![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
In recent history, planned violent attacks have persisted in the United States and abroad. Ranging from targeted attacks on private individuals, public figures, schools, universities, corporations, and public venues, among others, these attacks have continued to illustrate the need for improved threat assessment and management efforts at local and national levels. In the few years since its publication in 2014, the International Handbook of Threat Assessment has become the gold standard textbook for the prevention of targeted violence. With this new edition, editors J. Reid Meloy and Jens Hoffmann have expanded their landmark text, reflecting the rise of scholarship and growth within the field of threat assessment and management. The book spans across disciplines and explores the foundations of threat assessment, the fields of practice in which it is utilized, and provides detail on practical applications from the most notable threat assessors and programs in North America, Europe, and Australia. Since the first edition, new chapters focusing on lone actor terrorism, insider threats, cyberthreats, the use of artificial intelligence, bystander effects, and enhanced interviewing techniques, offer new guidance for threat assessment professionals. International Handbook of Threat Assessment is the comprehensive resource for mental health practitioners, law enforcement, and professionals working to prevent targeted violence. This guide will serve as inspiration for further research and equip those working to intercept harm with the necessary tools for intervention.
This second book of the Edwin Cole Bearss memoir begins with his first days in a 40-year career in the National Park Service. Beginning as the Park Historian at the Vicksburg National Military Park in September, 1955, the book covers his rise to Chief Historian, now Emeritus. He has always professed the importance of walking the ground to understand the outcomes of all battles, but particularly those that created, and then consecrated, the United States of America. Said to know more about Civil War battlefields than any other historian of his time, this book describes how he helped create and interpret much of our American history. He first learned the importance of "walking the ground" when in combat on the Pacific island of New Britain. There, a few inches of earth saved his life after having four Japanese bullets tear into him at what Marines would soon dub "Suicide Creek." His early years in Montana, the account of this action on New Britain, his chance meeting with the actor and fellow Montanan Gary Cooper, and his 27 months in hospitals is published in the book Walking the Ground: From Big Sky to Semper Fi also by NOVA. His Government career created National Parks and Presidential Historic Parks, including his direct relationships with President Lyndon B. Johnson and President Jimmy Carter. He created and improved many parks, and thus, made the history that Americans see and read when they experience these important American lands, battlefields and buildings. Ed Bearss has made indelible marks on the American landscape, and in so doing, defined much of the historical culture of the United States. His contribution to our understanding of American history is immense. He is the author of 140 National Park Service reports, more than any other person to work for the National Park Service.The quality and popularity of his tours and books are rare among present-day historians. He has mentored generations of younger historians who now teach American history, and continue along the path he has pioneered. He has frequently testified before Congress, was interviewed by television reporters and guided senior-level Government officials in critical events in American history. Ed Bearss became a television celebrity following his appearance to mass television audiences who watched the Ken Burns Civil War Series on PBS, leading to great demand in Bearss-led battlefield history tours. For those many U.S. history adventurers who have experienced his history tours, Ed Bearss' words and mannerisms leap from the page as we follow him walking Pickett's Charge at the Gettysburg; track John Wilkes Booth's escape route after assassinating President Abraham Lincoln; recount George Armstrong Custer's battlefield defeat by Native Americans whose families he had attacked along the Little Big Horn River; and words describing the WWI American sacrifice at Belleau Wood of U.S. Marine mythology. This book will explain Ed Bearss' unsurpassed contribution to the making of American history and the strengthening our collective culture.
The Chief Security Officer's Handbook: Leading Your Team into the Future offers practical advice on how to embrace the future, align with your organizations mission, and develop a program that meets the needs of the enterprise. The book discusses real-life examples of what to do to align with other critical departments, how to avoid spending time and resources on unnecessary and outdated methods, and tomorrow's security program. Today's security executives need to help their industry, their organization and the next generation of security leaders to pioneer, optimize and transform every aspect of our programs, technologies and methods. The book is ideal for current chief security officers, aspiring security executives, and those interested in better understanding the critical need to modernize corporate security.
