0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (31)
  • R500+ (403)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

The Enforcers - Inside Cape Town's Deadly Nightclub Battles (Paperback): Caryn Dolley The Enforcers - Inside Cape Town's Deadly Nightclub Battles (Paperback)
Caryn Dolley 1
R295 R236 Discovery Miles 2 360 Save R59 (20%) Ships in 5 - 10 working days

Here is the Cape Town underworld laid bare, explored through the characters who control the protection industry, the bouncers and security at nightclubs and strip clubs.

At the centre of this turf war is Nafiz Modack, the latest kingpin to have seized control of the industry, a man often in court on various charges, including extortion. Investigative journalist Caryn Dolley has followed Modack and his predecessors for six years as power has shifted in the nightclub security industry, and she focuses on how closely connected the criminal underworld is with the police services. In this suspenseful page turner of an investigation, she writes about the overlapping of the state with the underworld, the underworld with the upperworld, and how the associated violence is not confined to specific areas of Cape Town, but is happening inside hospitals, airports, clubs and restaurants and putting residents at risk.

A book that lays bare the myth that violence and gangsterism in Cape Town is confined to the ganglands of the Cape Flats, wherever you find yourself, you’re only a hair’s breadth away from the enforcers.

Tell Me Everything - The Story of a Private Investigation (Paperback): Erika Krouse Tell Me Everything - The Story of a Private Investigation (Paperback)
Erika Krouse
R505 R433 Discovery Miles 4 330 Save R72 (14%) Ships in 10 - 15 working days
Multllinguallsm, the Judicial Authority and Security Services - Belgium, Europe, South Africa, Southern Africa (Paperback): Kas... Multllinguallsm, the Judicial Authority and Security Services - Belgium, Europe, South Africa, Southern Africa (Paperback)
Kas Deprez, Theo du Plessis, Lut Teck
R590 R546 Discovery Miles 5 460 Save R44 (7%) Ships in 7 - 10 working days

This work deals with international principles regarding the use of language in the administration of justice, and looks at the way in which multilingual countries such as Belgium and Switzerland approach this complex problem. The title then compares language practice in the judiciary and security services in South Africa and some countries of the Southern African Development Community against the background of evolving language policy in the region. This title discusses the use of official languages in a specific domain of government from the point of view that a language cannot be regarded as official simplu because a constitution prescribes it. Important conclusions are drawn regarding the role of the multilingual state.

Machine See, Machine Do - How Technology Mirrors Bias in Our Criminal Justice System (Hardcover): Patrick K Lin Machine See, Machine Do - How Technology Mirrors Bias in Our Criminal Justice System (Hardcover)
Patrick K Lin
R741 R622 Discovery Miles 6 220 Save R119 (16%) Ships in 10 - 15 working days
Silent Weapons for Quiet Wars - An Introductory Programming Manual (Hardcover): Anonymous Silent Weapons for Quiet Wars - An Introductory Programming Manual (Hardcover)
Anonymous
R643 R533 Discovery Miles 5 330 Save R110 (17%) Ships in 10 - 15 working days
Journalism and the Nsa Revelations - Privacy, Security and the Press (Hardcover): Adrienne Russell, Risto Kunelius, Heikki... Journalism and the Nsa Revelations - Privacy, Security and the Press (Hardcover)
Adrienne Russell, Risto Kunelius, Heikki Heikkila, Dmitry Yagodin
R3,289 Discovery Miles 32 890 Ships in 12 - 17 working days

Edward Snowden's revelations about the mass surveillance capabilities of the US National Security Agency (NSA) and other security services triggered an ongoing debate about the relationship between privacy and security in the digital world. This discussion has been dispersed into a number of national platforms, reflecting local political realities but also raising questions that cut across national public spheres. What does this debate tell us about the role of journalism in making sense of global events? This book looks at discussions of these debates in the mainstream media in the USA, United Kingdom, France, Germany, Russia and China. The chapters focus on editorials, commentaries and op-eds and look at how opinion-based journalism has negotiated key questions on the legitimacy of surveillance and its implications to security and privacy. The authors provide a thoughtful analysis of the possibilities and limits of 'transnational journalism' at a crucial time of political and digital change.

