0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (7)
  • R500+ (316)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General

Researching National Security Intelligence - Multidisciplinary Approaches (Hardcover): Stephen Coulthart, Michael... Researching National Security Intelligence - Multidisciplinary Approaches (Hardcover)
Stephen Coulthart, Michael Landon-Murray, Damien Van Puyvelde; Contributions by Stephen Coulthart, Michael Landon-Murray, …
R3,659 Discovery Miles 36 590 Ships in 12 - 19 working days

Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.

The Rules of Security - Staying Safe in a Risky World (Hardcover): Paul Martin The Rules of Security - Staying Safe in a Risky World (Hardcover)
Paul Martin
R656 R600 Discovery Miles 6 000 Save R56 (9%) Ships in 12 - 19 working days

This book demystifies and explains a subject that affects every one of us in our private lives and at work. Security is a practical discipline concerned with safeguarding lives, property, information, wealth, reputations, and social wellbeing. It is the basis of civilised society. People, businesses, and nations cannot thrive in its absence, whereas the right kind of security frees us to live fulfilling lives. But deciding what is needed, and then making it happen, is not easy. The threats to our security are complex and continually evolving, as criminals, hackers, terrorists, and hostile foreign states continually find new ways of staying one step ahead of us, their potential victims. At the same time, we are continually creating new vulnerabilities as we adopt new technologies and new ways of working. Those who do not understand the fundamentals of security, risk, and resilience open themselves, and those around them, to avoidable dangers, needless anxieties, and unnecessary costs. Inadequate security may leave them exposed to intolerable risks, while the wrong kind of security is expensive, intrusive, and ineffective. In his essential new book, world-leading security expert Paul Martin sets out the ten most important guiding principles of protective security and resilience. Clearly expressed in the form of simple but powerful rules of thumb, their purpose is to help solve complicated problems for which there are no textbook solutions. The rules offer a powerful toolkit, designed to work in many different situations, including the cyber domain. When we are faced with novel problems requiring complex decisions, it is easy to focus on the wrong things. These rules remind us what really matters. The psychological and behavioural aspects of security are key themes throughout the book. People lie at the heart of security. The criminals, terrorists, and hackers are social animals with complex emotions and psychological predispositions. So too are the victims of those attackers and the security practitioners who strive to protect us. The human dimension is therefore crucial to understanding security. The Rules of Security will help anyone with an interest in their own security and that of their home, family, business, or society. It will be indispensable to those in positions of responsibility, allowing them to understand how best to protect their organisation, people, and assets. It assumes no expert technical knowledge and explains the ideas in clear and simple terms. It will appeal to anyone with an interest in security. If you read only one book about security, it should be this one.

Walking the Ground - Making American History. A Memoir of Edwin Cole Bearss (Hardcover): Robert Irving Desourdis Walking the Ground - Making American History. A Memoir of Edwin Cole Bearss (Hardcover)
Robert Irving Desourdis
R3,249 Discovery Miles 32 490 Ships in 12 - 19 working days

This second book of the Edwin Cole Bearss memoir begins with his first days in a 40-year career in the National Park Service. Beginning as the Park Historian at the Vicksburg National Military Park in September, 1955, the book covers his rise to Chief Historian, now Emeritus. He has always professed the importance of walking the ground to understand the outcomes of all battles, but particularly those that created, and then consecrated, the United States of America. Said to know more about Civil War battlefields than any other historian of his time, this book describes how he helped create and interpret much of our American history. He first learned the importance of "walking the ground" when in combat on the Pacific island of New Britain. There, a few inches of earth saved his life after having four Japanese bullets tear into him at what Marines would soon dub "Suicide Creek." His early years in Montana, the account of this action on New Britain, his chance meeting with the actor and fellow Montanan Gary Cooper, and his 27 months in hospitals is published in the book Walking the Ground: From Big Sky to Semper Fi also by NOVA. His Government career created National Parks and Presidential Historic Parks, including his direct relationships with President Lyndon B. Johnson and President Jimmy Carter. He created and improved many parks, and thus, made the history that Americans see and read when they experience these important American lands, battlefields and buildings. Ed Bearss has made indelible marks on the American landscape, and in so doing, defined much of the historical culture of the United States. His contribution to our understanding of American history is immense. He is the author of 140 National Park Service reports, more than any other person to work for the National Park Service.The quality and popularity of his tours and books are rare among present-day historians. He has mentored generations of younger historians who now teach American history, and continue along the path he has pioneered. He has frequently testified before Congress, was interviewed by television reporters and guided senior-level Government officials in critical events in American history. Ed Bearss became a television celebrity following his appearance to mass television audiences who watched the Ken Burns Civil War Series on PBS, leading to great demand in Bearss-led battlefield history tours. For those many U.S. history adventurers who have experienced his history tours, Ed Bearss' words and mannerisms leap from the page as we follow him walking Pickett's Charge at the Gettysburg; track John Wilkes Booth's escape route after assassinating President Abraham Lincoln; recount George Armstrong Custer's battlefield defeat by Native Americans whose families he had attacked along the Little Big Horn River; and words describing the WWI American sacrifice at Belleau Wood of U.S. Marine mythology. This book will explain Ed Bearss' unsurpassed contribution to the making of American history and the strengthening our collective culture.