Security is one of the key pillars on which a stable society is built, and which guarantees the rights of its members. One of the modern strategies -- human security -- potentiates that economy, environment, security, social conditions and law are the main attributes and functions that provide citizen's with prosperity, a sense of safety and integrity. Good socio-economic conditions, healthy environment and respect for human rights provide a state with political and democratic strength. It also allows for business to be stronger and progressive. This edition aims to provide some of the key challenges for modern societies so that scientists may explain them and give some solutions for better risk and crisis management. Scientists and researchers from different areas and universities analysed risks from areas of IT, global health, migrations, social engineering, nuclear weaponry, environmental protection, private anti-crime business and different security policies. One of the aims of this edition is to explain how important it is to recognise all different challenges, not to neglect them, but to provide them with all possible legal solutions, technical solutions and knowledge to protect people, society and state from qualitatively different risks and consequences. Through this edition, experts and researches have tried to provide actual reviews of challenges of the twenty-first century and possible solutions for their understanding, prevention and/or minimalising damages in emergency situations.
The Department of State and the Department of Defense (DOD) have long shared responsibility for U.S. assistance to train, equip, and otherwise engage with foreign military and other security forces. The legal framework for such assistance emerged soon after World War II, when Congress charged the Secretary of State with responsibility for overseeing and providing general direction for military and other security assistance programs and the Secretary of Defense with responsibility for administering such programs. Over the years, congressional directives and executive actions have modified, shaped, and refined State Department and DOD roles and responsibilities. Changes in the legal framework through which security assistance to foreign forcesweapons, training, lethal and nonlethal military assistance, and military education and trainingis provided have responded to a wide array of factors. This book provides an overview of U.S. assistance to and engagement with foreign military and other security forces, focusing on Department of State and DOD roles. It lays out the historical evolution and current framework of the Department of State-DOD shared responsibility.
Women in the Security Profession: A Practical Guide for Career Development is a resource for women considering a career in security, or for those seeking to advance to its highest levels of management. It provides a historical perspective on how women have evolved in the industry, as well as providing real-world tips and insights on how they can help shape its future. The comprehensive text helps women navigate their security careers, providing information on the educational requirements necessary to secure the wide-ranging positions in today's security field. Women in the Security Profession describes available development opportunities, offering guidance from experienced women professionals who have risen through the ranks of different security sectors.
Design and Evaluation of Physical Security Systems, 2e, includes
updated references to security expectations and changes since 9/11.
The threat chapter includes references to new threat capabilities
in Weapons of Mass Destruction, and a new figure on hate crime
groups in the US. All the technology chapters have been reviewed
and updated to include technology in use since 2001, when the first
edition was published. Garcia has also added a new chapter that
shows how the methodology described in the book is applied in
transportation systems. College faculty who have adopted this text
have suggested improvements and these have been incorporated as
well. This second edition also includes some references to the
author's recent book on Vulnerability Assessment, to link the two
volumes at a high level.
Practical Aviation Security: Predicting and Preventing Future Threats, Third Edition is a complete guide to the aviation security system, from crucial historical events to the policies, policymakers, and major terrorist and criminal acts that have shaped the procedures in use today, as well as the cutting edge technologies that are shaping the future. This text equips readers working in airport security or other aviation management roles with the knowledge to implement effective security programs, meet international guidelines, and responsibly protect facilities or organizations of any size. Using case studies and practical security measures now in use at airports worldwide, readers learn the effective methods and the fundamental principles involved in designing and implementing a security system. The aviation security system is comprehensive and requires continual focus and attention to stay a step ahead of the next attack. Practical Aviation Security, Third Edition, helps prepare practitioners to enter the industry and helps seasoned professionals prepare for new threats and prevent new tragedies.
For two hundred years the provision of military security has been a central and defining function of the modern nation-state. The increasing reliance on private military and security companies in contemporary conflict marks a fundamental transformation in the organization of military violence, and it raises issues of accountability and ethics that are of particular concern to feminists. This privatization of force not only enables states to circumvent citizens' democratic control over questions of war and peace, but also undermines women's and minority groups' claims for greater inclusion in the military sphere. Gender and Private Security in Global Politics brings together key scholars from the fields of international relations, security studies, and gender studies to argue that privatization of military security is a deeply gendered process. The chapters employ a variety of feminist perspectives, including critical, postcolonial, poststructuralist, and queer feminist perspectives, as well as a wide range of methodological approaches including ethnography, participant-observation, genealogy, and discourse analysis. This is the first book to develop an extended feminist analysis of private militaries and to draw on feminist concerns regarding power, justice and equality to consider how to reform and regulate private forces.
