![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.
This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a "communication theory" book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.
Tourism security is an important part of both security management and tourism. Private security professionals and police departments in tourism cities, as well as hotels, major attractions, and theme parks, have all come to realize that tourism security and safety issues (often called tourism surety) are essential for industry survival and success. In Tourism Security, leading expert Peter Tarlow addresses a range of key issues in tourism safety and security. The book guides the reader through a study of tourism security themes and best practices. Topics include the relationship between tourism security and the economy, hotel and motel security, risk and crisis management, public places, transportation, and legal issues. The book also includes case studies of four popular tourist destinations. With each destination, an interview with a police or security representative is included-providing unique, in-depth insight to security concerns. Tourism Security is an invaluable resource for private security professionals, police departments that serve tourist destinations, and tourism professionals who work in hotels or convention centers, or at attractions, casinos, or events.
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build the capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff, and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now. From digital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to today's SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The SolarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. The book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds.
This book is a compilation of chapters on scientific work in novel and innovative reference that compiles interdisciplinary perspectives about diverse issues related with Industry 4.0 and smart cities in different ways, i.e., intelligent optimisation, industrial applications in the real world, social applications and technology applications with a different perspective about existing solutions. Chapters review research in improving optimisation in smart manufacturing, logistics of products and services, optimisation of different elements in the time and location, social applications to enjoy our life of a better way and applications that increase daily life quality. This book covers applications of Industry 4.0; applications to improve the life of the citizens in a smart city; and finally, welfare of the working-age population and their expectations in their jobs correlated with the welfare-work relationship.
Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the 'mailroom to the boardroom' follows the story of a young banker who moved into the internal auditing profession as part of the 'new breed', then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.
Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security.
Boko Haram analyzes the activities and atrocities of Nigeria's Jihadi terrorist group, Boko Haram, in the context of global religious fundamentalism and extremism. The book traces the early beginnings of the religious sect, the conversion of its leader to radical Islam in 2002, and the group's campaign of violence beginning in 2009 and continuing to the present. The group's attacks against a variety of targets are examined in detail as are their general tactics and strategies. The Nigerian government response is also examined in order to provide critical lessons to counterterrorism planners, policy and government officials, and scholars. The initial military response was hampered by capability and legislative constraints including a lack of arms and ammunition, a lack of modern counterterrorism equipment, training gaps, leadership issues, intelligence gaps, politicization of the conflict, and limited support to the Nigerian military by the international community. Boko Haram looks at the work that has been done thus far, and what work needs to continue, to make gains to combat, marginalize, and ultimately defeat Boko Haram and resolve the conflict facing Nigeria. Key features: Outlines the history of Boko Haram and its emergence in Nigeria Provides the latest developments on fundamentalism in Nigeria, the growth of Boko Haram and the government response Focuses on the attacks, attack methodology and targeting of Boko Haram, addressing best-practice countermeasures Examines Boko Haram's ties to other Islamist groups including ISIL/ISIS and others Details the importance for international cooperation in responding to Boko Haram's activities and threats. About the Author: Dr. Ona Ekhomu, CFE, CPP, CSP, PCI, CPOI was born in Irrua, Nigeria. He holds the PhD from University of Pittsburgh. A policy analyst and security expert, Ekhomu is Chairman Trans-World Security Systems Ltd. and Chairman School of Management and Security (Lagos, Nigeria). President of Trans-World Security Systems Inc. of Chicago, Illinois, USA, Ekhomu is also a lecturer in the Sociology Department of the University of Lagos, Nigeria. He is President of the Association of Industrial Security and Safety Operators of Nigeria; Africa Representative of the International Foundation for Protection Officers; and former Regional Vice-President (West and Central Africa) of ASIS International. Ekhomu is author of Kidnap: Face to Face with Death (2014) and Effective Personal & Corporate Security (2009).