Security Risks - Assessment, Management & Current Challenges (Hardcover): Milica Boskovic Security Risks - Assessment, Management & Current Challenges (Hardcover)
Milica Boskovic
R6,344 R5,884 Discovery Miles 58 840 Save R460 (7%) Ships in 12 - 19 working days

Security is one of the key pillars on which a stable society is built, and which guarantees the rights of its members. One of the modern strategies -- human security -- potentiates that economy, environment, security, social conditions and law are the main attributes and functions that provide citizen's with prosperity, a sense of safety and integrity. Good socio-economic conditions, healthy environment and respect for human rights provide a state with political and democratic strength. It also allows for business to be stronger and progressive. This edition aims to provide some of the key challenges for modern societies so that scientists may explain them and give some solutions for better risk and crisis management. Scientists and researchers from different areas and universities analysed risks from areas of IT, global health, migrations, social engineering, nuclear weaponry, environmental protection, private anti-crime business and different security policies. One of the aims of this edition is to explain how important it is to recognise all different challenges, not to neglect them, but to provide them with all possible legal solutions, technical solutions and knowledge to protect people, society and state from qualitatively different risks and consequences. Through this edition, experts and researches have tried to provide actual reviews of challenges of the twenty-first century and possible solutions for their understanding, prevention and/or minimalising damages in emergency situations.

U.S. Assistance to Foreign Military & Security Forces - Roles of the Departments of State & Defense (Paperback): Louise... U.S. Assistance to Foreign Military & Security Forces - Roles of the Departments of State & Defense (Paperback)
Louise Patterson
R3,673 Discovery Miles 36 730 Ships in 12 - 19 working days

The Department of State and the Department of Defense (DOD) have long shared responsibility for U.S. assistance to train, equip, and otherwise engage with foreign military and other security forces. The legal framework for such assistance emerged soon after World War II, when Congress charged the Secretary of State with responsibility for overseeing and providing general direction for military and other security assistance programs and the Secretary of Defense with responsibility for administering such programs. Over the years, congressional directives and executive actions have modified, shaped, and refined State Department and DOD roles and responsibilities. Changes in the legal framework through which security assistance to foreign forcesweapons, training, lethal and nonlethal military assistance, and military education and trainingis provided have responded to a wide array of factors. This book provides an overview of U.S. assistance to and engagement with foreign military and other security forces, focusing on Department of State and DOD roles. It lays out the historical evolution and current framework of the Department of State-DOD shared responsibility.

Security of U.S. Diplomatic Facilities & Personnel Abroad - Background, Federal Initiatives & Staff Training (Paperback):... Security of U.S. Diplomatic Facilities & Personnel Abroad - Background, Federal Initiatives & Staff Training (Paperback)
Teresa D Boles
R1,913 R1,737 Discovery Miles 17 370 Save R176 (9%) Ships in 12 - 19 working days

The United States maintains about 285 diplomatic facilities worldwide. Attacks on such facilities, and on U.S. diplomatic personnel, are not infrequent. The deaths of Ambassador Christopher Stevens and three other U.S. personnel in Benghazi, Libya on 11 September 2012, along with attacks on U.S. embassies in Egypt, Sudan, Tunisia, and Yemen, drew renewed attention to the challenges facing U.S. diplomats abroad, as well as to the difficulty in balancing concerns for their security against the outreach required of their mission. Congress plays a key role in shaping the response to these challenges, such as by providing resources for diplomatic security and examining security breaches overseas. This book provides background information on the organisation, practice, and funding of U.S. diplomatic security efforts. It also provides summary information on the 11 September 2012, attack on U.S. facilities in Benghazi, Libya, as well as on the subsequent Accountability Review Board.

