![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
Roy Snell has been in what he calls "close protection" for more than 16 years, guarding international royalty and celebrities including Madonna, Schwarzenegger, Stallone, Bruce Willis, Tom Jones, and Frank Sinatra. A former SAS sniper and heavyweight boxing champion, Roy is Britain's ultimate bodyguard. Roy was trained at the Regency College in Herefordshire, where the royal protection squad is drilled. He started out in security at showcases for the big bands of the 1980s--Duran Duran, Eurythmics, Aha, Kajagoogoo, and at a Wham! gig, he protected George Michael from a man with a baseball bat. A "Category A" bodyguard--a level that takes two years of training to reach--Roy is qualified to look after top level celebrity clients, from film stars to athletes, singers to royalty. Roy is also a skilled marksman trained in the use of the 9mm Bereta sub-machine gun and the 38 Snubnose--the standard issue weapon for the FBI.
"It will be very important, building on the goodwill which the Turkish military possess in society, to develop an informed security community consisting of members of parliament, academicians, journalists underpinning of security policy. I trust that this reference book will provide them with most useful support"-Dr. W. F. van Eekelen, former minister of defence, the Netherlands.
The March 2006 furor over a Dubai firms attempt to purchase the company managing some U.S. ports illustrates the difficult homeland security challenges that exist at the nexus of privately owned critical assets as well as global interdependence. Unfortunately, nearly five years after the September 11 attacks on New York and Washington, D.C., federal efforts to enlist the private sector in bolstering homeland security remain largely stillborn. Neglected Defense offers a thoughtful and tightly reasoned analysis of why that is so. It presents a way forward for strengthening cooperation between the private sector and government on homeland security. The report begins by laying out the policy dilemma in detail. It offers a recent history of the security role of the private sector, and highlights specific problems that have kept public-private security partnerships from maturing. It concludes with a series of recommendationsfor Congress, the Bush administration, and the private sectorto better secure the homeland.
By covering the essential tips and techniques for investigators,
Investigations: 150 Things You Should Know becomes a useful
reference. By further covering the legal guidelines that
investigators must follow, it becomes indispensable. Through
anecdotes, case studies, and documented procedures the authors of
this book have amassed the most complete collection of
investigative information available.
This paper presents a brief introduction to the tenants of the Banjul Charter, procedures and areas of divergence. It examines the rationale behind keeping the proceedings of relevant bodies confidential. It critically analyses the achievements of some African states in implementing human rights and their relationships with the OAU, and provides a view of what future role the AU might play in the protection process. Finally it assesses the chances for effective implementation of the treaty under the African system. The author argues that in accordance with UN policies regional protection of human rights should improve, and supplement the international protection provided by the UN; and that both levels of protection will therefore be strengthened.
This book demystifies and explains a subject that affects every one of us in our private lives and at work. Security is a practical discipline concerned with safeguarding lives, property, information, wealth, reputations, and social wellbeing. It is the basis of civilised society. People, businesses, and nations cannot thrive in its absence, whereas the right kind of security frees us to live fulfilling lives. But deciding what is needed, and then making it happen, is not easy. The threats to our security are complex and continually evolving, as criminals, hackers, terrorists, and hostile foreign states continually find new ways of staying one step ahead of us, their potential victims. At the same time, we are continually creating new vulnerabilities as we adopt new technologies and new ways of working. Those who do not understand the fundamentals of security, risk, and resilience open themselves, and those around them, to avoidable dangers, needless anxieties, and unnecessary costs. Inadequate security may leave them exposed to intolerable risks, while the wrong kind of security is expensive, intrusive, and ineffective. In his essential new book, world-leading security expert Paul Martin sets out the ten most important guiding principles of protective security and resilience. Clearly expressed in the form of simple but powerful rules of thumb, their purpose is to help solve complicated problems for which there are no textbook solutions. The rules offer a powerful toolkit, designed to work in many different situations, including the cyber domain. When we are faced with novel problems requiring complex decisions, it is easy to focus on the wrong things. These rules remind us what really matters. The psychological and behavioural aspects of security are key themes throughout the book. People lie at the heart of security. The criminals, terrorists, and hackers are social animals with complex emotions and psychological predispositions. So too are the victims of those attackers and the security practitioners who strive to protect us. The human dimension is therefore crucial to understanding security. The Rules of Security will help anyone with an interest in their own security and that of their home, family, business, or society. It will be indispensable to those in positions of responsibility, allowing them to understand how best to protect their organisation, people, and assets. It assumes no expert technical knowledge and explains the ideas in clear and simple terms. It will appeal to anyone with an interest in security. If you read only one book about security, it should be this one.
