0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (193)
  • R250 - R500 (589)
  • R500+ (5,149)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Securing Cyber-Physical Systems (Paperback): Al-Sakib Khan Pathan Securing Cyber-Physical Systems (Paperback)
Al-Sakib Khan Pathan
R1,495 Discovery Miles 14 950 Ships in 10 - 15 working days

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.

Cybercrime Investigations - A Comprehensive Resource for Everyone (Hardcover): John Bandler, Antonia Merzon Cybercrime Investigations - A Comprehensive Resource for Everyone (Hardcover)
John Bandler, Antonia Merzon
R3,809 Discovery Miles 38 090 Ships in 10 - 15 working days

Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. It provides helpful background material about cybercrime's technological and legal underpinnings, plus in-depth detail about the legal and practical aspects of conducting cybercrime investigations. Key features of this book include: Understanding cybercrime, computers, forensics, and cybersecurity Law for the cybercrime investigator, including cybercrime offenses; cyber evidence-gathering; criminal, private and regulatory law, and nation-state implications Cybercrime investigation from three key perspectives: law enforcement, private sector, and regulatory Financial investigation Identification (attribution) of cyber-conduct Apprehension Litigation in the criminal and civil arenas. This far-reaching book is an essential reference for prosecutors and law enforcement officers, agents and analysts; as well as for private sector lawyers, consultants, information security professionals, digital forensic examiners, and more. It also functions as an excellent course book for educators and trainers. We need more investigators who know how to fight cybercrime, and this book was written to achieve that goal. Authored by two former cybercrime prosecutors with a diverse array of expertise in criminal justice and the private sector, this book is informative, practical, and readable, with innovative methods and fascinating anecdotes throughout.

Blockchain Technology for IoT Applications (Hardcover, 1st ed. 2021): Seok-Won Lee, Irish Singh, Masoud Mohammadian Blockchain Technology for IoT Applications (Hardcover, 1st ed. 2021)
Seok-Won Lee, Irish Singh, Masoud Mohammadian
R4,245 Discovery Miles 42 450 Ships in 18 - 22 working days

This book explores recent advances in the Internet of things (IoT) via advanced technologies and provides an overview of most aspects which are relevant for advance secure, distributed, decentralized blockchain technology in the Internet of things, their applications, and industry IoT. The book provides an in-depth analysis of the step-by-step evolution of IoT to create a change by enhancing the productivity of industries. It introduces how connected things, data, and their communication (data sharing) environment build a transparent, reliable, secure environment for people, processes, systems, and services with the help of blockchain technology.

Evolution in Computational Intelligence - Proceedings of the 9th International Conference on Frontiers in Intelligent... Evolution in Computational Intelligence - Proceedings of the 9th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2021) (Hardcover, 1st ed. 2022)
Vikrant Bhateja, Jinshan Tang, Suresh Chandra Satapathy, Peter Peer, Ranjita Das
R5,927 Discovery Miles 59 270 Ships in 18 - 22 working days

This book presents the proceedings of the 9th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2021), held at NIT Mizoram, Aizwal, Mizoram, India, during June 25 - 26, 2021. FICTA conference aims to bring together researchers, scientists, engineers, and practitioners to exchange their new ideas and experiences in the domain of intelligent computing theories with prospective applications to various engineering disciplines. This volume covers broad areas of Evolution in Computational Intelligence. The conference papers included herein presents both theoretical as well as practical aspects of different areas like ANN and genetic algorithms, human-computer interaction, intelligent control optimization, evolutionary computing, intelligent e-learning systems, machine learning, mobile computing, multi-agent systems, etc. The volume will also serve as a knowledge centre for students of post-graduate level in various engineering disciplines.

