach to providing reasonable and appropriate security measures and reacting to litigation

Bounty Hunters, Marshals, and Sheriffs - Forward to the Past (Hardcover, New): Jacqueline Pope Bounty Hunters, Marshals, and Sheriffs - Forward to the Past (Hardcover, New)
Jacqueline Pope
R2,218 R2,049 Discovery Miles 20 490 Save R169 (8%) Ships in 10 - 15 working days

Sheriffs, marshals, and bounty hunters are remembered as relics of our Wild West past. Pope looks at these agents of the law who operate outside police departments, particularly their roles in urban areas. She examines reasons for becoming a sheriff, marshal (usually appointed and not elected), or bounty hunter, as well as employment requirements, responsibilities, and relationships with local police and city officials. Pope argues ultimately that these law enforcers, to a much greater degree than the police, threaten low-income people. Urban sheriffs do not make arrests, but rather serve summonses, track down scofflaws, and confiscate property. Marshals carry out evictions. Bounty hunters are usually armed and work often in urban areas, hunting down wanted persons for a variety of crimes. Although they are not policemen, they are authorized to capture people and can do so without the restrictions imposed on traditional law enforcement officers. Pope focuses her attention on sheriffs, marshals, and bounty hunters in Arizona, New Jersey, New Mexico and New York. She examines their activities in the nineteenth century and today, providing interviews with sheriffs, marshals, bounty hunters, policemen, and with people who have been pursued by them. A work of interest to students, researchers, and citizens concerned with the workings of the U.S. criminal justice system.

Introduction to Terrorism (Hardcover): David H. McElreath, Carl J. Jensen, Michael Wigginton, Chester L. Quarles, Stephen... Introduction to Terrorism (Hardcover)
David H. McElreath, Carl J. Jensen, Michael Wigginton, Chester L. Quarles, Stephen Mallory
R2,293 Discovery Miles 22 930 Ships in 10 - 15 working days

It can take the form of a Molotov Cocktail or a Suicide Bomber detonating within a crowd. It can be a sophisticated electronic explosive device or a bomb in a shoe. Today's terrorism threats, and their constant assault on global security continues to be a menace of great concern.

Providing a hands-on look inside the ugly, blood-stained world of global terrorism, Introduction to Terrorism covers the evolution of terrorism, its growing sophistication, and its cynical indifference to human life. It begins by covering the history of terrorism and showing how the threats have changed since the September 11, 2001 attacks. It examines the methods America has chosen to guard against and deal with these threats using its military, government, and civilian agencies.

Illustrating and examining current and future challenges, this state-of-the-art text follows a flow model developed and successfully taught in the classroom at several colleges and universities. Designed to follow the standard academic semester (one chapter per week), the book's content, style, presentation, and organization have been class-tested and validated.

Computational Intelligence for Cybersecurity Management and Applications (Hardcover): Yassine Maleh, Mamoun Alazab, Soufyane... Computational Intelligence for Cybersecurity Management and Applications (Hardcover)
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
R3,430 Discovery Miles 34 300 Ships in 9 - 17 working days

1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.

Cognitive Risk (Paperback): James Bone, Jessie H Lee Cognitive Risk (Paperback)
James Bone, Jessie H Lee
R1,110 Discovery Miles 11 100 Ships in 9 - 17 working days

Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback)
Alan Tang
R1,389 Discovery Miles 13 890 Ships in 9 - 17 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Nonproliferation Issues For Weapons of Mass Destruction (Hardcover): Mark A. Prelas, Michael Peck Nonproliferation Issues For Weapons of Mass Destruction (Hardcover)
Mark A. Prelas, Michael Peck
R5,623 Discovery Miles 56 230 Ships in 10 - 15 working days

Nonproliferation Issues for Weapons of Mass Destruction provides an understanding of WMD proliferation risks by bridging complex technical and political issues. The text begins by defining the world conditions that foster proliferation, followed by an analysis of characteristics of various classes of WMDs, including nuclear, biological, and chemical weapons. It then explores the effectiveness of arms control, discussing current nonproliferation problems, nonproliferation prior to the fall of the USSR, and weapons safeguards.
The book analyzes the future of these weapons, discussing delivery systems and potential use by states, terrorist groups, and individuals. The text concludes with a discussion of what can be done to limit the impact of WMDs. This volume enables a realistic understanding of the relative risks that WMDs present to our way of life.

