0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (36)
  • R500+ (397)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

The Enforcers - Inside Cape Town's Deadly Nightclub Battles (Paperback): Caryn Dolley The Enforcers - Inside Cape Town's Deadly Nightclub Battles (Paperback)
Caryn Dolley 1
R295 R264 Discovery Miles 2 640 Save R31 (11%) In Stock

Here is the Cape Town underworld laid bare, explored through the characters who control the protection industry, the bouncers and security at nightclubs and strip clubs.

At the centre of this turf war is Nafiz Modack, the latest kingpin to have seized control of the industry, a man often in court on various charges, including extortion. Investigative journalist Caryn Dolley has followed Modack and his predecessors for six years as power has shifted in the nightclub security industry, and she focuses on how closely connected the criminal underworld is with the police services. In this suspenseful page turner of an investigation, she writes about the overlapping of the state with the underworld, the underworld with the upperworld, and how the associated violence is not confined to specific areas of Cape Town, but is happening inside hospitals, airports, clubs and restaurants and putting residents at risk.

A book that lays bare the myth that violence and gangsterism in Cape Town is confined to the ganglands of the Cape Flats, wherever you find yourself, you’re only a hair’s breadth away from the enforcers.

Tell Me Everything - The Story of a Private Investigation (Paperback): Erika Krouse Tell Me Everything - The Story of a Private Investigation (Paperback)
Erika Krouse
R518 R491 Discovery Miles 4 910 Save R27 (5%) Ships in 10 - 15 working days
Multllinguallsm, the Judicial Authority and Security Services - Belgium, Europe, South Africa, Southern Africa (Paperback): Kas... Multllinguallsm, the Judicial Authority and Security Services - Belgium, Europe, South Africa, Southern Africa (Paperback)
Kas Deprez, Theo du Plessis, Lut Teck
R623 Discovery Miles 6 230 Ships in 7 - 10 working days

This work deals with international principles regarding the use of language in the administration of justice, and looks at the way in which multilingual countries such as Belgium and Switzerland approach this complex problem. The title then compares language practice in the judiciary and security services in South Africa and some countries of the Southern African Development Community against the background of evolving language policy in the region. This title discusses the use of official languages in a specific domain of government from the point of view that a language cannot be regarded as official simplu because a constitution prescribes it. Important conclusions are drawn regarding the role of the multilingual state.

Machine See, Machine Do - How Technology Mirrors Bias in Our Criminal Justice System (Hardcover): Patrick K Lin Machine See, Machine Do - How Technology Mirrors Bias in Our Criminal Justice System (Hardcover)
Patrick K Lin
R761 R673 Discovery Miles 6 730 Save R88 (12%) Ships in 10 - 15 working days
Silent Weapons for Quiet Wars - An Introductory Programming Manual (Hardcover): Anonymous Silent Weapons for Quiet Wars - An Introductory Programming Manual (Hardcover)
Anonymous
R660 R588 Discovery Miles 5 880 Save R72 (11%) Ships in 10 - 15 working days
Patriotic Information Systems (Hardcover): Todd Loendorf, G.David Garson Patriotic Information Systems (Hardcover)
Todd Loendorf, G.David Garson
R2,867 Discovery Miles 28 670 Ships in 12 - 17 working days

Database technology can be used for various ends, ranging from promotion of democracy to strengthening of nationalism to shoring up authoritarian regimes through misinformation. Its use affects every layer of society: from individuals to households to local governments, and is a consuming issue in the United States Governments stance on privacy, security, and technology.

Family Tree Workbook - 30+ Step-By-Step Worksheets to Build Your Family History (Paperback): Brian Sheffey Family Tree Workbook - 30+ Step-By-Step Worksheets to Build Your Family History (Paperback)
Brian Sheffey
R351 Discovery Miles 3 510 Ships in 10 - 15 working days
Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management Association Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R10,505 Discovery Miles 105 050 Ships in 10 - 15 working days
Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management Association Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,501 Discovery Miles 105 010 Ships in 10 - 15 working days
Secure Electronic Transactions - Introduction and Technical Reference (Hardcover): Larry Loeb Secure Electronic Transactions - Introduction and Technical Reference (Hardcover)
Larry Loeb
R2,275 Discovery Miles 22 750 Ships in 10 - 15 working days

This detailed volume and accompanying CD-ROM focus on the set electronic transaction (SET) system and review the fundamentals through to practical instruction on how to develop and implement the entire SET system. Topics addressed include: electronic commerce and the various payment and security systems that have led to online credit card commerce; cryptographic extensions utilized by the SET system; and the technical details behind SET, from purchase initiation, through certificate management, to data transport protocols. Actual programming examples and computer code to construct and roll out the SET system are also included. The book should be of interest to business executives as well as engineers.