Cloud Security Auditing (Hardcover, 1st ed. 2019): Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily,... Cloud Security Auditing (Hardcover, 1st ed. 2019)
Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, …
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers' views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well. This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime. Many companies nowadays leverage cloud services for conducting major business operations (e.g., Web service, inventory management, customer service, etc.). However, the fear of losing control and governance still persists due to the inherent lack of transparency and trust in clouds. The complex design and implementation of cloud infrastructures may cause numerous vulnerabilities and misconfigurations, while the unique properties of clouds (elastic, self-service, multi-tenancy) can bring novel security challenges. In this book, the authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants' trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactive auditing and novel (runtime and proactive) auditing techniques to serve different stakeholders in the cloud. This book covers security threats from different cloud abstraction levels and discusses a wide-range of security properties related to cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO 27017). It also elaborates on the integration of security auditing solutions into real world cloud management platforms (e.g., OpenStack, Amazon AWS and Google GCP). This book targets industrial scientists, who are working on cloud or security-related topics, as well as security practitioners, administrators, cloud providers and operators.Researchers and advanced-level students studying and working in computer science, practically in cloud security will also be interested in this book.

Cybersecurity Fundamentals - A Real-World Perspective (Hardcover): Kutub Thakur, Al-Sakib Khan Pathan Cybersecurity Fundamentals - A Real-World Perspective (Hardcover)
Kutub Thakur, Al-Sakib Khan Pathan
R6,060 Discovery Miles 60 600 Ships in 10 - 15 working days

Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. This book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step-by-step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with this book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security, and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of this book.

ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24,... ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings (Hardcover, 1st ed. 2021)
Audun Josang, Lynn Futcher, Janne Hagen
R3,858 Discovery Miles 38 580 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management. *The conference was held virtually.

Artificial Intelligence in a Throughput Model - Some Major Algorithms (Hardcover): Waymond Rodgers Artificial Intelligence in a Throughput Model - Some Major Algorithms (Hardcover)
Waymond Rodgers
R5,338 Discovery Miles 53 380 Ships in 10 - 15 working days

Physical and behavioral biometric technologies such as fingerprinting, facial recognition, voice identification, etc. have enhanced the level of security substantially in recent years. Governments and corporates have employed these technologies to achieve better customer satisfaction. However, biometrics faces major challenges in reducing criminal, terrorist activities and electronic frauds, especially in choosing appropriate decision-making algorithms. To face this challenge, new developments have been made, that amalgamate biometrics with artificial intelligence (AI) in decision-making modeling. Advanced software algorithms of AI, processing information offered by biometric technology, achieve better results. This has led to growth in the biometrics technology industry, and is set to increase the security and internal control operations manifold. This book provides an overview of the existing biometric technologies, decision-making algorithms and the growth opportunity in biometrics. The book proposes a throughput model, which draws on computer science, economics and psychology to model perceptual, informational sources, judgmental processes and decision choice algorithms. It reviews how biometrics might be applied to reduce risks to individuals and organizations, especially when dealing with digital-based media.

Writing Security Tools and Exploits (Paperback): James Foster Writing Security Tools and Exploits (Paperback)
James Foster
R1,129 Discovery Miles 11 290 Ships in 10 - 15 working days

Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book.
The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
* Provides readers with working code to develop and modify the most common security tools including Nmap and Nessus
* Learn to reverse engineer and write exploits for various operating systems, databases, and applications
* Automate reporting and analysis of security log files

CISO COMPASS - Navigating Cybersecurity Leadership Challenges with Insights from Pioneers (Paperback): Todd Fitzgerald CISO COMPASS - Navigating Cybersecurity Leadership Challenges with Insights from Pioneers (Paperback)
Todd Fitzgerald
R1,554 Discovery Miles 15 540 Ships in 10 - 15 working days

#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.

Trust and Technology in a Ubiquitous Modern Environment - Theoretical and Methodological Perspectives (Hardcover): Trust and Technology in a Ubiquitous Modern Environment - Theoretical and Methodological Perspectives (Hardcover)
R4,595 Discovery Miles 45 950 Ships in 18 - 22 working days

In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives provides a variety of theoretical perspectives on the topics of trust and technology, as well as some empirical investigations into the trust-building, trust-maintenance, and trust-destroying practices in the context of technology. It presents research positioned at the intersection of the issues of trust within and between individuals, and organizations, and technology under various guises, for example, high-tech work environments, computer-mediated communication, and the Internet as a business environment.

Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised... Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers (Hardcover, 1st ed. 2020)
Gilbert Peterson, Sujeet Shenoi
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the sixteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of sixteen edited papers from the Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India, in the winter of 2020. Advances in Digital Forensics XVI is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Fundamentals of Computer Security (Hardcover, 2003 ed.): Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry Fundamentals of Computer Security (Hardcover, 2003 ed.)
Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
R2,587 Discovery Miles 25 870 Ships in 10 - 15 working days

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.

IT Convergence and Security - Proceedings of ICITCS 2021 (Hardcover, 1st ed. 2021): Hyuncheol Kim, Kuinam J. Kim IT Convergence and Security - Proceedings of ICITCS 2021 (Hardcover, 1st ed. 2021)
Hyuncheol Kim, Kuinam J. Kim
R8,770 Discovery Miles 87 700 Ships in 18 - 22 working days

This book comprises the proceedings of ICITCS 2021. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security are core to most current research, industrial, and commercial activities. Topics covered in this book include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, health care and wellness, web technology and applications, Internet of things, and security & privacy. Through this book, readers gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book is of use to researchers in academia, industry, and other research institutes focusing on IT convergence and security.

Blockchain, Law and Governance (Hardcover, 1st ed. 2021): Benedetta Cappiello, Gherardo Carullo Blockchain, Law and Governance (Hardcover, 1st ed. 2021)
Benedetta Cappiello, Gherardo Carullo
R4,643 Discovery Miles 46 430 Ships in 10 - 15 working days

This volume explores from a legal perspective, how blockchain works. Perhaps more than ever before, this new technology requires us to take a multidisciplinary approach. The contributing authors, which include distinguished academics, public officials from important national authorities, and market operators, discuss and demonstrate how this technology can be a driver of innovation and yield positive effects in our societies, legal systems and economic/financial system. In particular, they present critical analyses of the potential benefits and legal risks of distributed ledger technology, while also assessing the opportunities offered by blockchain, and possible modes of regulating it. Accordingly, the discussions chiefly focus on the law and governance of blockchain, and thus on the paradigm shift that this technology can bring about.

Secure Electronic Voting (Hardcover, 2003 ed.): Dimitris A. Gritzalis Secure Electronic Voting (Hardcover, 2003 ed.)
Dimitris A. Gritzalis
R2,777 Discovery Miles 27 770 Ships in 18 - 22 working days

Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting systems. The chapters identify and describe the given capabilities and the strong limitations, as well as the current trends and future perspectives of electronic voting technologies, with emphasis in security and privacy. Secure Electronic Voting includes state-of-the-art material on existing and emerging electronic and Internet voting technologies, which may eventually lead to the development of adequately secure e-voting systems. This book also includes an overview of the legal framework with respect to voting, a description of the user requirements for the development of a secure e-voting system, and a discussion on the relevant technical and social concerns. Secure Electronic Voting includes, also, three case studies on the use and evaluation of e-voting systems in three different real world environments.

Psychology and Law in Europe - When West Meets East (Paperback): Par-Anders Granhag, Ray Bull, Alla Shaboltas, Elena Dozortseva Psychology and Law in Europe - When West Meets East (Paperback)
Par-Anders Granhag, Ray Bull, Alla Shaboltas, Elena Dozortseva
R1,139 Discovery Miles 11 390 Ships in 10 - 15 working days

Offering carefully curated articles from the European Association of Psychology and Law (EAPL), this book features chapters from a truly international group of scholars. This text is the first of its kind to offer insights into current developments in psychology and law in Russia. The field of psychology and law has a very long and strong tradition in Russia, but very little is known, as Russian scholars rarely publish their works in English. The volume also contains state-of-the-art chapters on topics at the very core of psychology and law, including offender profiling, lie detection, crime linking, false memories, and witness interviewing. Features Provides rare insight into Russian history of forensic and criminal psychology Covers core topics in the discipline Offers international scope from a diverse array of contributors Psychology and Law in Europe: When West Meets East is a text of interest for students of psychology, law, or criminal justice, as well as scholars and practitioners in the field. This text offers a window into global advances in psychology and law.