Managing A Network Vulnerability Assessment (Paperback, illustrated edition): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Paperback, illustrated edition)
Thomas R. Peltier, Justin Peltier, John A Blackley
R2,607 Discovery Miles 26 070 Ships in 10 - 15 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.

Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

PKI Implementation and Infrastructures (Paperback): Julian Ashbourn PKI Implementation and Infrastructures (Paperback)
Julian Ashbourn
R1,154 Discovery Miles 11 540 Ships in 9 - 17 working days

1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.

Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Hardcover): Kevin E. Foltz,... Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Hardcover)
Kevin E. Foltz, William R. Simpson, Institute for Defense Analyses
R2,422 Discovery Miles 24 220 Ships in 9 - 17 working days

Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.

Transforming Security - A New Balance-of-Power Doctrine (Hardcover, 1st ed. 2022): Ursula Werther-Pietsch Transforming Security - A New Balance-of-Power Doctrine (Hardcover, 1st ed. 2022)
Ursula Werther-Pietsch
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

This book analyses the collective security system as it now stands, focusing on strategic and normative frameworks. The old system of international collective security is based on assumptions that are inadequate in relation to current challenges. Against the backdrop of changed geopolitical constellations, democracies under siege and the challenges posed by new types of warfare, critical analysts hold that not a single multilateral institution today is fully up to the task it was created for. The UN, from its founding to the Sustained Peace Approach, represents a fascinating global process of vision-building and adaptation to reality. Based on this understanding, the dynamics of the UN peace and security architecture are examined along with major agendas, from peacebuilding to development. In turn, reform proposals in the post-COVID-19 era are discussed. The book examines whether a regionalization of security structures within the UN framework may offer a way out of global fragility and growing instability factors, a question of utmost importance for conflict prevention and crisis management in the next few decades. In turn, the author discusses a normative positioning of a new intervention logic as the lowest common denominator between collaborative regional orders. Reinvented multilateralism will return as a "must." Given its scope, the book will appeal to students and scholars of international relations and international security studies, as well as to policymakers in governments and international organizations.

Supply Chain Security - How to Support Safety and Reduce Risk In Your Supply Chain Process (Paperback): Andrzej Szymonik,... Supply Chain Security - How to Support Safety and Reduce Risk In Your Supply Chain Process (Paperback)
Andrzej Szymonik, Robert Stanislawski
R1,481 Discovery Miles 14 810 Ships in 9 - 17 working days

Contemporary supply chains operate under the pressure of customer requirements, increasing price competition, sudden increases or decreases in demand, unforeseen obstacles and new threats. The right way to improve the functioning of the flow of material and accompanying information is not only the continuous collection of data but also their collection, analysis, inference and decision-making with the use of decision support systems, expert systems and artificial intelligence. Such procedures make it easier for logisticians not only to forecast processes but also to predict (forecast) and identify potential problems and facilitate the implementation of optimal modern solutions, paying attention to current trends in the supply chain market. An important issue that affects the quality, efficiency and availability (continuity) of the processes implemented within the supply chain is security. This is an area that is not clearly defined. This book uses theoretical and practical knowledge to define security in the supply chain as a state that gives a sense of certainty and guarantees the flow of material goods and services (in accordance with the 7w rule) as well as a smooth flow of information for the planning and management of logistics processes. Tools and instruments used to ensure the security of the supply chain contribute to the protection and survival in times of dangerous situations (threats) and adaptation to new conditions (susceptibility to unplanned situations). When analyzing the needs and structure of the 21st century supply chains, in the context of their security, it is impossible to ignore the problem of their digitization, which enables the determination of optimal routes and the anticipation of possible threats (crisis situations). Automatic data exchange between various departments of the company along the upper and lower part of the supply chain improves the functioning of the warehouse management through, among others, automation, robotization and pro-activity. It also contributes to efficient, good communication and market globalization. Automation also brings new, extremely attractive business models with regard to occupational safety, ergonomics and environmental protection. To meet the needs of creating modern supply chains, the book analyzes and presents current and future solutions that affect security and the continuity of supply chains.

