![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
Today the private security industry employs approximately 1.5 million people and spends over USD52 billion annually. In contrast, public police forces employ approximately 600,000 people and spend USD30 billion annually. Private policing promises to be a big part of the response to today's increased security concerns, as citizens realize that security is much more than the presence of guards and the perception of safety. This book addresses the impact and implications of private policing on public streets, and begins with a look at private policing from conceptual, historical, economic, legal and functional perspectives. These approaches provide the background for the text, which focuses on a private policing patrol program in a community on the south side of Chicago. The text also demonstrates a number of substantive legal and public policy issues which directly or indirectly relate to the provision of security services; some people see the need for a ""dual system"" of policing - one for the wealthy and one for the poor - and others see the provision of private security as the primary protective resource in contemporary America. The author also examines how private policing is different from and similar to public policing.
"The Handbook of Security "is essential reading for all those
engaged with the security world. This in-depth book collates the
best research available for the security academic and professional.
The book is divided into five parts. It begins with the study of
security as a discipline, assessing the contribution made by
different subject areas to the study of security. The second part
looks as crime in organizations. The third part analyzes the
various sub-sectors of security. A section on management issues
precedes the final section looking at a mage of issues that impact
on security.
The idea of espionage has always carried a certain mystique, having
grown its roots in the political and national defense spheres.
Today, espionage must be taken seriously in the business arena as
well. Having company secrets stolen by competitors is costly and
can be lethal. Counterespionage for American Business is a how-to
manual for security professionals that teaches secret methods
counterespionage experts have been using for years to protect
business information
The Security Handbook, Second Edition is a user-friendly guide for
security officers and guards, covering everything from introductory
information to advanced topics. Whether looking for entry into the
profession or development within the security industry, this book
offers the practical information, training, and need-to-know
techniques for the realization of professional goals.
The first account of the secret police in Eastern Europe after 1989, this book uses a wide range of sources, including archives, to identify what has and has not changed since the end of Communism. After explaining the structure and workings of two of the area's most feared services, Czechoslovakia's StB and Romania's Securitate, the authors detail the creation of new security intelligence institutions, the development of contacts with the West, and forms of democratic control.
* Offers context while providing a coherent, applied overview of a wide range of suspect vulnerabilities and how to address them when interviewing * Serves as a practical guide to interviewing vulnerable suspects for both uniform police and detectives. * The only book on interviewing vulnerable suspects that includes the most up-to-date legal considerations and challenges of modern society
Homeland security and context In the Geographical Dimensions of Terrorism (GDOT) (Cutter et al. 2003), the first book after 9/11 to address homeland security and geography, we developed several thematic research agendas and explored intersections between geographic research and the importance of context, both geographical and political, in relationship to the concepts of terrorism and security. It is good to see that a great deal of new thought and research continues to flow from that initial research agenda, as illustrated by many of the papers of this new book, entitled Geospatial Technologies and Homeland Security: Research Frontiers and Future Challenges. Context is relevant not only to understanding homeland security issues broadly, but also to the conduct of research on geospatial technologies. It is impossible to understand the implications of a homeland security strategy, let alone hope to make predictions, conduct meaningful modeling and research, or assess the value and dangers of geospatial technologies, without consideration of overarching political, social, economic, and geographic contexts within which these questions are posed.
Premises Security: A Guide for Attorneys and Security Professionals
guides the security professional through the ins and outs of
premises security liability. Premises security litigation claims
represent a serious financial threat to owners and occupiers of
property. This book provides an overview of risk assessment
techniques, identification of reasonable security measures, legal
issues and litigation strategies.
Sheriffs, marshals, and bounty hunters are remembered as relics of our Wild West past. Pope looks at these agents of the law who operate outside police departments, particularly their roles in urban areas. She examines reasons for becoming a sheriff, marshal (usually appointed and not elected), or bounty hunter, as well as employment requirements, responsibilities, and relationships with local police and city officials. Pope argues ultimately that these law enforcers, to a much greater degree than the police, threaten low-income people. Urban sheriffs do not make arrests, but rather serve summonses, track down scofflaws, and confiscate property. Marshals carry out evictions. Bounty hunters are usually armed and work often in urban areas, hunting down wanted persons for a variety of crimes. Although they are not policemen, they are authorized to capture people and can do so without the restrictions imposed on traditional law enforcement officers. Pope focuses her attention on sheriffs, marshals, and bounty hunters in Arizona, New Jersey, New Mexico and New York. She examines their activities in the nineteenth century and today, providing interviews with sheriffs, marshals, bounty hunters, policemen, and with people who have been pursued by them. A work of interest to students, researchers, and citizens concerned with the workings of the U.S. criminal justice system.