Urban environments are prime targets for suicide bombings over the next decade. While the threat may be ever-present, measures are available that can empower law enforcement personnel to thwart attacks, or at least mitigate the effects by reducing casualties. Written by professionals with first-hand experience, Terrorist Suicide Bombings: Attack Interdiction, Mitigation, and Response helps first responders, law enforcement, and homeland security professionals grapple with this increasing threat, offering best practices in the field and lessons learned. Advance preparation The authors provide specific instructions on how to fortify possible suicide bombing targets, suggesting measures that-if implemented-will reduce casualties. They explain how suicide bombers operate and what weapons they are likely to employ. They also debunk common myths about suicide bombers that jeopardize successful interdiction. Actual case studies Including graphic photos depicting the aftermath of actual bombing scenes, the book projects the reader into the chaos of a bomb scene. Chapters describe what one encounters at a site immediately after a bombing and explain what each first responder should and should not do. Case studies throughout enhance the text, explaining why certain suicide bombings succeed while others fail. Psychological effects The book also explores how terrorists seek to exploit the media and describes government and media efforts to diffuse the bombers' self-promotion. A full chapter is devoted to post-traumatic stress disorder (PTSD), a condition that commonly affects many first responders. Finally, the book closes with recommendations aimed at helping law enforcement defend against suicide bombers.
Private companies are increasingly involved with the security of domestic violence victims. This has manifested in a number of ways, including private security companies working in partnership with domestic violence services, the proliferation of security-technology companies that seek a market within the domestic violence sector, and governments contracting private companies to provide security provision for victims. Private Security and Domestic Violence offers a world-first analysis of the risks and benefits of for-profit businesses engaging with a vulnerable and underprotected section of society. Based on original data gathered in Australia, this book provides internationally relevant insights on the dangers but also the potential benefits of increasing private sector involvement with victims of domestic abuse. It offers a unique crossover of the literature on private security, crime prevention and domestic violence. Aimed at scholars, policymakers, and frontline workers within the domestic violence sector, Private Security and Domestic Violence documents experimental new collaborations and partnerships between the private, community and governmental spheres and makes a case for the suitable regulatory solutions to be put in place to successfully manage private security involvement with domestic violence victims. By outlining the risks and the benefits of this new form of security provision and detailing a potential model of regulation, this book offers a pathway for improving how we provide for a chronically underprotected population. It will be of interest to criminology and criminal justice students and researchers engaged in studies of abuse, domestic violence, violent crime, victims and victimology, crime prevention, and security.
Private Security and the Investigative Process, Fourth Edition is fully updated and continues to provide complete coverage of the investigative process for private investigations by both individuals and in corporate security environments. This edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new information on case evaluation. Written by a recognized expert in security, criminal justice, ethics, and the law-with over three decades of experience-the updated edition of this popular text covers concepts and techniques that can be applied to a variety of investigations including fraud, insurance, private, and criminal. It details the collection and preservation of evidence, the handling of witnesses, surveillance techniques, background investigations, and report writing. The book reflects best practices and includes tips for ensuring accurate and reliable private sector security investigations. This new edition includes: A new section on career opportunities in paths in the investigative field A rundown of the leading security Industry associations and professional standards being published Added discussion of observational interviews include current protocols analyzing data Details of the current legal implications for security surveillance and practices Advances in technology to thwart crime and fraud in retail and other business settings An entirely new section on e-records from criminal and civil judgments Authoritative, yet accessible, this book is one of the only textbooks dedicated to the subject. It also serves as an important reference for private investigators and security professionals. Complete with numerous forms, checklists, and web exercises, it provides the tools and understanding required to conduct investigations that are professional, ethical, and effective.
Strategic Security will help security managers, and those aspiring to the position, to think strategically about their job, the culture of their workplace, and the nature of security planning and implementation. Security professionals tend to focus on the immediate (the urgent) rather than the important and essential-too often serving as "firefighters" rather than strategists. This book will help professionals consider their roles, and structure their tasks through a strategic approach without neglecting their career objectives. Few security management books for professionals in the field focus on corporate or industrial security from a strategic perspective. Books on the market normally provide "recipes," methods or guidelines to develop, plans, policies or procedures. However, many do so without taking into account the personal element that is supposed to apply these methods. In this book, the authors helps readers to consider their own career development in parallel with establishing their organisation security programme. This is fundamental to becoming, and serving as, a quality, effective manager. The element of considering career objectives as part-and-parcel to this is both unique to only this book and vital for long-term career success. The author delineates what makes strategic thinking different in a corporate and security environment. While strategy is crucial in the running of a company, the traditional attitude towards security is that it has to fix issues quickly and at low cost. This is an attitude that no other department would tolerate, but because of its image, security departments sometimes have major issues with buy-in and from top-management. The book covers the necessary level of strategic thinking to put their ideas into practice. Once this is achieved, the strategic process is explained, including the need to build the different steps into this process-and into the overarching business goals of the organisation-will be demonstrated. The book provides numerous hand-on examples of how to formulate and execute the strategic master plan for the organization. The authors draws on his extensive experience and successes to serve as a valuable resource to all security professionals looking to advance their careers in the field.