Urbanization, Policing, and Security - Global Perspectives (Paperback): Gary Cordner, AnnMarie Cordner, Dilip K Das Urbanization, Policing, and Security - Global Perspectives (Paperback)
Gary Cordner, AnnMarie Cordner, Dilip K Das
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

In terms of raw numbers, the amount of world urban dwellers have increased four-fold, skyrocketing from 740 million in 1950 to almost 3.3 billion in 2007. This ongoing urbanization will continue to create major security challenges in most countries. Based on contributions from academics and practitioners from countries as diverse as Nigeria, Pakistan, Azerbaijan, and the US, Urbanization, Policing, and Security: Global Perspectives highlights the crime and disorder problems associated with urbanization and demonstrates police and private security responses to those problems. Examines responses to urban problems The book draws on the practical experiences of police officials and the academic insights of researchers from around the world to detail the consequences of urbanization - crime, terrorism, disorder, drugs, traffic crashes - as well as modern responses to those problems. Covering studies on major cities in more than 18 countries, this text explores topics such as the role of urbanization in security and global concerns including transnational crime, racial profiling, and information sharing. The book also examines responses to urban problems associated with police and security, including human rights activism and police reform. The tools to devise sophisticated solutions The problems confronting policing in these times are quite daunting, providing plenty of challenges for police leaders and requiring them to devise increasingly sophisticated solutions. With more than 100 photos and illustrations, the book tackles issues from a different angle. It examines the resources required to solve problems and those necessary to build a knowledge base of policing and the professionalism for police forces.

Retail Security and Loss Prevention Solutions (Paperback): Alan Greggo, Millie Kresevich Retail Security and Loss Prevention Solutions (Paperback)
Alan Greggo, Millie Kresevich
R1,134 Discovery Miles 11 340 Ships in 10 - 15 working days

Employee theft amounts to roughly $36.6 billion retail dollars lost annually, according to a 2008 National Retail Security Survey, and accounts for approximately 42.7 % of all retail losses. Each year organizations spend millions of dollars on theft detection/prevention devices yet still incur losses at the hands of their own employees; begging the question not of how theft occurs, but why. Discussing the concept of the Theft Triangle (opportunity, motivation, and insufficient deterrents), Retail Security and Loss Prevention Solutions investigates motivational factors that contribute to loss and describes philosophies that can change the entire spectrum of employee dishonesty. It cites the revolutionary approach adopted by the New York Subway System, demonstrating that by changing the overall presentation of the business and contending with the factors preceding the crime, the crime itself can be avoided. As the title "Loss Prevention Professional" implies, the intention is to stop the damage before it occurs. To this end, chapters discuss behaviors that precede a loss event, theoretical perspectives and research on employee deviance and motivation, and methods to control employee dishonesty through deterrents as well as ethical infrastructures. Detailing the intricacies of the Loss Prevention Profession and the myriad skills involved such as accounting, forensics, fraud detection, human behavior analysis, and interview/interrogation skills, the authors give advice on how to select the right individuals for the job and how to build a Loss Prevention department. They employ real life case studies and interviews and discuss the problems and solutions for the future of loss prevention as a whole.

Police Corruption - Preventing Misconduct and Maintaining Integrity (Paperback): Tim Prenzler Police Corruption - Preventing Misconduct and Maintaining Integrity (Paperback)
Tim Prenzler
R1,583 Discovery Miles 15 830 Ships in 10 - 15 working days