Chemical Facilities - Security Issues & Risk Assessment Efforts (Hardcover): Sijrid Mayr Chemical Facilities - Security Issues & Risk Assessment Efforts (Hardcover)
Sijrid Mayr
R3,370 Discovery Miles 33 700 Ships in 12 - 19 working days

Recognising the potential harm that a large, sudden release of hazardous chemicals poses to nearby people, state and federal governments have long regulated safety practices at chemical facilities. Historically, chemical facilities have engaged in security activities on a voluntary basis. Even before the terrorist attacks of 2001, congressional policymakers expressed concern over the security vulnerabilities of these facilities. After the 2001 attacks and the decision by several states to begin regulating security at chemical facilities, Congress again considered requiring federal security regulations to mitigate these risks. This book provides an overview of the existing statutory authority and implementing regulation concerning security issues at chemical facilities, with a focus on policy options and congressional considerations.

Homeland Security - Assessing the First Five Years (Hardcover): Michael Chertoff Homeland Security - Assessing the First Five Years (Hardcover)
Michael Chertoff; Contributions by Lee H. Hamilton
R777 Discovery Miles 7 770 Ships in 12 - 19 working days

In 2003, the President and the U.S. Congress established the Department of Homeland Security. From the beginning, its mission was clear: prevent terrorist attacks, protect against threats to America's safety and security, and prepare the nation to respond effectively to disasters, both natural and man-made. This monumental mission demands a comprehensive strategy. It also requires a crystal-clear explanation of that strategy to Americans and their allies worldwide. In a revealing new book, "Homeland Security: Assessing the First Five Years," Michael Chertoff provides that explanation. In a refreshingly candid and engaging manner, America's former homeland security secretary depicts the department's long-term approach, what it has achieved, and what it has yet to do.The strategy begins with the threats America faces, from terrorist groups like al Qaeda to hurricanes like Ike or Gustav. "Once these threats are identified," Chertoff writes, "we can confront them, using every tool at our disposal. We can stop terrorists from entering the country, and discourage people from embracing terrorism by combating its lethal ideology. We can protect our critical assets and reduce our vulnerabilities to natural disasters. We can plan and prepare for emergencies and respond in a way that minimizes the consequences. And we can work closely with our allies abroad to reduce the risk of future disasters." In each of these areas, Chertoff informs the reader what the nation has done and what it still must do to secure its future.How well has this strategy fared in a post-9/11 world? Since that fateful day, there have been no global terror attacks on American soil. Yet in the face of continued dangers, Michael Chertoff warns repeatedly against complacency. He urges America and its leaders to strengthen their resolve, stay the course, and build creatively on past successes.

Confronting the Enemy within - Security Intelligence, the Police, and Counterterrorism in Four Democracies (Paperback): Peter... Confronting the Enemy within - Security Intelligence, the Police, and Counterterrorism in Four Democracies (Paperback)
Peter Chalk, William Rosenau
R554 Discovery Miles 5 540 Ships in 10 - 15 working days

Reviews four countries' domestic intelligence services to assess whether the creation of such an agency in the United States, apart from the Federal Bureau of Investigation, would be beneficial. (PW); Since the September 11, 2001, attacks, critics have charged that the Federal Bureau of Investigation (FBI), while qualified to investigate terrorist incidents after the fact, is not wel equipped enough to adequately gather and a assess information to prevent attacks. Given the bureau's law enforcement and prosecutorial cultural, many believe that the burden of countering terrorism, the FBI's main focus now, in addition to the load of taking on "ordinary" crime, may be too much. To better inform debate, researchers analyzed the domestic security structures of four allied countries-the United Kingdom, France, Canada, and Australia-weighing both their positive and negative aspects.