Emergency Notification (Hardcover): Robert C. Chandler Emergency Notification (Hardcover)
Robert C. Chandler
R1,606 Discovery Miles 16 060 Ships in 10 - 15 working days

This text provides critical information to help organizations improve their emergency communications, including the tools, automation technology, and processes of crisis notification. To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain the situation, campus personnel need to communicate immediately and efficiently, not only with the students, faculty, and staff, but also the local police, federal law enforcement, and media. Effective emergency notification makes things "right," it allows the right message to reach the right people at the right time—facilitating the right response. Emergency Notification explains how. This book offers must-know information for business security, senior management, human resources staff, government policymakers, and emergency planners, examining what, when, how, why, and with whom to communicate during crises. This text also covers risk communication, message mapping, information loading, audience comprehension, and practical issues like testing emergency notification systems.

Patriotic Information Systems (Hardcover): Todd Loendorf, G.David Garson Patriotic Information Systems (Hardcover)
Todd Loendorf, G.David Garson
R2,674 Discovery Miles 26 740 Ships in 12 - 17 working days

Database technology can be used for various ends, ranging from promotion of democracy to strengthening of nationalism to shoring up authoritarian regimes through misinformation. Its use affects every layer of society: from individuals to households to local governments, and is a consuming issue in the United States Governments stance on privacy, security, and technology.

Technology Development for Security Practitioners (Hardcover, 1st ed. 2021): Babak Akhgar, Dimitrios Kavallieros, Evangelos... Technology Development for Security Practitioners (Hardcover, 1st ed. 2021)
Babak Akhgar, Dimitrios Kavallieros, Evangelos Sdongos
R2,872 Discovery Miles 28 720 Ships in 10 - 15 working days

This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com

Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management Association Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,982 Discovery Miles 99 820 Ships in 10 - 15 working days
Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management Association Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,978 Discovery Miles 99 780 Ships in 10 - 15 working days
Secure Electronic Transactions - Introduction and Technical Reference (Hardcover): Larry Loeb Secure Electronic Transactions - Introduction and Technical Reference (Hardcover)
Larry Loeb
R2,152 Discovery Miles 21 520 Ships in 10 - 15 working days

This detailed volume and accompanying CD-ROM focus on the set electronic transaction (SET) system and review the fundamentals through to practical instruction on how to develop and implement the entire SET system. Topics addressed include: electronic commerce and the various payment and security systems that have led to online credit card commerce; cryptographic extensions utilized by the SET system; and the technical details behind SET, from purchase initiation, through certificate management, to data transport protocols. Actual programming examples and computer code to construct and roll out the SET system are also included. The book should be of interest to business executives as well as engineers.

Private Security and the Investigative Process (Paperback, 2nd edition): Charles Nemeth Private Security and the Investigative Process (Paperback, 2nd edition)
Charles Nemeth
R2,361 Discovery Miles 23 610 Ships in 12 - 17 working days

Practical yet authoritative, Private Security and the Investigative Process, Second Edition, is an important reference tool for private investigators and security professionals. Both students and seasoned security practitioners alike will benefit from the resources, ideas, and suggestions for tactics and security strategy contained within this book. Charles P. Nemeth expertly blends practice with theory to show students how to be professional when confronted with the rigors of the real world, in both the public and private sectors. Private Security and the Investigative Process, is ideally suited for private security organizations, criminal justice libraries, corporate security personnel, and law enforcement personnel.
The concepts are effectively presented with numerous forms, checklists and valuable guides that will help illustrate the investigative process both in the public and private sector.
Charles Nemeth, JD, Ph.D., LL.M. is currently Director of Graduate Criminal Justice/Legal Studies, Director of Institute of Law and Public Policy, and Director of Program Development at
California University of Pennsylvania in Pittsburgh, PA. He is a widely published author with over 30 titles to his credit and is a regular consultant to security companies. He holds a JD from the University of Baltimore and a post doctoral degree in Law, Psychiatry and Criminology, the LL.M., from the National Law Center of George Washington University. Dr. Nemeth is a recognized expert in private sector justice, ethical issues in law and legal analysis and appellate practice, and also holds a Ph.D. in Philosophy from Duquesne University. For more than two decades, he has practiced law in both the civil and criminal arena, specializing in personal injury and criminal litigation, and has been active in the North Carolina, New York and Pennsylvania Bars. He regularly consults with collegiate institutions and private sector justice entities.
A comprehensive, authoritative resource for the industry, its practitioners, and those seeking a career in the private-security industry
Provides insight into the fundamental competency skills necessary to function as an investigator
Contains numerous forms, checklists, for useful and practical reference

Surveillance in the Time of Insecurity (Hardcover, New): Surveillance in the Time of Insecurity (Hardcover, New)
R3,613 R2,147 Discovery Miles 21 470 Save R1,466 (41%) Ships in 12 - 17 working days