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book's primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.
This collection of cases from East Africa, contributed largely by locally-based authors, explores the increasing security governance phenomenon in the region: that is, the mix of state and non-state actors, including private entities, volunteer auxiliaries, homegrown vigilantes and gangs, and the relationship between police and communities. Local dynamics brought by globalization, liberalization, the new scramble for resource wealth, inequality, and international terrorism are observed in detail, superimposed upon the well-known development challenges, ethnopolitical divides, and patterns of government and security provision which continue to reflect their colonial past. This book raises both practical and theoretical ethical dilemmas of the increasing fragmentation of security functions within Uganda, Kenya, South Sudan, mainland Tanzania, and Zanzibar. It is a vital contribution to the "non-state," "plural policing" debates and is of both local and global relevance.
Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today's enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks. Key Features * Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned * Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies * Provides insight into the interaction and cross-dependencies between industry business models and industry-specific cloud computing security requirements
"The Professional Protection Officer, "eight edition(formerly titled "Protection Officer Training Manual") is the definitive reference and instructional text for career-oriented security officers in both the private and public sectors.The first edition of this titleoriginated with the birth of the International Foundation for Protection Officers (IFPO) in 1988, which has been using the book as the official text since that time.Each subsequent edition has brought new and enlightened information to the protection professional.The material in this new edition includes all of the subjects essential to training of protection professionals, and has been renamed to reflect new strategies, tactics, and trends in this dynamic field. The eighth edition of "The Professional Protection Officer"
contains 12 units and 45 chapterswritten by leading security
educators, trainers and consultants. It has served as the
definitive text for both students and professionals worldwide.This
new edition adds critical updates and fresh pedagogy, as well as
new diagrams, illustrations, and self-assessments. "The
Professional Protection Officer" is tailored to the training and
certification needs of today s protection professionals and proves
to be the most exciting and progressive edition yet
It is widely acknowledged that the size of the security industry has increased in virtually every country around the world, often eclipsing conventional police forces in personnel numbers and expenditures. Security providers differ from law enforcement officers in many ways, yet the nature of their crime reduction activities brings them into frequent contact with citizens, drawing to the forefront issues of training, professionalism and accountability. Unlike police officers, whose training and licensing standards are well established, regulations for security providers are often minimalist or entirely absent. This volume brings together research on regulatory regimes and strategies from around the globe, covering both the large private security sector and the expanding area of public sector 'non-police' protective security. It examines the nature and extent of licensing and monitoring, and the minimum standards imposed on the industry by governments across the world. The chapters in this book were originally published in the International Journal of Comparative and Applied Criminal Justice.
The service sector occupies a dominant position in the Japanese economy, yet few studies have looked at the way the industry developed. This book, first published in 1992, focuses on the growth and development of a major world security and communications corporation, SECOM. The success of the company has been rooted in the management strategies of Makoto Iida, who has shaped the company from a small localized business to an international industry at the forefront of innovation. The book first looks at the background of Makoto Iida, offering an insight into the nature of an entrepreneur and the issues this raises within the context of Japanese management styles. It then follows the company development stage by stage, assessing the importance of individual creativity in adapting and implementing traditional management techniques. It shows how strategies for human resources, service quality, new technology, globalization and corporate restructuring evolve within the context of a growing organization, and includes an analysis of the innovative marketing techniques and product development processes needed to sell security services to one of the world's safest countries.