The United States maintains about 285 diplomatic facilities worldwide. Attacks on such facilities, and on U.S. diplomatic personnel, are not infrequent. The deaths of Ambassador Christopher Stevens and three other U.S. personnel in Benghazi, Libya on 11 September 2012, along with attacks on U.S. embassies in Egypt, Sudan, Tunisia, and Yemen, drew renewed attention to the challenges facing U.S. diplomats abroad, as well as to the difficulty in balancing concerns for their security against the outreach required of their mission. Congress plays a key role in shaping the response to these challenges, such as by providing resources for diplomatic security and examining security breaches overseas. This book provides background information on the organisation, practice, and funding of U.S. diplomatic security efforts. It also provides summary information on the 11 September 2012, attack on U.S. facilities in Benghazi, Libya, as well as on the subsequent Accountability Review Board.
Tourism security is an important part of both security management and tourism. Private security professionals and police departments in tourism cities, as well as hotels, major attractions, and theme parks, have all come to realize that tourism security and safety issues (often called tourism surety) are essential for industry survival and success. In Tourism Security, leading expert Peter Tarlow addresses a range of key issues in tourism safety and security. The book guides the reader through a study of tourism security themes and best practices. Topics include the relationship between tourism security and the economy, hotel and motel security, risk and crisis management, public places, transportation, and legal issues. The book also includes case studies of four popular tourist destinations. With each destination, an interview with a police or security representative is included-providing unique, in-depth insight to security concerns. Tourism Security is an invaluable resource for private security professionals, police departments that serve tourist destinations, and tourism professionals who work in hotels or convention centers, or at attractions, casinos, or events.
The protection of Federal employees and private citizens within U.S. government-owned or leased facilities is a top national priority. The mission of the Interagency Security Committee (ISC), comprised of 53 Federal departments and agencies, is to develop security standards, best practices, and guidelines for non-military Federal facilities in the United States. This book provides important information to assist department and agency security planners as they address a growing issue becoming increasingly present throughout both the public and the private sector: acts of violence in the workplace. The book provides a variety of examples based on real-world events for planners to study and take into consideration.
"The Professional Protection Officer, "eight edition(formerly titled "Protection Officer Training Manual") is the definitive reference and instructional text for career-oriented security officers in both the private and public sectors.The first edition of this titleoriginated with the birth of the International Foundation for Protection Officers (IFPO) in 1988, which has been using the book as the official text since that time.Each subsequent edition has brought new and enlightened information to the protection professional.The material in this new edition includes all of the subjects essential to training of protection professionals, and has been renamed to reflect new strategies, tactics, and trends in this dynamic field. The eighth edition of "The Professional Protection Officer"
contains 12 units and 45 chapterswritten by leading security
educators, trainers and consultants. It has served as the
definitive text for both students and professionals worldwide.This
new edition adds critical updates and fresh pedagogy, as well as
new diagrams, illustrations, and self-assessments. "The
Professional Protection Officer" is tailored to the training and
certification needs of today s protection professionals and proves
to be the most exciting and progressive edition yet
In the past two decades, many have posited a correlation between the spread of globalization and the decline of the nation-state. In the realm of national security, advocates of the globalization thesis have argued that states' power has diminished relative to transnational governmental institutions, NGOs, and transnational capitalism. Initially, they pointed to declines in both global military spending (which has risen dramatically in recent years) and interstate war. But are these trends really indicative of the decline of nation-state's role as a guarantor of national security? In Globalization and the National Security State, T.V. Paul and Norrin M. Ripsman test the proposition against the available evidence and find that the globalization school has largely gotten it wrong. The decline in interstate warfare can largely be attributed to the end of the Cold War, not globalization. Moreover, great powers (the US, China, and Russia) continue to pursue traditional nation-state strategies. Regional security arrangements like the EU and ASEAN have not achieved much, and weak states--the ones most impacted by the turmoil generated by globalization--are far more traditional in their approaches to national security, preferring to rely on their own resources rather than those of regional and transnational institutions. This is a bold argument, and Paul and Ripsman amass a considerable amount of evidence for their claims. It cuts against a major movement in international relations scholarship, and is sure to generate controversy.