It can take the form of a Molotov Cocktail or a Suicide Bomber detonating within a crowd. It can be a sophisticated electronic explosive device or a bomb in a shoe. Today's terrorism threats, and their constant assault on global security continues to be a menace of great concern. Providing a hands-on look inside the ugly, blood-stained world of global terrorism, Introduction to Terrorism covers the evolution of terrorism, its growing sophistication, and its cynical indifference to human life. It begins by covering the history of terrorism and showing how the threats have changed since the September 11, 2001 attacks. It examines the methods America has chosen to guard against and deal with these threats using its military, government, and civilian agencies. Illustrating and examining current and future challenges, this state-of-the-art text follows a flow model developed and successfully taught in the classroom at several colleges and universities. Designed to follow the standard academic semester (one chapter per week), the book's content, style, presentation, and organization have been class-tested and validated.
1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.
Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.
1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.
Nonproliferation Issues for Weapons of Mass Destruction provides an
understanding of WMD proliferation risks by bridging complex
technical and political issues. The text begins by defining the
world conditions that foster proliferation, followed by an analysis
of characteristics of various classes of WMDs, including nuclear,
biological, and chemical weapons. It then explores the
effectiveness of arms control, discussing current nonproliferation
problems, nonproliferation prior to the fall of the USSR, and
weapons safeguards.
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.
1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.
This book analyses the collective security system as it now stands, focusing on strategic and normative frameworks. The old system of international collective security is based on assumptions that are inadequate in relation to current challenges. Against the backdrop of changed geopolitical constellations, democracies under siege and the challenges posed by new types of warfare, critical analysts hold that not a single multilateral institution today is fully up to the task it was created for. The UN, from its founding to the Sustained Peace Approach, represents a fascinating global process of vision-building and adaptation to reality. Based on this understanding, the dynamics of the UN peace and security architecture are examined along with major agendas, from peacebuilding to development. In turn, reform proposals in the post-COVID-19 era are discussed. The book examines whether a regionalization of security structures within the UN framework may offer a way out of global fragility and growing instability factors, a question of utmost importance for conflict prevention and crisis management in the next few decades. In turn, the author discusses a normative positioning of a new intervention logic as the lowest common denominator between collaborative regional orders. Reinvented multilateralism will return as a "must." Given its scope, the book will appeal to students and scholars of international relations and international security studies, as well as to policymakers in governments and international organizations.
Contemporary supply chains operate under the pressure of customer requirements, increasing price competition, sudden increases or decreases in demand, unforeseen obstacles and new threats. The right way to improve the functioning of the flow of material and accompanying information is not only the continuous collection of data but also their collection, analysis, inference and decision-making with the use of decision support systems, expert systems and artificial intelligence. Such procedures make it easier for logisticians not only to forecast processes but also to predict (forecast) and identify potential problems and facilitate the implementation of optimal modern solutions, paying attention to current trends in the supply chain market. An important issue that affects the quality, efficiency and availability (continuity) of the processes implemented within the supply chain is security. This is an area that is not clearly defined. This book uses theoretical and practical knowledge to define security in the supply chain as a state that gives a sense of certainty and guarantees the flow of material goods and services (in accordance with the 7w rule) as well as a smooth flow of information for the planning and management of logistics processes. Tools and instruments used to ensure the security of the supply chain contribute to the protection and survival in times of dangerous situations (threats) and adaptation to new conditions (susceptibility to unplanned situations). When analyzing the needs and structure of the 21st century supply chains, in the context of their security, it is impossible to ignore the problem of their digitization, which enables the determination of optimal routes and the anticipation of possible threats (crisis situations). Automatic data exchange between various departments of the company along the upper and lower part of the supply chain improves the functioning of the warehouse management through, among others, automation, robotization and pro-activity. It also contributes to efficient, good communication and market globalization. Automation also brings new, extremely attractive business models with regard to occupational safety, ergonomics and environmental protection. To meet the needs of creating modern supply chains, the book analyzes and presents current and future solutions that affect security and the continuity of supply chains.