Censorship, Surveillance, and Privacy - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover): Information Reso... Censorship, Surveillance, and Privacy - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover)
Information Reso Management Association
R9,965 Discovery Miles 99 650 Ships in 10 - 15 working days
Surveillance in the Time of Insecurity (Hardcover, New): Surveillance in the Time of Insecurity (Hardcover, New)
R3,776 R2,306 Discovery Miles 23 060 Save R1,470 (39%) Ships in 12 - 17 working days

Threats of terrorism, natural disaster, identity theft, job loss, illegal immigration, and even biblical apocalypse - all are perils that trigger alarm in people today. Although there may be a factual basis for many of these fears, they do not simply represent objective conditions. Feelings of insecurity are instilled by politicians and the media, and sustained by urban fortification, technological surveillance, and economic vulnerability. ""Surveillance in the Time of Insecurity"" fuses advanced theoretical accounts of state power and neoliberalism with original research from the social settings in which insecurity dynamics play out in the new century. Torin Monahan explores the counterterrorism-themed show ""24"", Rapture fiction, traffic control centers, security conferences, public housing, and gated communities, and examines how each manifests complex relationships of inequality, insecurity, and surveillance. Alleviating insecurity requires that we confront its mythic dimensions, the politics inherent in new configurations of security provision, and the structural obstacles to achieving equality in societies.

The Privatization of Police in America - An Analysis and Case Study (Paperback): James F. Pastor The Privatization of Police in America - An Analysis and Case Study (Paperback)
James F. Pastor
R969 R716 Discovery Miles 7 160 Save R253 (26%) Ships in 12 - 17 working days

Today the private security industry employs approximately 1.5 million people and spends over USD52 billion annually. In contrast, public police forces employ approximately 600,000 people and spend USD30 billion annually. Private policing promises to be a big part of the response to today's increased security concerns, as citizens realize that security is much more than the presence of guards and the perception of safety. This book addresses the impact and implications of private policing on public streets, and begins with a look at private policing from conceptual, historical, economic, legal and functional perspectives. These approaches provide the background for the text, which focuses on a private policing patrol program in a community on the south side of Chicago. The text also demonstrates a number of substantive legal and public policy issues which directly or indirectly relate to the provision of security services; some people see the need for a ""dual system"" of policing - one for the wealthy and one for the poor - and others see the provision of private security as the primary protective resource in contemporary America. The author also examines how private policing is different from and similar to public policing.

Censorship, Surveillance, and Privacy - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Censorship, Surveillance, and Privacy - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,955 Discovery Miles 99 550 Ships in 10 - 15 working days
Dying for an iPhone - Apple, Foxconn and the Lives of China's Workers (Hardcover): Jenny Chan, Mark Selden, Pun Ngai Dying for an iPhone - Apple, Foxconn and the Lives of China's Workers (Hardcover)
Jenny Chan, Mark Selden, Pun Ngai
R2,767 Discovery Miles 27 670 Ships in 10 - 15 working days

Suicides, excessive overtime, hostility and violence on the factory floor in China. Drawing on vivid testimonies from rural migrant workers, student interns, managers and trade union staff, Dying for an iPhone is a devastating expose of two of the world's most powerful companies: Foxconn and Apple. As the leading manufacturer of iPhones, iPads and Kindles, and employing one million workers in China alone, Taiwanese-invested Foxconn's drive to dominate global electronics manufacturing has aligned perfectly with China's goal of becoming the world leader in technology. This book reveals the human cost of that ambition and what our demands for the newest and best technology mean for workers. Foxconn workers have repeatedly demonstrated their power to strike at key nodes of transnational production, challenge management and the Chinese state, and confront global tech behemoths. Dying for an iPhone allows us to assess the impact of global capitalism's deepening crisis on workers.

European Security Law (Hardcover, New): Martin Trybus, Nigel White European Security Law (Hardcover, New)
Martin Trybus, Nigel White
R2,713 Discovery Miles 27 130 Ships in 12 - 17 working days

There have been a number of EU military operations in the last few years, evidence of a growing European military confidence, which in turn is a reflection of a developing competence in security matters. The creation of the European Union and its Common Foreign and Security Policy by the Maastricht Treaty of 1992 heralded this development, though the idea of a common defense can be traced to the beginnings of European integration. This book provides an analysis of the EU's evolving legal framework and powers on such matters, but it also recognizes that such a framework sits, sometimes uneasily, within the wider body of EU and International Law. The EU's security and defense policy also overlaps with those of other organizations such as the Organization for Security and Cooperation in Europe (OSCE), but more especially the North Atlantic Treaty Organization (NATO). EU relations with NATO have, in particular, caused some concern and are still evolving as both organizations seek to play a wider security role in the post-Cold War, and now post-9/11, era. With security now dominating political agendas at the domestic, regional and international levels, it is no surprise that the EU's concern for security has grown, and, following the Union's respect for the rule of law, has been shaped legally as well as politically. This book evaluates the progress of the Union in this regard in its international context and in its wider context of European integration generally. The analysis is in the main a legal one, but is placed squarely within wider historical and political perspectives.