Global Intelligence Oversight - Governing Security in the Twenty-First Century (Hardcover): Zachary K. Goldman, Samuel J.... Global Intelligence Oversight - Governing Security in the Twenty-First Century (Hardcover)
Zachary K. Goldman, Samuel J. Rascoff; Jane Harman
R2,309 Discovery Miles 23 090 Ships in 10 - 15 working days

In a world that is increasingly unstable, intelligence services like the American CIA and the United Kingdom's MI6 exist to deliver security. Whether the challenge involves terrorism, cyber-security, or the renewed specter of great power conflict, intelligence agencies mitigate threats and provide decisional advantage to national leaders. But empowered intelligence services require adequate supervision and oversight, which must be about more than the narrow (if still precarious) task of ensuring the legality of covert operations and surveillance activities. Global Intelligence Oversight is a comparative investigation of how democratic countries can govern their intelligence services so that they are effective, but operate within frameworks that are acceptable to their people in an interconnected world. The book demonstrates how the institutions that oversee intelligence agencies participate in the protection of national security while safeguarding civil liberties, balancing among competing national interests, and building public trust in inherently secret activities. It does so by analyzing the role of courts and independent oversight bodies as they operate in countries with robust constitutional frameworks and powerful intelligence services. The book also illuminates a new transnational oversight dynamic that is shaping and constraining security services in new ways. It describes how global technology companies and litigation in transnational forums constitute a new form of oversight whose contours are still undefined. As rapid changes in technology bring the world closer together, these forces will complement their more traditional counterparts in ensuring that intelligence activities remain effective, legitimate, and sustainable.

The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition): Anthony V. DiSalvatore (CPP, PSP & PCI) The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition)
Anthony V. DiSalvatore (CPP, PSP & PCI)
R1,160 Discovery Miles 11 600 Ships in 9 - 17 working days

Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.

The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover): Jeffrey W.... The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover)
Jeffrey W. Brown
R2,054 Discovery Miles 20 540 Ships in 9 - 17 working days

This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a "communication theory" book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

OR, Defence and Security (Hardcover): R. Forder OR, Defence and Security (Hardcover)
R. Forder
R3,342 Discovery Miles 33 420 Ships in 10 - 15 working days

OR, Defence and Security presents eleven papers, originally published in the Journal of the Operational Research Society and the Journal of Simulation, which exemplify important themes and topics in Operational Research (OR), as applied to modern-day defense and security issues. Topics range from frontline OR in a peace-support operation to new developments in combat modelling, and from the logistics of overseas intervention to defence planning at the top level. Also included are examples of applications addressing insurgency and terrorism. Edited by Dr Roger A. Forder, who had a distinguished career in OR in the UK Ministry of Defence, he has also written an authoritative introductory chapter which sets the papers in the context of the global strategic environment as it has evolved since the end of the Cold War. The OR Essentials series presents a unique cross-section of high quality research work fundamental to understanding contemporary issues and research in across a range of Operational Research (OR) topics. It brings together some of the best research papers from the esteemed Operational Research Society and its associated journals, also published by Palgrave Macmillan.

