![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.
Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.
How do crises produce changes in specific European Union foreign policy areas, and how should we conceptualise these policy changes? This book provides a novel analytical framework that serves to investigate the way in which the EU changes its foreign policy after crisis. Ikani adapts the existing theorising of foreign policy change to a single framework applicable to the EU context, providing readers with a toolbox to both explain the process of change and measure the policy change that follows. The framework is developed through an investigation of two important EU foreign policy change episodes, taking place after the Arab uprisings and the Ukraine conflict, and test-driven in three recent cases of EU foreign policy change after crisis. The volume presents a novel typology of EU foreign policy change, advancing on the fields of foreign policy analysis, public policy studies and International Relations. In doing so, it explains both the decision-making process leading to policy change, and the variation in change outcomes following this process. Further to offering those researching the EU foreign policy response to crisis with timely and empirically rich accounts of five recent change episodes, this book adds to the literature by suggesting two forms of EU foreign policy change, symbolic change and constructive ambiguity, which unlike previously argued form frequent and important outcomes of the decision-making process. -- .
Security and Loss Prevention: An Introduction, Seventh Edition, provides introductory and advanced information on the security profession. Security expert, Phil Purpura, CPP, includes updates on security research, methods, strategies, technologies, laws, issues, statistics and career options, providing a comprehensive and interdisciplinary book that draws on many fields of study for concepts, strategies of protection and research. The book explains the real-world challenges facing security professionals and offers options for planning solutions. Linking physical security with IT security, the book covers internal and external threats to people and assets and private and public sector responses and issues. As in previous editions, the book maintains an interactive style that includes examples, illustrations, sidebar questions, boxed topics, international perspectives and web exercises. In addition, course instructors can download ancillaries, including an instructor's manual with outlines of chapters, discussion topics/special projects, essay questions, and a test bank and PowerPoint presentation for each chapter.
Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues
- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.
1. Learn best practices for every facet of management 2. Learn what type of leader you need to be to succeed 3. Maximize employee engagement and retention among staff 4. Develop your staff's talent to full potential 5. Learn where the future of management is headed
This book deals with the evolution, current status and potential of U.S.-India strategic cooperation. From very modest beginnings, the U.S.-India strategic partnership has developed significantly over the last decade. In considerable part, this growth has stemmed from overlapping concerns about the rise and assertiveness of the People's Republic of China, as well as the instability of Pakistan. Despite the emergence of this partnership, significant differences remain, some of which stem from Cold War legacies, others from divergent global strategic interests and institutional design. In spite of these areas of discord, the overall trajectory of the relationship appears promising. Increased cooperation and closer policy coordination underscore a deepening of the relationship, while fundamental differences in national approaches to strategic challenges demand flexibility and compromise in the future. -- .
Outlines risk assessments in which threats and vulnerabilities are calculated with probabilities to determine risk Presents how to establish a security plan, and, in this, how to determine the best deployment of various layers of control to mitigate risks Offers an overview of budgeting-determining, advocating for, and implementing the security program based on allotted funding Details how to document policies into a security manual, training manual, emergency procedures manual, and incident action plan Provides the ins and outs of staffing including scheduling, wages, deployment, and contract security Examines training best practices including physical security, emergency response and procedures, as well as specialized topics such as use of force and patrol procedures Explains prostitution and human trafficking, presenting sections with a focus on awareness and prevention
* Structured approach from fundamental knowledge to entanglements between the concepts and the business needs * Simple and straight to the point presentation with diagrams and figures to help the understanding * Key points to take into account to design and implement an audit strategy based on company size * An overarching book on audit providing links between the different ways to audit a company * No boring or complex audit technical knowledge nor IT technical knowledge * Historical backgrounds to demonstrate that if the digital wave is new however the underlying risks are not.
Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues
- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.
In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.
* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats
Covers fundamental concepts and framework of CPS Reviews CPS and construction project management Reviews CPS applications in construction sector Covers CPS and IoT integrated network Reviews challenges and security aspects of construction CPS
* Offers context while providing a coherent, applied overview of a wide range of suspect vulnerabilities and how to address them when interviewing * Serves as a practical guide to interviewing vulnerable suspects for both uniform police and detectives. * The only book on interviewing vulnerable suspects that includes the most up-to-date legal considerations and challenges of modern society
* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.