In 2003, the President and the U.S. Congress established the Department of Homeland Security. From the beginning, its mission was clear: prevent terrorist attacks, protect against threats to America's safety and security, and prepare the nation to respond effectively to disasters, both natural and man-made. This monumental mission demands a comprehensive strategy. It also requires a crystal-clear explanation of that strategy to Americans and their allies worldwide. In a revealing new book, "Homeland Security: Assessing the First Five Years," Michael Chertoff provides that explanation. In a refreshingly candid and engaging manner, America's former homeland security secretary depicts the department's long-term approach, what it has achieved, and what it has yet to do.The strategy begins with the threats America faces, from terrorist groups like al Qaeda to hurricanes like Ike or Gustav. "Once these threats are identified," Chertoff writes, "we can confront them, using every tool at our disposal. We can stop terrorists from entering the country, and discourage people from embracing terrorism by combating its lethal ideology. We can protect our critical assets and reduce our vulnerabilities to natural disasters. We can plan and prepare for emergencies and respond in a way that minimizes the consequences. And we can work closely with our allies abroad to reduce the risk of future disasters." In each of these areas, Chertoff informs the reader what the nation has done and what it still must do to secure its future.How well has this strategy fared in a post-9/11 world? Since that fateful day, there have been no global terror attacks on American soil. Yet in the face of continued dangers, Michael Chertoff warns repeatedly against complacency. He urges America and its leaders to strengthen their resolve, stay the course, and build creatively on past successes.
The classic book "The Art of War" (or as it is sometimes
translated, "The Art of Strategy") by Sun Tzu is often used to
illustrate principles that can apply to the management of business
environments. "The Art of War for Security Managers" is the first
book to apply the time-honored principles of Sun Tzu's theories of
conflict to contemporary organizational security.
Reviews four countries' domestic intelligence services to assess whether the creation of such an agency in the United States, apart from the Federal Bureau of Investigation, would be beneficial. (PW); Since the September 11, 2001, attacks, critics have charged that the Federal Bureau of Investigation (FBI), while qualified to investigate terrorist incidents after the fact, is not wel equipped enough to adequately gather and a assess information to prevent attacks. Given the bureau's law enforcement and prosecutorial cultural, many believe that the burden of countering terrorism, the FBI's main focus now, in addition to the load of taking on "ordinary" crime, may be too much. To better inform debate, researchers analyzed the domestic security structures of four allied countries-the United Kingdom, France, Canada, and Australia-weighing both their positive and negative aspects.
The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.
When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.
This book addresses the various ways in which modern approaches to the protection of national security have impacted upon the constitutional order of the United Kingdom. It outlines and assesses the constitutional significance of the three primary elements of the United Kingdom's response to the possibility of terrorism and other phenomena that threaten the security of the state: the body of counter-terrorism legislation that has grown up in the last decade and a half; the evolving law of investigatory powers; and, to the extent relevant to the domestic constitution, the law and practice governing international military action and co-operation. Following on from this, the author demonstrates that considerations of national security - as a good to be protected and promoted in contemporary Britain - are reflected not merely in the existence of discrete bodies of law by which it is protected at home and abroad, but simultaneously and increasingly leaked into other areas of public law. Elements of the constitution which are not directly and inherently linked to national security nevertheless become (by both accident and design) implicated in the state's national security endeavours, with significant and at times far-reaching consequences for the constitutional order generally. A renewed and strengthened concern for national security since September 2001 has, it is argued, dragged into its orbit a variety of constitutional phenomena and altered them in its image, giving rise to what we might call a national security constitution.
Security and Loss Prevention: An Introduction, Seventh Edition, provides introductory and advanced information on the security profession. Security expert, Phil Purpura, CPP, includes updates on security research, methods, strategies, technologies, laws, issues, statistics and career options, providing a comprehensive and interdisciplinary book that draws on many fields of study for concepts, strategies of protection and research. The book explains the real-world challenges facing security professionals and offers options for planning solutions. Linking physical security with IT security, the book covers internal and external threats to people and assets and private and public sector responses and issues. As in previous editions, the book maintains an interactive style that includes examples, illustrations, sidebar questions, boxed topics, international perspectives and web exercises. In addition, course instructors can download ancillaries, including an instructor's manual with outlines of chapters, discussion topics/special projects, essay questions, and a test bank and PowerPoint presentation for each chapter.