1984 (Paperback): George Orwell 1984 (Paperback)
George Orwell
R206 R186 Discovery Miles 1 860 Save R20 (10%) Ships in 12 - 17 working days

This Scholastic Classics edition of George Orwell's classic dystopian novel is perfect for students and Orwell enthusiasts alike. Who controls the past controls the future. Who controls the present controls the past. Winston Smith has always been a dutiful citizen of Oceania, rewriting history to meet the demands of the Ministry of Truth. But with each lie that he writes, Winston starts to resent the totalitarian party that seeks power for its own sake and punishes those that desire individuality. When Winston begins a secret relationship with his colleague Julia, he soon realises it's virtually impossible to escape the watchful eye of Big Brother... Totalitarianism, identity and independence, repression, power, language, rebellion, technology and modernisation are some of the themes that run throughout this novel.

The Right to Privacy (Hardcover): Samuel D. Warren, Louis D. Brandeis The Right to Privacy (Hardcover)
Samuel D. Warren, Louis D. Brandeis; Foreword by Steven Alan Childress
R593 Discovery Miles 5 930 Ships in 10 - 15 working days
The Complete Q-anon - Q-anon, Summarized, Analyzed, and With a Firsthand Account of Cabal's Ground Intelligence Operations... The Complete Q-anon - Q-anon, Summarized, Analyzed, and With a Firsthand Account of Cabal's Ground Intelligence Operations (Hardcover)
Anonymous Conservative
R858 Discovery Miles 8 580 Ships in 12 - 17 working days
One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Hardcover): Simon... One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Hardcover)
Simon Chesterman
R1,569 Discovery Miles 15 690 Ships in 12 - 17 working days

What limits, if any, should be placed on a government's efforts to spy on its citizens in the name of national security? Spying on foreigners has long been regarded as an unseemly but necessary enterprise. Spying on one's own citizens in a democracy, by contrast, has historically been subject to various forms of legal and political restraint. For most of the twentieth century these regimes were kept distinct. That position is no longer tenable. Modern threats do not respect national borders. Changes in technology make it impractical to distinguish between 'foreign' and 'local' communications. And our culture is progressively reducing the sphere of activity that citizens can reasonably expect to be kept from government eyes. The main casualty of this transformed environment will be privacy. Recent battles over privacy have been dominated by fights over warrantless electronic surveillance and CCTV; the coming years will see debates over DNA databases, data mining, and biometric identification. There will be protests and lawsuits, editorials and elections resisting these attacks on privacy. Those battles are worthy. But the war will be lost. Modern threats increasingly require that governments collect such information, governments are increasingly able to collect it, and citizens increasingly accept that they will collect it. This book proposes a move away from questions of whether governments should collect information and onto more problematic and relevant questions concerning its use. By reframing the relationship between privacy and security in the language of a social contract, mediated by a citizenry who are active participants rather than passive targets, the book offers a framework to defend freedom without sacrificing liberty.

Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback): Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback)
Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee
R1,065 Discovery Miles 10 650 Ships in 9 - 15 working days

* Offers context while providing a coherent, applied overview of a wide range of suspect vulnerabilities and how to address them when interviewing * Serves as a practical guide to interviewing vulnerable suspects for both uniform police and detectives. * The only book on interviewing vulnerable suspects that includes the most up-to-date legal considerations and challenges of modern society

Computational Intelligence for Cybersecurity Management and Applications (Hardcover): Yassine Maleh, Mamoun Alazab, Soufyane... Computational Intelligence for Cybersecurity Management and Applications (Hardcover)
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
R3,336 Discovery Miles 33 360 Ships in 9 - 15 working days

1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.

Cognitive Risk (Paperback): James Bone, Jessie H Lee Cognitive Risk (Paperback)
James Bone, Jessie H Lee
R1,103 Discovery Miles 11 030 Ships in 12 - 17 working days

Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.

PKI Implementation and Infrastructures (Paperback): Julian Ashbourn PKI Implementation and Infrastructures (Paperback)
Julian Ashbourn
R1,159 Discovery Miles 11 590 Ships in 9 - 15 working days

1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback)
Alan Tang
R1,404 Discovery Miles 14 040 Ships in 12 - 17 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
UGD - 12-Pocket QuadRow FlexFolio Black
R650 Discovery Miles 6 500
4M Crystal Mining Kit
R184 Discovery Miles 1 840
Edu Cube Triangle
R201 R175 Discovery Miles 1 750
Croxley Abacus - 12 x 10 Plastic Beads…
R99 Discovery Miles 990
Splendor
R1,050 Discovery Miles 10 500
Butterfly Wooden Abacus (100 Beads)
R143 R113 Discovery Miles 1 130
Greenbean World - Plastic Container With…
R76 Discovery Miles 760
EDX Education Dominoes - Double-6…
R69 R58 Discovery Miles 580
Two wheeled robot
R129 Discovery Miles 1 290
Dixit (Afrikaans and English)
R725 Discovery Miles 7 250

 

Partners