Security and politics in South Africa - A regional dimension (Book): Peter Vale Security and politics in South Africa - A regional dimension (Book)
Peter Vale
R516 Discovery Miles 5 160 Ships in 2 - 4 working days

In this analysis of South Africa's post apartheid security system, the author moves beyond a realist discussion of interacting states to examine southern Africa as an integrated whole. The author argues that, despite South Africa's manipulation of state structures and elites in the region for its own ends, the suffering endured under the apartheid regime drew the region together at the popular level and that economic factors, such as the use of migrant labor, reinforced the process of integration. Exploring how the region is changing today as transnational solidarity and a single regional economy remove the distinctions between national and international politics he asks whether 'South African domination can finally be overcome and considers what sort of cosmopolitan political arrangement will be appropriate for southern Africa in the new century.

Private Investigation and Homeland Security (Hardcover): Daniel J Benny Private Investigation and Homeland Security (Hardcover)
Daniel J Benny
R4,468 Discovery Miles 44 680 Ships in 12 - 19 working days

The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.

Conducting Network Penetration and Espionage in a Global Environment (Hardcover): Bruce Middleton Conducting Network Penetration and Espionage in a Global Environment (Hardcover)
Bruce Middleton
R3,307 Discovery Miles 33 070 Ships in 12 - 19 working days

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

The National Security Constitution (Paperback): Paul F Scott The National Security Constitution (Paperback)
Paul F Scott
R2,236 Discovery Miles 22 360 Ships in 10 - 15 working days

This book addresses the various ways in which modern approaches to the protection of national security have impacted upon the constitutional order of the United Kingdom. It outlines and assesses the constitutional significance of the three primary elements of the United Kingdom's response to the possibility of terrorism and other phenomena that threaten the security of the state: the body of counter-terrorism legislation that has grown up in the last decade and a half; the evolving law of investigatory powers; and, to the extent relevant to the domestic constitution, the law and practice governing international military action and co-operation. Following on from this, the author demonstrates that considerations of national security - as a good to be protected and promoted in contemporary Britain - are reflected not merely in the existence of discrete bodies of law by which it is protected at home and abroad, but simultaneously and increasingly leaked into other areas of public law. Elements of the constitution which are not directly and inherently linked to national security nevertheless become (by both accident and design) implicated in the state's national security endeavours, with significant and at times far-reaching consequences for the constitutional order generally. A renewed and strengthened concern for national security since September 2001 has, it is argued, dragged into its orbit a variety of constitutional phenomena and altered them in its image, giving rise to what we might call a national security constitution.

Private Security in Africa - From the Global Assemblage to the Everyday (Paperback): Doctor Paul Higate, Mats Utas Private Security in Africa - From the Global Assemblage to the Everyday (Paperback)
Doctor Paul Higate, Mats Utas
R1,002 Discovery Miles 10 020 Ships in 12 - 19 working days

Across Africa, growing economic inequality, instability and urbanization have led to the rapid spread of private security providers. While these PSPs have already had a significant impact on African societies, their impact has so far received little in the way of comprehensive analysis. Drawing on a wide range of disciplinary approaches, and encompassing anthropology, sociology and political science, Private Security in Africa offers unique insight into the lives and experiences of security providers and those affected by them, as well as into the fragile state context which has allowed them to thrive. Featuring original empirical research and case studies ranging from private policing in South Africa to the recruitment of Sierra Leoneans for private security work in Iraq, the book considers the full implications of PSPs for security and the state, not only for Africa but for the world as a whole.