While many police officers undertake their work conforming to the highest ethical standards, the fact remains that unethical police conduct continues to be a recurring problem around the world. With examples from a range of jurisdictions, Police Corruption: Preventing Misconduct and Maintaining Integrity examines the causes of police misconduct and explores applied strategies designed to maximize ethical conduct and identify and prevent corruption. Analyzes the roots of corruption Introducing the phenomenon of police officer misconduct, the book provides an analysis of unethical behavior, its effects, and different causal factors. The author examines the impact on the community and the police themselves, the dilemma of establishing universal ethical principles, and ways of identifying and measuring misconduct problems. The remainder of the text examines applied strategies designed to maximize ethical conduct and prevent corruption. A myriad of proven strategies Exploring a wide range of approaches, the book discusses best practices in the recruitment of ethical applicants, strategies for dealing with misconduct, risk reduction strategies and early warning and intervention systems, along with advanced strategies such as drug and alcohol testing, integrity tests, and the use of covert surveillance. The text also explores the role of independent external oversight bodies that audit police strategies and conduct their own investigation. The final chapter on ethical leadership emphasizes the need to go beyond a checklist of rules with leadership that values, requires, and models integrity in all aspects of police work. Examples from around the world Taking a global approach, this volume recognizes that policing is prone to the same potential problems of corruption and misconduct everywhere in the world. Highlighting

Financial Crimes - A Threat to Global Security (Paperback): Maximilian Edelbacher, Peter Kratcoski, Michael Theil Financial Crimes - A Threat to Global Security (Paperback)
Maximilian Edelbacher, Peter Kratcoski, Michael Theil
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions. Nevertheless, organized crime, white-collar crime, and corruption have a huge impact on financial systems worldwide and must also be confronted if true reform is to be achieved. A collection of articles written by experts in their fields of study, Financial Crimes: A Threat to Global Security spotlights the importance of addressing the problem of illegal financial activity as part of a greater comprehensive plan for reforming the financial sector. Drawn from the 23rd Annual Meeting of the Academic Council on the United Nations System (ACUNS) held in Vienna, the book explores the major themes discussed at this elite symposium. In the first section, the contributors examine changing concepts in security over the course of history and across nations. They discuss how an event in Austria led to the implementation of a new security philosophy that is now followed by the majority of the European Union. The book examines the diverse models of preventing security threats that have grown from that idea as well as the gradual expansion of the role of the security council of the United Nations. The next section analyzes the present state of security worldwide and examines the wide array of criminal activity that plagues the financial sector. Expert contributors reveal methods to identify certain types of behavior and criminals as well as efforts to combat illegal activity-including the role of the media. The final section investigates alternative approaches to preventing another worldwide financial disaster through investigative reporting, human factors analysis, legislative initiatives, and other methods. Filled with insight from international experts, the book highlights both the warning signs to illegal activity as well as the mos

Practical Handbook for Professional Investigators (Paperback, 3rd edition): Randy Dickson, Rory J.  McMahon, CLI, CFE Practical Handbook for Professional Investigators (Paperback, 3rd edition)
Randy Dickson, Rory J. McMahon, CLI, CFE
R1,598 Discovery Miles 15 980 Ships in 10 - 15 working days

An increase in fraud cases has escalated government accountability and corporate oversight, and media attention on cases ranging from missing persons to white-collar crime has increased the visibility of professional investigators. This has resulted in a great source of increased work for the profession. The third edition of Practical Handbook for Professional Investigators continues to supply an up-to-date, nuts-and-bolts learning tool for students and an everyday reference for investigative professionals at all levels. More relevant than ever, this edition adds two new chapters on death and terrorism investigations and several new sections, including: Insurance fraud, fire and arson investigation, and liability claims investigation Indicators of online marital infidelity Obtaining governmental records to locate people and sample reports for skip tracing Practical considerations for surveillance and procedures for interception of wire or oral communications Service of subpoenas for witnesses in federal courts Testifying in court-including witness and evidence preparation, trial tactics used by attorneys, and an investigator's rights as a witness The Rules of Professional Conduct Niche markets in the investigative industry Managing and marketing an investigative practice, running a paperless office, and customer retention An unparalleled guide to the ins and outs of private investigation, Practical Handbook for Professional Investigators, Third Edition belongs on the shelf of every professional and trainee. Rory McMahon appeared on Al Jazeera America to discuss his new investigation company, The Grafton Group.

Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Paperback): S. Caroline Taylor, Daniel Joseph... Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Paperback)
S. Caroline Taylor, Daniel Joseph Torpy, Dilip K Das
R1,558 Discovery Miles 15 580 Ships in 10 - 15 working days

The movement of humans across borders is increasing exponentially-some for benign reasons, others nefarious, including terrorism, human trafficking, and people smuggling. Consequently, the policing of human movement within and across borders has been and remains a significant concern to nations. Policing Global Movement: Tourism, Migration, Human Trafficking, and Terrorism explores the nature of these challenges for police, governments, and citizens at large. Drawn from keynote and paper presentations at a recent International Police Executive Symposium meeting in Malta, the book presents the work of scholars and practitioners who analyze a variety of topics on the cutting edge of global policing, including: Western attempts to reform the policing of sex tourists in the Philippines and Gambia Policing the flow of people and goods in the port of Rotterdam Policing protestors and what happened at the 2010 G20 Summit in Toronto Mexico's use of the military in its war against drug trafficking Public-private cooperation in the fight against organized crime and terrorism in Australia Recommendations for police reform in Afghanistan Sweden's national counterterrorism unit Treatment of asylum seekers in a privately run detention center in South Africa The policing of human trafficking for the sex trade in sub-Saharan Africa, Vietnam, Australia, and Andhra Pradesh, India Examining areas of increasing concern to governments and citizens around the world, this timely volume presents critical international perspectives on these ongoing global challenges that threaten the safety of humans worldwide.

State Fragility Around the World - Fractured Justice and Fierce Reprisal (Paperback): Laurie A Gould, Matthew Pate State Fragility Around the World - Fractured Justice and Fierce Reprisal (Paperback)
Laurie A Gould, Matthew Pate
R1,138 Discovery Miles 11 380 Ships in 10 - 15 working days

Failed and fragile states often govern through the criminalization of otherwise inconsequential or tolerated acts. These weak states also frequently use kidnapping, murder, and other violent or oppressive tactics to maintain order and stay in power. State Fragility Around the World: Fractured Justice and Fierce Reprisal analyzes the path to state failure, one manifestation of which appears through the fragility and dysfunction of its criminal justice system. This book examines what happens when a government loses the ability, or will, to provide basic goods and services to its constituents. Acknowledging the tremendous variability of failed and fragile states, the case studies and analyses contained in this book suggest the existence of functional and structural attributes common across most state systems. The authors explore the plights of various states in which key elements related to their criminal justice systems are weak or fragile. States under examination include Mexico, Afghanistan, Iran, Syria, and Georgia. Special attention is given to Somalia, Sudan, and South Sudan, which serve as examples of what happens to a state that fails in virtually all aspects of governance. Using a unique approach, State Fragility Around the World articulates a specific method for assessing relative state fragility. Using this method, natural groupings of relative fragility and stability evolve, providing an unprecedented way to compare social phenomena and functionality across national and regional borders. Readers will also gain a deeper understanding of what it means to be a fragile state as well as how state fragility affects core freedoms, the criminal justice process, and mechanisms of punishment.

Security within CONASENSE Paragon (Hardcover): Ramjee Prasad, Leo P. Ligthart Security within CONASENSE Paragon (Hardcover)
Ramjee Prasad, Leo P. Ligthart
R2,852 Discovery Miles 28 520 Ships in 10 - 15 working days

Security within CONASENSE Paragon describes in particular the cyber security issues in the field of Communication, Navigation, Sensing and Services within the broad platform of CTIF Global Capsule (CGC). This covers future technologies and its enablers, smart cities, crowd computing, reliable and secure communication interface, satellite unnamed air vehicles, wireless sensor networks, data analytics and deep learning, remotely piloted aircraft system and public safety, network neutrality, business ecosystem innovation and so on.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,416 Discovery Miles 94 160
Guide to Computer Forensics and…
Amelia Phillips, Bill Nelson, … Paperback R1,345 R1,248 Discovery Miles 12 480
Application of Big Data for National…
Babak Akhgar, Gregory B Saathoff, … Paperback R1,382 Discovery Miles 13 820
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R11,427 Discovery Miles 114 270
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310

 

Partners