Defence is the ultimate public good, and it thus falls to government to determine the appropriate amount of public revenue to commit to the defence of the realm. This will depend on history, strategic threat, international security obligations, entreaties from allies and, of course, the threat faced. The Political Economy of Defence is structured to identify, explain and analyse the policy, process and problems that government faces from the starting point of national security through to the ultimate objective of securing a peaceful world. Accordingly, it provides insights into how defence budgets are determined and managed, offering relevant and refreshingly practical policy perspectives on defence finance, defence and development trade-offs, sovereignty vs globalisation debates, and many other pertinent issues. It will appeal to policymakers, analysts, graduate students and academics interested in defence economics, political economy, public economics and public policy.
U.S. Northern Command (NORTHCOM) and U.S. Pacific Command (PACOM) are updating their existing civil support plans to include a complex catastrophe scenario, as directed by the Secretary of Defense and the Joint Staff. However, the commands are delaying the identification of capabilities that could be provided to execute the plans until the Federal Emergency Management Agency (FEMA), the lead federal response agency, completes its regional planning efforts in 2018. This book assesses the extent to which DOD has planned for and identified capabilities to respond to complex catastrophes; and established a command and control construct for complex catastrophes and other multistate incidents. It also establishes Department of Defense (DoD) priorities in the areas of homeland defense and defense support of civil authorities through 2020, consistent with the president's National Security Strategy and the 2012 Defense Strategic Guidance.
The Department of Homeland Security's (DHS) mission includes law enforcement elements, which require the department, through its components, to manage various types of firearms. DHS's annual ammunition purchases have declined since fiscal year 2009 and are comparable in number to the Department of Justice's (DOJ) ammunition purchases. In fiscal year 2013, DHS purchased 84 million rounds of ammunition, which is less than DHS's ammunition purchases over the past 5 fiscal years. DHS component officials said the decline in ammunition purchases in fiscal year 2013 was primarily a result of budget constraints, which meant reducing the number of training classes, and drawing on their ammunition inventories. This book addresses trends in DHS's ammunition purchases since fiscal year 2008, how DHS's purchases compare with DOJ's, and what factors affect DHS's purchase decisions.
This book provides background information and potential oversight issues for Congress on the Coast Guard's programs for procuring eight National Security Cutters, 25 Offshore Patrol Cutters, and 58 Fast Response Cutters. These 91 planned cutters are intended as replacements for 90 ageing Coast Guard cutters and patrol craft. Additionally discussed is the sustainment and modernization of the Coast Guard's polar icebreaker fleet, which performs a variety of missions supporting U.S. interests in polar regions. The issue for Congress is whether to approve, reject, or modify Coast Guard funding and modernization requests and acquisition strategies. Congressional decisions could affect the Coast Guard's capabilities and funding requirements, the performance of polar missions and the U.S. shipbuilding industrial base.
The U.S. Department of Homeland Security (DHS) became the nation's 15th Cabinet department in January 2003. Twenty-two agencies with different missions, operations and cultures were consolidated and realigned into one organisation with its primary mission being that of prevention, preparation for and response to catastrophes affecting our homeland, while facilitating legitimate travel and trade (Appendix C). DHS now employs over 208,000 individuals who are located in every state and many foreign countries making it the third largest cabinet agency.
In this analysis of South Africa's post apartheid security system, the author moves beyond a realist discussion of interacting states to examine southern Africa as an integrated whole. The author argues that, despite South Africa's manipulation of state structures and elites in the region for its own ends, the suffering endured under the apartheid regime drew the region together at the popular level and that economic factors, such as the use of migrant labor, reinforced the process of integration. Exploring how the region is changing today as transnational solidarity and a single regional economy remove the distinctions between national and international politics he asks whether 'South African domination can finally be overcome and considers what sort of cosmopolitan political arrangement will be appropriate for southern Africa in the new century.