Biometric Technology - Authentication, Biocryptography, and Cloud-Based Architecture (Hardcover): Ravi Das Biometric Technology - Authentication, Biocryptography, and Cloud-Based Architecture (Hardcover)
Ravi Das
R4,489 Discovery Miles 44 890 Ships in 12 - 19 working days

Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the two, Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture is ideal for business, IT, or security managers that are faced with the task of making purchasing, migration, or adoption decisions. It brings biometrics down to an understandable level, so that you can immediately begin to implement the concepts discussed. Exploring the technological and social implications of widespread biometric use, the book considers the science and technology behind biometrics as well as how it can be made more affordable for small and medium-sized business. It also presents the results of recent research on how the principles of cryptography can make biometrics more secure. Covering biometric technologies in the cloud, including security and privacy concerns, the book includes a chapter that serves as a "how-to manual" on procuring and deploying any type of biometric system. It also includes specific examples and case studies of actual biometric deployments of localized and national implementations in the U.S. and other countries. The book provides readers with a technical background on the various biometric technologies and how they work. Examining optimal application in various settings and their respective strengths and weaknesses, it considers ease of use, false positives and negatives, and privacy and security issues. It also covers emerging applications such as biocryptography. Although the text can be understood by just about anybody, it is an ideal resource for corporate-level executives who are considering implementing biometric technologies in their organizations.

Private Security In The 21St Century: Concepts And Applications (Paperback): Dr Edward J Maggio Private Security In The 21St Century: Concepts And Applications (Paperback)
Dr Edward J Maggio
R3,151 Discovery Miles 31 510 Ships in 10 - 15 working days

Private Security In The 21St Century: Concepts And Applications Informs The Learner About The Historical Development Of Private Security And Provides New Information For Educating And Training Private Security Personnel In The Beginning Stages Of Their Career, Whether They Are A Full Time Student Or Entry Level Security Worker On The Job. This Text Will Not Only Provide The Background Information That A Prospective Security Person Should Know, But Also Describes The Basic Operational Procedures Students Need To Understand. Private Security In The United States: Concepts And Applications Examines Current Practices In Private Security And Technology.

Australian Security After 9/11 - New and Old Agendas (Hardcover, New Ed): Peter Shearman Australian Security After 9/11 - New and Old Agendas (Hardcover, New Ed)
Peter Shearman; Derek Mcdougall
R4,471 Discovery Miles 44 710 Ships in 12 - 19 working days

Debates on security became more intense following the unanticipated end of the Cold War conflict and took on added force after the terrorist attacks on the US on September 11, 2001. Generally viewed as a part of the wider 'West' despite its separation by enormous geographical distances from both Europe and the United States, Australia is a regional power in its own right. It has been an active and loyal member of the US-led coalitions of the willing, first in Afghanistan and then in Iraq. The terrorist attacks in Bali one year after the attacks in the United States brought home to Australia the direct nature of the new global terrorist threats to its own security. This volume brings together leading experts on international security and Australia's foreign and security policies in a critical examination of Australia's adaptations to the new security challenges. It is the first in-depth and comprehensive analysis of Australia's defence and security policies as well as the country's role in countering regional and global challenges to international security since the war on terrorism began.

Best Of Times, The Worst Of Times, The: Maritime Security In The Asia-pacific (Hardcover): Joshua Ho, Catherine Zara Raymond Best Of Times, The Worst Of Times, The: Maritime Security In The Asia-pacific (Hardcover)
Joshua Ho, Catherine Zara Raymond
R4,706 Discovery Miles 47 060 Ships in 12 - 19 working days

This authoritative book brings together in a single volume international experts renowned in their specializations to discuss issues and current trends relating to maritime security.It looks at the issue of maritime security in the Asia-Pacific through a three step approach. Firstly, it surveys both the global maritime outlook and the outlook in each of the regions of Northeast Asia, Southeast Asia, and South Asia. From these regional perspectives, trends in commercial shipping and force modernization, and issues like the weapons proliferation and maritime terrorism are discussed.After looking at the maritime environment, the specific challenges that the maritime community faces are examined. These challenges include maritime boundary and territorial disputes in the South China Sea, the force modernization of three Northeast Asian navies, and the spectre of maritime terrorism. The volume concludes by looking at some new initiatives for maritime cooperation, a survey of maritime "regime" building, and the legal and political implications of the proliferation security initiative.