The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.
* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.
Design and Evaluation of Physical Security Systems, 2e, includes
updated references to security expectations and changes since 9/11.
The threat chapter includes references to new threat capabilities
in Weapons of Mass Destruction, and a new figure on hate crime
groups in the US. All the technology chapters have been reviewed
and updated to include technology in use since 2001, when the first
edition was published. Garcia has also added a new chapter that
shows how the methodology described in the book is applied in
transportation systems. College faculty who have adopted this text
have suggested improvements and these have been incorporated as
well. This second edition also includes some references to the
author's recent book on Vulnerability Assessment, to link the two
volumes at a high level.
Practical Aviation Security: Predicting and Preventing Future Threats, Third Edition is a complete guide to the aviation security system, from crucial historical events to the policies, policymakers, and major terrorist and criminal acts that have shaped the procedures in use today, as well as the cutting edge technologies that are shaping the future. This text equips readers working in airport security or other aviation management roles with the knowledge to implement effective security programs, meet international guidelines, and responsibly protect facilities or organizations of any size. Using case studies and practical security measures now in use at airports worldwide, readers learn the effective methods and the fundamental principles involved in designing and implementing a security system. The aviation security system is comprehensive and requires continual focus and attention to stay a step ahead of the next attack. Practical Aviation Security, Third Edition, helps prepare practitioners to enter the industry and helps seasoned professionals prepare for new threats and prevent new tragedies.
The office of county sheriff has existed in America since 1634. Between 1800 and 1960, families of the sheriff lived in or near the jail. All family members, young and old, worked alongside the lawman to fulfill the required duties, without additional pay. The "mom and pop" jail was truly a family business. After the middle of the 20th century, fewer families carried on this tradition as counties modernized and jails became professionalized. During an era when many women concentrated on hearth and home, thousands of women quietly and without pay served in law enforcement. They organized, administered, presented reports to county commissioners, prepared for inspections, comforted victims, disciplined unruly inmates, fought with escapees, rode shotgun with their husbands as backup, and raised children, tended gardens, and kept house. They risked their lives every day and some paid the ultimate price. This is their story.
Contemporary supply chains operate under the pressure of customer requirements, increasing price competition, sudden increases or decreases in demand, unforeseen obstacles and new threats. The right way to improve the functioning of the flow of material and accompanying information is not only the continuous collection of data but also their collection, analysis, inference and decision-making with the use of decision support systems, expert systems and artificial intelligence. Such procedures make it easier for logisticians not only to forecast processes but also to predict (forecast) and identify potential problems and facilitate the implementation of optimal modern solutions, paying attention to current trends in the supply chain market. An important issue that affects the quality, efficiency and availability (continuity) of the processes implemented within the supply chain is security. This is an area that is not clearly defined. This book uses theoretical and practical knowledge to define security in the supply chain as a state that gives a sense of certainty and guarantees the flow of material goods and services (in accordance with the 7w rule) as well as a smooth flow of information for the planning and management of logistics processes. Tools and instruments used to ensure the security of the supply chain contribute to the protection and survival in times of dangerous situations (threats) and adaptation to new conditions (susceptibility to unplanned situations). When analyzing the needs and structure of the 21st century supply chains, in the context of their security, it is impossible to ignore the problem of their digitization, which enables the determination of optimal routes and the anticipation of possible threats (crisis situations). Automatic data exchange between various departments of the company along the upper and lower part of the supply chain improves the functioning of the warehouse management through, among others, automation, robotization and pro-activity. It also contributes to efficient, good communication and market globalization. Automation also brings new, extremely attractive business models with regard to occupational safety, ergonomics and environmental protection. To meet the needs of creating modern supply chains, the book analyzes and presents current and future solutions that affect security and the continuity of supply chains.
In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.
The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises' advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today's age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security. |
You may like...
|