In a world that is increasingly unstable, intelligence services like the American CIA and the United Kingdom's MI6 exist to deliver security. Whether the challenge involves terrorism, cyber-security, or the renewed specter of great power conflict, intelligence agencies mitigate threats and provide decisional advantage to national leaders. But empowered intelligence services require adequate supervision and oversight, which must be about more than the narrow (if still precarious) task of ensuring the legality of covert operations and surveillance activities. Global Intelligence Oversight is a comparative investigation of how democratic countries can govern their intelligence services so that they are effective, but operate within frameworks that are acceptable to their people in an interconnected world. The book demonstrates how the institutions that oversee intelligence agencies participate in the protection of national security while safeguarding civil liberties, balancing among competing national interests, and building public trust in inherently secret activities. It does so by analyzing the role of courts and independent oversight bodies as they operate in countries with robust constitutional frameworks and powerful intelligence services. The book also illuminates a new transnational oversight dynamic that is shaping and constraining security services in new ways. It describes how global technology companies and litigation in transnational forums constitute a new form of oversight whose contours are still undefined. As rapid changes in technology bring the world closer together, these forces will complement their more traditional counterparts in ensuring that intelligence activities remain effective, legitimate, and sustainable.
Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.
This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a "communication theory" book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.
OR, Defence and Security presents eleven papers, originally published in the Journal of the Operational Research Society and the Journal of Simulation, which exemplify important themes and topics in Operational Research (OR), as applied to modern-day defense and security issues. Topics range from frontline OR in a peace-support operation to new developments in combat modelling, and from the logistics of overseas intervention to defence planning at the top level. Also included are examples of applications addressing insurgency and terrorism. Edited by Dr Roger A. Forder, who had a distinguished career in OR in the UK Ministry of Defence, he has also written an authoritative introductory chapter which sets the papers in the context of the global strategic environment as it has evolved since the end of the Cold War. The OR Essentials series presents a unique cross-section of high quality research work fundamental to understanding contemporary issues and research in across a range of Operational Research (OR) topics. It brings together some of the best research papers from the esteemed Operational Research Society and its associated journals, also published by Palgrave Macmillan.
As international terrorism has grown over the past decades, airlines and airports have become increasingly popular targets for violent attacks and hijackings. In this volume, Peter St. John provides a survey of international air piracy and airline terrorism, and of the ways airline professionals and governments are coping, or attempting to cope, with the crisis. St. John not only deals with the history, politics, psychology, and sociology of air piracy, but also provides an assessment of the threat to commercial aircraft and ways to counter the danger. The principal theme he develops is that security for airports and aircraft can be achieved, and the fear of terrorists overcome, if Western countries cooperate in installing effective security policies and plans. St. John begins his work with a two-chapter history of the evolution of hijacking, tracing the five-to-seven-year cycles that seem to have emerged and the growth of the politically motivated hijacking that has become the most persistent and dangerous form. He next analyzes the eight types of individuals who have hijacked aircraft in the past, their different motives, and how they can be identified by airport security and flight crews. A major chapter discusses the politics of Western governments toward highjacking in Europe and North America, and identifies the best and worst airports around the globe. A seven-stage system of security that will probably be a necessity for the 1990s is also proposed. Ensuing chapters address the problem of the hijacked plane, offering advice for passengers and crew members who are victims of hijacking, and for government behavior, which often does more to encourage air terrorism than to preventit. Finally, St. John looks to the future of airport security and describes the need for a concentrated attempt at all levels of national and international government to develop effective defenses against air piracy. A group of appendices is also included, documenting the principal hijacks of the past forty years as well as sabotage attempts on commercial aircraft. This work will be an important reference tool for professionals in security services and the airline and airport management field, and for students in political science and international relations courses. It will also be a valuable addition to college, university, and public libraries.
In seeking to evaluate the efficacy of post-9/11 homeland security
expenses--which have risen by more than a trillion dollars, not
including war costs--the common query has been, "Are we safer?"
This, however, is the wrong question. Of course we are "safer"--the
posting of a single security guard at one building's entrance
enhances safety. The correct question is, "Are any gains in
security worth the funds expended?" |
You may like...
Level 1/Level 2 Cambridge National in…
Kevin Wells, Sarah McAtominey, …
Paperback
R1,086
Discovery Miles 10 860
Mars Geological Enigmas - From the Late…
Richard Soare, Susan Conway, …
Paperback
R3,065
Discovery Miles 30 650
|