This second book of the Edwin Cole Bearss memoir begins with his first days in a 40-year career in the National Park Service. Beginning as the Park Historian at the Vicksburg National Military Park in September, 1955, the book covers his rise to Chief Historian, now Emeritus. He has always professed the importance of walking the ground to understand the outcomes of all battles, but particularly those that created, and then consecrated, the United States of America. Said to know more about Civil War battlefields than any other historian of his time, this book describes how he helped create and interpret much of our American history. He first learned the importance of "walking the ground" when in combat on the Pacific island of New Britain. There, a few inches of earth saved his life after having four Japanese bullets tear into him at what Marines would soon dub "Suicide Creek." His early years in Montana, the account of this action on New Britain, his chance meeting with the actor and fellow Montanan Gary Cooper, and his 27 months in hospitals is published in the book Walking the Ground: From Big Sky to Semper Fi also by NOVA. His Government career created National Parks and Presidential Historic Parks, including his direct relationships with President Lyndon B. Johnson and President Jimmy Carter. He created and improved many parks, and thus, made the history that Americans see and read when they experience these important American lands, battlefields and buildings. Ed Bearss has made indelible marks on the American landscape, and in so doing, defined much of the historical culture of the United States. His contribution to our understanding of American history is immense. He is the author of 140 National Park Service reports, more than any other person to work for the National Park Service.The quality and popularity of his tours and books are rare among present-day historians. He has mentored generations of younger historians who now teach American history, and continue along the path he has pioneered. He has frequently testified before Congress, was interviewed by television reporters and guided senior-level Government officials in critical events in American history. Ed Bearss became a television celebrity following his appearance to mass television audiences who watched the Ken Burns Civil War Series on PBS, leading to great demand in Bearss-led battlefield history tours. For those many U.S. history adventurers who have experienced his history tours, Ed Bearss' words and mannerisms leap from the page as we follow him walking Pickett's Charge at the Gettysburg; track John Wilkes Booth's escape route after assassinating President Abraham Lincoln; recount George Armstrong Custer's battlefield defeat by Native Americans whose families he had attacked along the Little Big Horn River; and words describing the WWI American sacrifice at Belleau Wood of U.S. Marine mythology. This book will explain Ed Bearss' unsurpassed contribution to the making of American history and the strengthening our collective culture.
Security is one of the key pillars on which a stable society is built, and which guarantees the rights of its members. One of the modern strategies -- human security -- potentiates that economy, environment, security, social conditions and law are the main attributes and functions that provide citizen's with prosperity, a sense of safety and integrity. Good socio-economic conditions, healthy environment and respect for human rights provide a state with political and democratic strength. It also allows for business to be stronger and progressive. This edition aims to provide some of the key challenges for modern societies so that scientists may explain them and give some solutions for better risk and crisis management. Scientists and researchers from different areas and universities analysed risks from areas of IT, global health, migrations, social engineering, nuclear weaponry, environmental protection, private anti-crime business and different security policies. One of the aims of this edition is to explain how important it is to recognise all different challenges, not to neglect them, but to provide them with all possible legal solutions, technical solutions and knowledge to protect people, society and state from qualitatively different risks and consequences. Through this edition, experts and researches have tried to provide actual reviews of challenges of the twenty-first century and possible solutions for their understanding, prevention and/or minimalising damages in emergency situations.
The Department of State and the Department of Defense (DOD) have long shared responsibility for U.S. assistance to train, equip, and otherwise engage with foreign military and other security forces. The legal framework for such assistance emerged soon after World War II, when Congress charged the Secretary of State with responsibility for overseeing and providing general direction for military and other security assistance programs and the Secretary of Defense with responsibility for administering such programs. Over the years, congressional directives and executive actions have modified, shaped, and refined State Department and DOD roles and responsibilities. Changes in the legal framework through which security assistance to foreign forcesweapons, training, lethal and nonlethal military assistance, and military education and trainingis provided have responded to a wide array of factors. This book provides an overview of U.S. assistance to and engagement with foreign military and other security forces, focusing on Department of State and DOD roles. It lays out the historical evolution and current framework of the Department of State-DOD shared responsibility.
Edward Snowden's revelations about the mass surveillance capabilities of the US National Security Agency (NSA) and other security services triggered an ongoing debate about the relationship between privacy and security in the digital world. This discussion has been dispersed into a number of national platforms, reflecting local political realities but also raising questions that cut across national public spheres. What does this debate tell us about the role of journalism in making sense of global events? This book looks at discussions of these debates in the mainstream media in the USA, United Kingdom, France, Germany, Russia and China. The chapters focus on editorials, commentaries and op-eds and look at how opinion-based journalism has negotiated key questions on the legitimacy of surveillance and its implications to security and privacy. The authors provide a thoughtful analysis of the possibilities and limits of 'transnational journalism' at a crucial time of political and digital change.
The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.
This book addresses the various ways in which modern approaches to the protection of national security have impacted upon the constitutional order of the United Kingdom. It outlines and assesses the constitutional significance of the three primary elements of the United Kingdom's response to the possibility of terrorism and other phenomena that threaten the security of the state: the body of counter-terrorism legislation that has grown up in the last decade and a half; the evolving law of investigatory powers; and, to the extent relevant to the domestic constitution, the law and practice governing international military action and co-operation. Following on from this, the author demonstrates that considerations of national security - as a good to be protected and promoted in contemporary Britain - are reflected not merely in the existence of discrete bodies of law by which it is protected at home and abroad, but simultaneously and increasingly leaked into other areas of public law. Elements of the constitution which are not directly and inherently linked to national security nevertheless become (by both accident and design) implicated in the state's national security endeavours, with significant and at times far-reaching consequences for the constitutional order generally. A renewed and strengthened concern for national security since September 2001 has, it is argued, dragged into its orbit a variety of constitutional phenomena and altered them in its image, giving rise to what we might call a national security constitution.