The classic book "The Art of War" (or as it is sometimes
translated, "The Art of Strategy") by Sun Tzu is often used to
illustrate principles that can apply to the management of business
environments. "The Art of War for Security Managers" is the first
book to apply the time-honored principles of Sun Tzu's theories of
conflict to contemporary organizational security.
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.
"Analyzes health and hazard risk assessment in commercial, industrial, and refining industries. Emphasizes legal requirements, emergency planning and response, safety equipment, process implementation, and occupational and environmental protection exposure guidelines. Presents applicatoins and calculations for risk analysis of real systems, as well as numerous end-of-chapter examples and references."
The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations. Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing systems with the latest packs and patches. Written by two of Microsoft's top experts, this clear and concise manual demonstrates how to perform inventories of IT assets, test compatibility, target deployment, and evaluate management technologies. It also shows you how to create and implement your own deployment plans with recovery and remediation options, and how to recognize potential vulnerabilities.
Few people are better able to describe how to survive in a war zone than those who have seen, experienced, and lived it first-hand. Comprised of a collection of original stories from international contributors, Surviving the International War Zone: Security Lessons Learned and Stories from Police and Military Peacekeeping Forces contains true accounts of unimaginable scenarios that could only occur in war-torn and conflict-ridden areas. Presenting accounts written by military and police officers who lived in different dangerous regions across the world, the book offers an inside look at the lives of the officers and the local people living in the war zone environment. Covering many facets of daily life, the book helps readers understand how to survive in deadly terrain. With contributions from soldiers and law enforcement personnel from 13 different countries who have lived and served in Iraq, Afghanistan, Sudan, Bosnia, Kosovo, East Timor, Cambodia, Haiti, and Liberia, the book includes practical tips for day-to-day life in a war zone. It examines topics such as: Surviving extreme temperatures and staying healthy Interacting with the indigenous population and cultural awareness Adjusting to the challenges of limited technology and resources Protecting oneself from the imminent threat of violence that is present in all war-torn regions Enhanced with photographs from the war zone, the stories in this volume range from accounts of unspeakable torture, to descriptions of deplorable living conditions, to moments of humor. Some of the stories will make you laugh; others may make you cry. Ultimately, the book provides an unparalleled insight into the full range of deep-seated and sometimes conflicting emotions of the people who have lived and served in war zones and have come home to tell about it.
This book deals with the evolution, current status and potential of U.S.-India strategic cooperation. From very modest beginnings, the U.S.-India strategic partnership has developed significantly over the last decade. In considerable part, this growth has stemmed from overlapping concerns about the rise and assertiveness of the People's Republic of China, as well as the instability of Pakistan. Despite the emergence of this partnership, significant differences remain, some of which stem from Cold War legacies, others from divergent global strategic interests and institutional design. In spite of these areas of discord, the overall trajectory of the relationship appears promising. Increased cooperation and closer policy coordination underscore a deepening of the relationship, while fundamental differences in national approaches to strategic challenges demand flexibility and compromise in the future. -- .
In this provocative and thoughtful book, Amy Zegart challenges the
conventional belief that national security agencies work reasonably
well to serve the national interest as they were designed to do.
Using a new institutionalist approach, Zegart asks what forces
shaped the initial design of the Central Intelligence Agency, the
Joint Chiefs of Staff, and the National Security Council in ways
that meant they were handicapped from birth. |
![]() ![]() You may like...
Advanced Relational Programming
Filippo Cacace, Gianfranco Lamperti
Hardcover
R3,428
Discovery Miles 34 280
Advances in Object-oriented Database…
Asuman Dogac, Alexandros Biliris, …
Hardcover
R2,625
Discovery Miles 26 250
Enterprise Big Data Engineering…
Martin Atzmueller, Samia Oussena, …
Hardcover
R5,590
Discovery Miles 55 900
New Perspectives Microsoft (R)Office 365…
Mark Shellman, Sasha Vodnik
Paperback
Database Systems: The Complete Book…
Hector Garcia-Molina, Jeffrey Ullman, …
Paperback
R2,849
Discovery Miles 28 490
Inside Relational Databases
Mark Whitehorn, Bill Marklyn
Paperback
|