0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (39)
  • R500+ (395)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Tell Me Everything - The Story of a Private Investigation (Paperback): Erika Krouse Tell Me Everything - The Story of a Private Investigation (Paperback)
Erika Krouse
R481 Discovery Miles 4 810 Ships in 10 - 15 working days
Machine See, Machine Do - How Technology Mirrors Bias in Our Criminal Justice System (Hardcover): Patrick K Lin Machine See, Machine Do - How Technology Mirrors Bias in Our Criminal Justice System (Hardcover)
Patrick K Lin
R741 R657 Discovery Miles 6 570 Save R84 (11%) Ships in 10 - 15 working days
Multllinguallsm, the Judicial Authority and Security Services - Belgium, Europe, South Africa, Southern Africa (Paperback): Kas... Multllinguallsm, the Judicial Authority and Security Services - Belgium, Europe, South Africa, Southern Africa (Paperback)
Kas Deprez, Theo du Plessis, Lut Teck
R623 Discovery Miles 6 230 Ships in 7 - 10 working days

This work deals with international principles regarding the use of language in the administration of justice, and looks at the way in which multilingual countries such as Belgium and Switzerland approach this complex problem. The title then compares language practice in the judiciary and security services in South Africa and some countries of the Southern African Development Community against the background of evolving language policy in the region. This title discusses the use of official languages in a specific domain of government from the point of view that a language cannot be regarded as official simplu because a constitution prescribes it. Important conclusions are drawn regarding the role of the multilingual state.

The Enforcers - Inside Cape Town's Deadly Nightclub Battles (Paperback): Caryn Dolley The Enforcers - Inside Cape Town's Deadly Nightclub Battles (Paperback)
Caryn Dolley 1
R295 R264 Discovery Miles 2 640 Save R31 (11%) In Stock

Here is the Cape Town underworld laid bare, explored through the characters who control the protection industry, the bouncers and security at nightclubs and strip clubs.

At the centre of this turf war is Nafiz Modack, the latest kingpin to have seized control of the industry, a man often in court on various charges, including extortion. Investigative journalist Caryn Dolley has followed Modack and his predecessors for six years as power has shifted in the nightclub security industry, and she focuses on how closely connected the criminal underworld is with the police services. In this suspenseful page turner of an investigation, she writes about the overlapping of the state with the underworld, the underworld with the upperworld, and how the associated violence is not confined to specific areas of Cape Town, but is happening inside hospitals, airports, clubs and restaurants and putting residents at risk.

A book that lays bare the myth that violence and gangsterism in Cape Town is confined to the ganglands of the Cape Flats, wherever you find yourself, you’re only a hair’s breadth away from the enforcers.

Silent Weapons for Quiet Wars - An Introductory Programming Manual (Hardcover): Anonymous Silent Weapons for Quiet Wars - An Introductory Programming Manual (Hardcover)
Anonymous
R643 R575 Discovery Miles 5 750 Save R68 (11%) Ships in 10 - 15 working days
The Professional Protection Officer - Practical Security Strategies and Emerging Trends (Paperback, 2nd edition): Sandi J.... The Professional Protection Officer - Practical Security Strategies and Emerging Trends (Paperback, 2nd edition)
Sandi J. Davies, Lawrence Fennelly
R1,456 Discovery Miles 14 560 Ships in 12 - 19 working days

Eight previous iterations of this text have proven to be highly regarded and considered the definitive training guide and instructional text for first-line security officers in both the private and public sectors. The material included in the newest version covers all the subjects essential to the training of protection officers. This valuable resource and its predecessors have been utilized worldwide by the International Foundation for Protection Officers since 1988, as the core curriculum for the Certified Protection Officer (CPO) Program. The Professional Protection Officer: Practical Security Strategies and Emerging Trends provides critical updates and fresh guidance, as well as diagrams and illustrations; all have been tailored to the training and certification needs of today's protection professionals.