International Relations Theory and the Consequences of Unipolarity (Hardcover): G.John Ikenberry, Michael Mastanduno, William... International Relations Theory and the Consequences of Unipolarity (Hardcover)
G.John Ikenberry, Michael Mastanduno, William C. Wohlforth
R2,667 Discovery Miles 26 670 Ships in 12 - 19 working days

The end of the Cold War and subsequent dissolution of the Soviet Union resulted in a new unipolar international system that presented fresh challenges to international relations theory. Since the Enlightenment, scholars have speculated that patterns of cooperation and conflict might be systematically related to the manner in which power is distributed among states. Most of what we know about this relationship, however, is based on European experiences between the seventeenth and twentieth centuries, when five or more powerful states dominated international relations, and the latter twentieth century, when two superpowers did so. Building on a highly successful special issue of the leading journal World Politics, this book seeks to determine whether what we think we know about power and patterns of state behaviour applies to the current 'unipolar' setting and, if not, how core theoretical propositions about interstate interactions need to be revised.

Bioterrorism - Field Guide to Disease Identification and Initial Patient Management (Paperback, New): Dag K.J.E. von Lubitz Bioterrorism - Field Guide to Disease Identification and Initial Patient Management (Paperback, New)
Dag K.J.E. von Lubitz
R2,966 Discovery Miles 29 660 Ships in 12 - 19 working days

The outbreak of anthrax infections that followed September 11, 2001, showed all too clearly that while we can defend ourselves against bioterrorism, our defenses need improvement. What's most important is the ability to recognize the associated disease, and recognize them quickly. Yet, many in the medical world are unfamiliar with the characteristic signs and symptoms of bioterrorism agents and are unable to differentiate between diseases whose symptoms appear almost identical. While a plethora of information on such diseases is available, finding it is time consuming.

Bioterrorism: Field Guide to Disease Identification and Initial Patient Management is an accessible resource that helps first-responders to quickly recognize the signs and symptoms caused by exposure to bioterrorism agents. It provides enough information to initiate treatment while a definitive diagnosis is being determined and presents measures for preventing contamination of those involved in the victims' medical management.

A special quick-reference foldout chart features a matrix linking 180 symptoms to 17 diseases and 90 differential diagnosis. In bulleted format, the book includes for each pathogenic agent:

" A brief description
" Signs and symptoms
" Diagnostic features
" Lab tests and expected results
" Treatment (specific drug regimens)
" Prophylaxis (specific drug regimens)
" Precautionary measures

This book is a potentially life-saving resource that can be thrown into a medical bag and kept there, hopefully forever unused. But if needed, it is a resource that can quickly provide information that will prevent secondary infections, improve site safety, and buy life-saving time for victims.

Radiation Injury Prevention and Mitigation in Humans (Hardcover): Kedar Prasad Radiation Injury Prevention and Mitigation in Humans (Hardcover)
Kedar Prasad
R4,478 Discovery Miles 44 780 Ships in 12 - 19 working days

With an estimated 3.3 billion ionizing radiation imaging examinations performed worldwide each year, the growing use of x-ray-based diagnostic procedures raises concerns about long-term health risks, especially cancer. In addition, rapid growth in the number of nuclear power plants around the world increases the risk of a nuclear accident similar to that of Fukushima, Japan. Add to this, exposure to non-ionizing radiation from prolonged cell phone use, proton radiation from solar flares, and potential nuclear conflict or a dirty bomb attack, and the need to expand our repertoire of radiation prevention and mitigation strategies becomes increasingly urgent. Radiation Injury Prevention and Mitigation in Humans identifies and examines physical protection strategies as well as non-toxic, cost-effective biological protection strategies. This includes agents that-when administered orally before and/or after irradiation exposures-could be effective in preventing and mitigating acute radiation damage. The book discusses implementing physical and biological protection strategies particularly for first responders, radiation workers, astronauts, and civilians who might be exposed to higher doses of radiation in the course of their activities. The book describes: Physics of ionizing radiation and radiological weapons, principles of nuclear reactors, the types of radiological weapons, and consequences of their explosions Acute and late health effects of high and low doses of radiation The efficacy of FDA-approved and unapproved radioprotective and radiation mitigating agents The efficacy of radioprotective and radiation mitigating agents not requiring FDA approval (antioxidants and herbs) Scientific data and rationale in support of using micronutrient preparations containing dietary and endogenous antioxidants for preventing acute radiation sickness and for mitigating the late adverse health effects among survivors of high and low doses of radiation Examining cutting-edge advances in the research of the effects of non-ionizing radiation on cellular and genetic levels, the book proposes an implementation plan of both physical and biological protection strategies. It covers the full range of potential sources of radiation and includes an up-to-date list of helpful resources and references for the latest research and readings on the topic.