Across Africa, growing economic inequality, instability and urbanization have led to the rapid spread of private security providers. While these PSPs have already had a significant impact on African societies, their impact has so far received little in the way of comprehensive analysis. Drawing on a wide range of disciplinary approaches, and encompassing anthropology, sociology and political science, Private Security in Africa offers unique insight into the lives and experiences of security providers and those affected by them, as well as into the fragile state context which has allowed them to thrive. Featuring original empirical research and case studies ranging from private policing in South Africa to the recruitment of Sierra Leoneans for private security work in Iraq, the book considers the full implications of PSPs for security and the state, not only for Africa but for the world as a whole.
Private Security In The 21St Century: Concepts And Applications Informs The Learner About The Historical Development Of Private Security And Provides New Information For Educating And Training Private Security Personnel In The Beginning Stages Of Their Career, Whether They Are A Full Time Student Or Entry Level Security Worker On The Job. This Text Will Not Only Provide The Background Information That A Prospective Security Person Should Know, But Also Describes The Basic Operational Procedures Students Need To Understand. Private Security In The United States: Concepts And Applications Examines Current Practices In Private Security And Technology.
Debates on security became more intense following the unanticipated end of the Cold War conflict and took on added force after the terrorist attacks on the US on September 11, 2001. Generally viewed as a part of the wider 'West' despite its separation by enormous geographical distances from both Europe and the United States, Australia is a regional power in its own right. It has been an active and loyal member of the US-led coalitions of the willing, first in Afghanistan and then in Iraq. The terrorist attacks in Bali one year after the attacks in the United States brought home to Australia the direct nature of the new global terrorist threats to its own security. This volume brings together leading experts on international security and Australia's foreign and security policies in a critical examination of Australia's adaptations to the new security challenges. It is the first in-depth and comprehensive analysis of Australia's defence and security policies as well as the country's role in countering regional and global challenges to international security since the war on terrorism began.
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.
The outbreak of anthrax infections that followed September 11, 2001, showed all too clearly that while we can defend ourselves against bioterrorism, our defenses need improvement. What's most important is the ability to recognize the associated disease, and recognize them quickly. Yet, many in the medical world are unfamiliar with the characteristic signs and symptoms of bioterrorism agents and are unable to differentiate between diseases whose symptoms appear almost identical. While a plethora of information on such diseases is available, finding it is time consuming.
Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of a cyber forensic investigation. The authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition delineates the scope and goals of cyber forensics to reveal and track legal and illegal activity. Beginning with an introduction and definition of cyber forensics, chapters explain the rules of evidence and chain of custody in maintaining legally valid electronic evidence. They describe how to begin an investigation and employ investigative methodology, as well as establish standard operating procedures for the field and cyber forensic laboratory. The authors provide an in depth examination of the manipulation of technology to conceal illegal activities and the use of cyber forensics to uncover them. They discuss topics and issues such as conducting a cyber forensic investigation within both the local and federal legal framework, and evaluating the current data security and integrity exposure of multifunctional devices. Cyber Forensics includes details and tips on taking control of a suspect computer or PDA and its "operating" environment, mitigating potential exposures and risks to chain of custody, and establishing and following a flowchart for the seizure of electronic evidence. An extensive list of appendices include websites, organizations, pertinent legislation, further readings, best practice recommendations, more information on hardware and software, and a recap of the federal rules of civil procedure.
Hospital and Healthcare Security, Fifth Edition, examines the issues inherent to healthcare and hospital security, including licensing, regulatory requirements, litigation, and accreditation standards. Building on the solid foundation laid down in the first four editions, the book looks at the changes that have occurred in healthcare security since the last edition was published in 2001. It consists of 25 chapters and presents examples from Canada, the UK, and the United States. It first provides an overview of the healthcare environment, including categories of healthcare, types of hospitals, the nonhospital side of healthcare, and the different stakeholders. It then describes basic healthcare security risks/vulnerabilities and offers tips on security management planning. The book also discusses security department organization and staffing, management and supervision of the security force, training of security personnel, security force deployment and patrol activities, employee involvement and awareness of security issues, implementation of physical security safeguards, parking control and security, and emergency preparedness. Healthcare security practitioners and hospital administrators will find this book invaluable. FEATURES AND BENEFITS: * Practical support for healthcare security professionals, including operationally proven policies, and procedures * Specific assistance in preparing plans and materials tailored to healthcare security programs * Summary tables and sample forms bring together key data, facilitating ROI discussions with administrators and other departments * General principles clearly laid out so readers can apply the industry standards most appropriate to their own environment NEW TO THIS EDITION: * Quick-start section for hospital administrators who need an overview of security issues and best practices |
You may like...
|