Threats of terrorism, natural disaster, identity theft, job loss, illegal immigration, and even biblical apocalypse - all are perils that trigger alarm in people today. Although there may be a factual basis for many of these fears, they do not simply represent objective conditions. Feelings of insecurity are instilled by politicians and the media, and sustained by urban fortification, technological surveillance, and economic vulnerability. ""Surveillance in the Time of Insecurity"" fuses advanced theoretical accounts of state power and neoliberalism with original research from the social settings in which insecurity dynamics play out in the new century. Torin Monahan explores the counterterrorism-themed show ""24"", Rapture fiction, traffic control centers, security conferences, public housing, and gated communities, and examines how each manifests complex relationships of inequality, insecurity, and surveillance. Alleviating insecurity requires that we confront its mythic dimensions, the politics inherent in new configurations of security provision, and the structural obstacles to achieving equality in societies.

Censorship, Surveillance, and Privacy - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover): Information Reso... Censorship, Surveillance, and Privacy - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover)
Information Reso Management Association
R9,468 Discovery Miles 94 680 Ships in 10 - 15 working days
Ultimate Telecommunications Security Survey (Paperback, Reissue): James L. Schaub, Toni Ames Ultimate Telecommunications Security Survey (Paperback, Reissue)
James L. Schaub, Toni Ames
R1,679 Discovery Miles 16 790 Ships in 12 - 17 working days

This book will help the reader reveal vulnerabilities and identify critical areas by aiding with the time-consuming job of the security survey. The Ultimate Telecommunications Security Survey, with over 1000 questions, will help the security manager by supplying a list of the commonly-asked questions to help identify vulnerabilities.


A bank of all the questions necessary for security managers to write crucial telecommunications security surveys.
The most in-depth and comprehensive telecommunications security survey on the market.
Helps security professionals identify vulnerabilities.

Security Management - Business Strategies for Success (Hardcover): Dennis Dalton Security Management - Business Strategies for Success (Hardcover)
Dennis Dalton
R1,913 Discovery Miles 19 130 Ships in 12 - 17 working days

Security personnel are being asked to justify their existence in a corporate environment. They must prove their worth in dollars and cents by showing the return on investing in loss prevention. This means security departments are being forced to contribute more to the business as a whole. This book will show security managers and personnel how to go about this, and how to achieve quality in their departments.

Suggests security should be a valued resource within the corporation that can contribute to bottom line performance.
Teaches security managers to approach their jobs as 'business managers who specialize in security'.
Written by Security Magazine's 1987 Executive Achievement Award recipient.

Censorship, Surveillance, and Privacy - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Censorship, Surveillance, and Privacy - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,458 Discovery Miles 94 580 Ships in 10 - 15 working days
Office and Office Building Security (Hardcover, 2nd edition): Edward Luis, Lawrence Fennelly, Louis Tyska Office and Office Building Security (Hardcover, 2nd edition)
Edward Luis, Lawrence Fennelly, Louis Tyska
R1,683 Discovery Miles 16 830 Ships in 12 - 17 working days

Office and Office Building Security, Second Edition, is the first book of its type to address issues of violence in the workplace to breaking and entering. As a working guide for administrators, property managers and security personnel, this book is devoted exclusively to total office security programs, detailing hundreds of professional secrets for the safety of employees and the complex. Office & Office Building Security, Second Edition, provides the background to create a safe and secure workplace, regardless of location, size and number of employees.

Provides updated and current information on every office security issue or concern.
Trains the businessperson to be responsive to 'foreseeability' issues alluded to in the court system.
Examines issues of violence and crime, as well as the dynamics

Issues in Security Management - Thinking Critically About Security (Paperback): Robert Robinson Issues in Security Management - Thinking Critically About Security (Paperback)
Robert Robinson
R1,703 Discovery Miles 17 030 Ships in 12 - 17 working days

This is a truly unique collection of 39 articles written by authorities or based on authoritative research. It goes beyond locks, lighting, and alarms to offer provocative viewpoints on a variety of security topics.
Contributors to this book are knowledgeable and practical individuals who are aware of the impact of their work on society. They have extensive and specialized experience in their respective sectors including corporate, retail, college, hospital, art gallery, and within the community at large. They are knowledgeable about technical and legal aspects of CCTV, electronic counter-intelligence, computers, fire safety, violent employees, terrorism and the future of policing. In addition, they are concerned about the right to privacy, the influence of gambling on employee theft, privatization of correctional services, the place of women in security work, security audit anxiety, and crime control/prevention.