Private Security In The 21St Century: Concepts And Applications Informs The Learner About The Historical Development Of Private Security And Provides New Information For Educating And Training Private Security Personnel In The Beginning Stages Of Their Career, Whether They Are A Full Time Student Or Entry Level Security Worker On The Job. This Text Will Not Only Provide The Background Information That A Prospective Security Person Should Know, But Also Describes The Basic Operational Procedures Students Need To Understand. Private Security In The United States: Concepts And Applications Examines Current Practices In Private Security And Technology.
Frequently characterized as either mercenaries in modern guise or the market's response to a security vaccuum, private military companies are commercial firms offering military services ranging from combat and military training and advice to logistical support, and which play an increasingly important role in armed conflicts, UN peace operations, and providing security in unstable states. Executive Outcomes turned around an orphaned conflict in Sierra Leone in the mid-1990s; Military Professional Resources Incorporated (MPRI) was instrumental in shifting the balance of power in the Balkans, enabling the Croatian military to defeat Serb forces and clear the way for the Dayton negotiations; in Iraq, estimates of the number of private contractors on the ground are in the tens of thousands. As they assume more responsibilities in conflict and post-conflict settings, their growing significance raises fundamental questions about their nature, their role in different regions and contexts, and their regulation. This volume examines these issues with a focus on governance, in particular the interaction between regulation and market forces. It analyzes the current legal framework and the needs and possibilities for regulation in the years ahead. The book as a whole is organized around four sets of questions, which are reflected in the four parts of the book. First, why and how is regulation of PMCs now a challenging issue? Secondly, how have problems leading to a call for regulation manifested in different regions and contexts? Third, what regulatory norms and institutions currently exist and how effective are they? And, fourth, what role has the market to play in regulation?
Debates on security became more intense following the unanticipated end of the Cold War conflict and took on added force after the terrorist attacks on the US on September 11, 2001. Generally viewed as a part of the wider 'West' despite its separation by enormous geographical distances from both Europe and the United States, Australia is a regional power in its own right. It has been an active and loyal member of the US-led coalitions of the willing, first in Afghanistan and then in Iraq. The terrorist attacks in Bali one year after the attacks in the United States brought home to Australia the direct nature of the new global terrorist threats to its own security. This volume brings together leading experts on international security and Australia's foreign and security policies in a critical examination of Australia's adaptations to the new security challenges. It is the first in-depth and comprehensive analysis of Australia's defence and security policies as well as the country's role in countering regional and global challenges to international security since the war on terrorism began.
This authoritative book brings together in a single volume international experts renowned in their specializations to discuss issues and current trends relating to maritime security.It looks at the issue of maritime security in the Asia-Pacific through a three step approach. Firstly, it surveys both the global maritime outlook and the outlook in each of the regions of Northeast Asia, Southeast Asia, and South Asia. From these regional perspectives, trends in commercial shipping and force modernization, and issues like the weapons proliferation and maritime terrorism are discussed.After looking at the maritime environment, the specific challenges that the maritime community faces are examined. These challenges include maritime boundary and territorial disputes in the South China Sea, the force modernization of three Northeast Asian navies, and the spectre of maritime terrorism. The volume concludes by looking at some new initiatives for maritime cooperation, a survey of maritime "regime" building, and the legal and political implications of the proliferation security initiative. |
![]() ![]() You may like...
Transportation and Network Analysis…
Michel Gendreau, P. Marcotte
Hardcover
R3,179
Discovery Miles 31 790
Handbook of Metaheuristics
Michel Gendreau, Jean-Yves Potvin
Hardcover
R5,416
Discovery Miles 54 160
Intelligent Natural Language Processing…
Khaled Shaalan, Aboul Ella Hassanien, …
Hardcover
R8,195
Discovery Miles 81 950
Operational Research - IO 2018, Aveiro…
Maria Joao Alves, Joao Paulo Almeida, …
Hardcover
R4,595
Discovery Miles 45 950
Probabilistic Composition of…
Annibal Parracho Sant'Anna
Hardcover
Building Blocks of Tabletop Game Design…
Geoffrey Engelstein, Isaac Shalev
Paperback
R2,023
Discovery Miles 20 230
Discrete-Time Markov Control Processes…
Onesimo Hernandez-Lerma, Jean B. Lasserre
Hardcover
R4,369
Discovery Miles 43 690
|