Hospital and Healthcare Security (Paperback, 5th Revised edition): Russell L. Colling, Tony W. York Hospital and Healthcare Security (Paperback, 5th Revised edition)
Russell L. Colling, Tony W. York
R2,145 Discovery Miles 21 450 Out of stock

Hospital and Healthcare Security, Fifth Edition, examines the issues inherent to healthcare and hospital security, including licensing, regulatory requirements, litigation, and accreditation standards. Building on the solid foundation laid down in the first four editions, the book looks at the changes that have occurred in healthcare security since the last edition was published in 2001. It consists of 25 chapters and presents examples from Canada, the UK, and the United States. It first provides an overview of the healthcare environment, including categories of healthcare, types of hospitals, the nonhospital side of healthcare, and the different stakeholders. It then describes basic healthcare security risks/vulnerabilities and offers tips on security management planning. The book also discusses security department organization and staffing, management and supervision of the security force, training of security personnel, security force deployment and patrol activities, employee involvement and awareness of security issues, implementation of physical security safeguards, parking control and security, and emergency preparedness. Healthcare security practitioners and hospital administrators will find this book invaluable. FEATURES AND BENEFITS: * Practical support for healthcare security professionals, including operationally proven policies, and procedures * Specific assistance in preparing plans and materials tailored to healthcare security programs * Summary tables and sample forms bring together key data, facilitating ROI discussions with administrators and other departments * General principles clearly laid out so readers can apply the industry standards most appropriate to their own environment NEW TO THIS EDITION: * Quick-start section for hospital administrators who need an overview of security issues and best practices

Cyber Forensics - A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition... Cyber Forensics - A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition (Electronic book text, 2nd Revised edition)
Albert Marcella, Jr., Doug Menendez
R1,937 Discovery Miles 19 370 Out of stock

Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of a cyber forensic investigation. The authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition delineates the scope and goals of cyber forensics to reveal and track legal and illegal activity. Beginning with an introduction and definition of cyber forensics, chapters explain the rules of evidence and chain of custody in maintaining legally valid electronic evidence. They describe how to begin an investigation and employ investigative methodology, as well as establish standard operating procedures for the field and cyber forensic laboratory. The authors provide an in depth examination of the manipulation of technology to conceal illegal activities and the use of cyber forensics to uncover them. They discuss topics and issues such as conducting a cyber forensic investigation within both the local and federal legal framework, and evaluating the current data security and integrity exposure of multifunctional devices. Cyber Forensics includes details and tips on taking control of a suspect computer or PDA and its "operating" environment, mitigating potential exposures and risks to chain of custody, and establishing and following a flowchart for the seizure of electronic evidence. An extensive list of appendices include websites, organizations, pertinent legislation, further readings, best practice recommendations, more information on hardware and software, and a recap of the federal rules of civil procedure.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Stone by Stone - The Magnificent History…
Robert Thorson Paperback R487 R454 Discovery Miles 4 540
Unearthing the Underworld - A Natural…
Ken McNamara Hardcover R628 R572 Discovery Miles 5 720
The Natural History Museum Book of…
Robin Hansen Paperback R392 Discovery Miles 3 920
The Art of Gem Cutting - Including…
H. C Dake Hardcover R845 Discovery Miles 8 450
Dinosaurs - 300 Prehistoric Creatures
Gerrie McCall Paperback R329 R306 Discovery Miles 3 060
Secrets From Underfoot
Laddy Harrington, Guy Lozier Hardcover R687 Discovery Miles 6 870
Deucalion and Other Studies in Rocks and…
John Ruskin Hardcover R1,102 Discovery Miles 11 020
Sasol First Field Guide to Rocks…
Bruce Cairncross Paperback R120 R111 Discovery Miles 1 110
Northumberland Rocks - 50 Extraordinary…
Ian Jackson Paperback R390 Discovery Miles 3 900
Field Collecting Gemstones and Minerals
John Sinkankas Hardcover R1,511 Discovery Miles 15 110

 

Partners