Air Piracy, Airport Security, and International Terrorism - Winning the War Against Hijackers (Hardcover): Oliver P. St John Air Piracy, Airport Security, and International Terrorism - Winning the War Against Hijackers (Hardcover)
Oliver P. St John
R2,541 Discovery Miles 25 410 Ships in 10 - 15 working days

As international terrorism has grown over the past decades, airlines and airports have become increasingly popular targets for violent attacks and hijackings. In this volume, Peter St. John provides a survey of international air piracy and airline terrorism, and of the ways airline professionals and governments are coping, or attempting to cope, with the crisis. St. John not only deals with the history, politics, psychology, and sociology of air piracy, but also provides an assessment of the threat to commercial aircraft and ways to counter the danger. The principal theme he develops is that security for airports and aircraft can be achieved, and the fear of terrorists overcome, if Western countries cooperate in installing effective security policies and plans. St. John begins his work with a two-chapter history of the evolution of hijacking, tracing the five-to-seven-year cycles that seem to have emerged and the growth of the politically motivated hijacking that has become the most persistent and dangerous form. He next analyzes the eight types of individuals who have hijacked aircraft in the past, their different motives, and how they can be identified by airport security and flight crews. A major chapter discusses the politics of Western governments toward highjacking in Europe and North America, and identifies the best and worst airports around the globe. A seven-stage system of security that will probably be a necessity for the 1990s is also proposed. Ensuing chapters address the problem of the hijacked plane, offering advice for passengers and crew members who are victims of hijacking, and for government behavior, which often does more to encourage air terrorism than to preventit. Finally, St. John looks to the future of airport security and describes the need for a concentrated attempt at all levels of national and international government to develop effective defenses against air piracy. A group of appendices is also included, documenting the principal hijacks of the past forty years as well as sabotage attempts on commercial aircraft. This work will be an important reference tool for professionals in security services and the airline and airport management field, and for students in political science and international relations courses. It will also be a valuable addition to college, university, and public libraries.

Terror, Security, and Money - Balancing the Risks, Benefits, and Costs of Homeland Security (Hardcover, New): John Mueller,... Terror, Security, and Money - Balancing the Risks, Benefits, and Costs of Homeland Security (Hardcover, New)
John Mueller, Mark Stewart
R3,296 Discovery Miles 32 960 Ships in 10 - 15 working days

In seeking to evaluate the efficacy of post-9/11 homeland security expenses--which have risen by more than a trillion dollars, not including war costs--the common query has been, "Are we safer?" This, however, is the wrong question. Of course we are "safer"--the posting of a single security guard at one building's entrance enhances safety. The correct question is, "Are any gains in security worth the funds expended?"
In this engaging, readable book, John Mueller and Mark Stewart apply risk and cost-benefit evaluation techniques to answer this very question. This analytical approach has been used throughout the world for decades by regulators, academics, and businesses--but, as a recent National Academy of Science study suggests, it has never been capably applied by the people administering homeland security funds. Given the limited risk terrorism presents, expenses meant to lower it have for the most part simply not been worth it. For example, to be considered cost-effective, increased American homeland security expenditures would have had each year to have foiled up to 1,667 attacks roughly like the one intended on Times Square in 2010--more than four a day. Cataloging the mistakes that the US has made--and continues to make--in managing homeland security programs, Terror, Security, andMoney has the potential to redirect our efforts toward a more productive and far more cost-effective course.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computer Programming Languages for…
Adesh Silva Hardcover R649 Discovery Miles 6 490
Django for Professionals - Production…
William S. Vincent Paperback R915 Discovery Miles 9 150
Lean Enterprise - The Essential…
Greg Caldwell Hardcover R606 R545 Discovery Miles 5 450
Level 1/Level 2 Cambridge National in…
Kevin Wells, Sarah McAtominey, … Paperback R1,086 Discovery Miles 10 860
A.I. - How Patterns Helped Artificial…
Peter Willis Hardcover R580 R529 Discovery Miles 5 290
Cbse All in One Information Technology…
Neetu Gaikwad Paperback R1,675 Discovery Miles 16 750
Decoding Technology Acceptance in…
Caroline Stockman Paperback R1,468 Discovery Miles 14 680
Law@Work
A. Van Niekerk, N. Smit Paperback R1,367 R1,195 Discovery Miles 11 950
Mars Geological Enigmas - From the Late…
Richard Soare, Susan Conway, … Paperback R3,065 Discovery Miles 30 650
Bridging UX and Web Development - Better…
Jack Moffett Paperback R853 Discovery Miles 8 530

 

Partners