The book looks beyond everyday applications and routines to an understanding of the social significance of careers in security. It will be of interest to practitioners in all sectors as well as students at all levels.
Goes beyond the usual nuts and bolts security book
An important, horizon-broadening supplement to the basic texts
Appeals to everybody in the security field from students to practitioners

The Right to Privacy (Hardcover): Samuel D. Warren, Louis D. Brandeis The Right to Privacy (Hardcover)
Samuel D. Warren, Louis D. Brandeis; Foreword by Steven Alan Childress
R538 Discovery Miles 5 380 Ships in 10 - 15 working days
The Complete Q-anon - Q-anon, Summarized, Analyzed, and With a Firsthand Account of Cabal's Ground Intelligence Operations... The Complete Q-anon - Q-anon, Summarized, Analyzed, and With a Firsthand Account of Cabal's Ground Intelligence Operations (Hardcover)
Anonymous Conservative
R793 Discovery Miles 7 930 Ships in 12 - 17 working days
Loss Prevention and the Small Business - The Security Professional's Guide to Asset Protection Strategies (Paperback): J.... Loss Prevention and the Small Business - The Security Professional's Guide to Asset Protection Strategies (Paperback)
J. Robert Wyman
R1,314 Discovery Miles 13 140 Ships in 12 - 17 working days

With half of all new businesses failing in the first two years, every aspect of good business planning must be considered, but loss prevention is very often overlooked. Most small business owners grapple with the day to day challenges of sales and marketing, never realizing that the shadow of shrinkage is expanding daily, waiting to reveal itself in the annual inventory results. Ravaged by theft and paperwork losses, the already tight profit margin can shrink into oblivion. Loss Prevention and the Small Business opens the eyes of the reader to the reality of shrinkage in all its guises including shoplifting, fraud, and embezzlement. Armed with this awareness, the security specialist or owner/manager can utilize the many strategies to both inhibit losses and aggressively pursue those persons and processes that cause losses.
This is a comprehensive guide to developing and maintaining a loss prevention strategy. It assists the reader in creating a dynamic proactive plan for protecting their hard-earned profits from the menace of internal and external loss.



Includes information beyond the typical retail theft by employees and customers
Cover business losses from administrative errors to white collar crime
Practical with numerous worksheets, forms, and templates for asset protection exercises

Netspionage - The Global Threat to Information (Paperback): William C. Boni, Gerald Kovacich Netspionage - The Global Threat to Information (Paperback)
William C. Boni, Gerald Kovacich
R1,494 Discovery Miles 14 940 Ships in 12 - 17 working days

This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers," "cyberpunks," and even intelligence agencies) has already resulted in several incidents that foreshadow the perilous future. Close study of these incidents demonstrates how difficult yet how important it is to confront the challenges of "netspionage" and its less intrusive cousins. The authors present a set of the known incidents and then outline protective measures that will reduce the potential and consequences of netspionage.
Unlike most security books, this one is written for managers and executives in non-protection roles of the organization, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise.

*Practical guide written from front-line experience
*Explains the evolution of information collection and why it has never been easier
*Highlights the tools of the trade and how they can be put to best use

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback)
Alan Tang
R1,331 R1,247 Discovery Miles 12 470 Save R84 (6%) Ships in 12 - 17 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Preventing Corporate Embezzlement
Paul Shaw, Jack Bologna Paperback R1,921 Discovery Miles 19 210
Computational Intelligence for…
Yassine Maleh, Mamoun Alazab, … Hardcover R2,892 Discovery Miles 28 920
How Safe Are Our Skies? - Assessing the…
Rodney Wallis Hardcover R1,514 Discovery Miles 15 140
The Privatization of Police in America…
James F. Pastor Paperback R953 R656 Discovery Miles 6 560
The Formula for Selling Alarm Systems
Lou Sepulveda Paperback R1,410 Discovery Miles 14 100
Undercover Investigations for the…
Eugene F. Ferraro Paperback R1,935 Discovery Miles 19 350
The Handbook of Security
Martin Gill Hardcover R4,315 Discovery Miles 43 150
Guard Force Management, Updated Edition
Lucien Canton Hardcover R1,769 Discovery Miles 17 690
Counterespionage for American Business
Peter Pitorri Paperback R1,338 Discovery Miles 13 380
The Security Handbook
Philip Purpura Paperback R1,601 Discovery Miles 16 010

 

Partners