Air Piracy, Airport Security, and International Terrorism - Winning the War Against Hijackers (Hardcover): Oliver P. St John Air Piracy, Airport Security, and International Terrorism - Winning the War Against Hijackers (Hardcover)
Oliver P. St John
R2,981 Discovery Miles 29 810 Ships in 12 - 19 working days

As international terrorism has grown over the past decades, airlines and airports have become increasingly popular targets for violent attacks and hijackings. In this volume, Peter St. John provides a survey of international air piracy and airline terrorism, and of the ways airline professionals and governments are coping, or attempting to cope, with the crisis. St. John not only deals with the history, politics, psychology, and sociology of air piracy, but also provides an assessment of the threat to commercial aircraft and ways to counter the danger. The principal theme he develops is that security for airports and aircraft can be achieved, and the fear of terrorists overcome, if Western countries cooperate in installing effective security policies and plans. St. John begins his work with a two-chapter history of the evolution of hijacking, tracing the five-to-seven-year cycles that seem to have emerged and the growth of the politically motivated hijacking that has become the most persistent and dangerous form. He next analyzes the eight types of individuals who have hijacked aircraft in the past, their different motives, and how they can be identified by airport security and flight crews. A major chapter discusses the politics of Western governments toward highjacking in Europe and North America, and identifies the best and worst airports around the globe. A seven-stage system of security that will probably be a necessity for the 1990s is also proposed. Ensuing chapters address the problem of the hijacked plane, offering advice for passengers and crew members who are victims of hijacking, and for government behavior, which often does more to encourage air terrorism than to preventit. Finally, St. John looks to the future of airport security and describes the need for a concentrated attempt at all levels of national and international government to develop effective defenses against air piracy. A group of appendices is also included, documenting the principal hijacks of the past forty years as well as sabotage attempts on commercial aircraft. This work will be an important reference tool for professionals in security services and the airline and airport management field, and for students in political science and international relations courses. It will also be a valuable addition to college, university, and public libraries.

Security Supervision and Management - Theory and Practice of Asset Protection (Paperback, 4th edition): Ifpo Security Supervision and Management - Theory and Practice of Asset Protection (Paperback, 4th edition)
Ifpo; Edited by Sandi J. Davies, Brion P. Gilbride, Chris A. Hertig
R1,612 Discovery Miles 16 120 Ships in 12 - 19 working days

Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or managerial positions. Covering everything needed from how to work with today's generation security force employees to the latest advances in the security industry, Security Supervision and Management, Fourth Edition, shows security officers how to become a more efficient and well-rounded security professional. Security Supervision and Management, Fourth Edition, is also the only text needed to prepare for the Certified in Security Supervision and Management (CSSM) designation offered by International Foundation for Protection Officers (IFPO). The IFPO also publishes The Professional Protection Officer: Practical Security Strategies and Emerging Trends, now in its 8th edition.

Journalism and the Nsa Revelations - Privacy, Security and the Press (Hardcover): Adrienne Russell, Risto Kunelius, Heikki... Journalism and the Nsa Revelations - Privacy, Security and the Press (Hardcover)
Adrienne Russell, Risto Kunelius, Heikki Heikkila, Dmitry Yagodin
R3,540 Discovery Miles 35 400 Ships in 12 - 19 working days

Edward Snowden's revelations about the mass surveillance capabilities of the US National Security Agency (NSA) and other security services triggered an ongoing debate about the relationship between privacy and security in the digital world. This discussion has been dispersed into a number of national platforms, reflecting local political realities but also raising questions that cut across national public spheres. What does this debate tell us about the role of journalism in making sense of global events? This book looks at discussions of these debates in the mainstream media in the USA, United Kingdom, France, Germany, Russia and China. The chapters focus on editorials, commentaries and op-eds and look at how opinion-based journalism has negotiated key questions on the legitimacy of surveillance and its implications to security and privacy. The authors provide a thoughtful analysis of the possibilities and limits of 'transnational journalism' at a crucial time of political and digital change.

Security Consulting (Paperback, 4th edition): Charles A. Sennewald Security Consulting (Paperback, 4th edition)
Charles A. Sennewald
R1,172 Discovery Miles 11 720 Ships in 12 - 19 working days

Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, at no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption -- which could bring any business to it's knees --has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in-depth security surveys so businesses will know exactly where security holes are present and where they need improvement to limit their exposure to various threats. The fourth edition of "Security Consulting" introduces security and law enforcement professionals to the career and business of security consulting. It provides new and potential consultants with the practical guidelines needed to start up and maintain a successful independent practice. Updated and expanded information is included on marketing, fees and expenses, forensic consulting, the use of computers, and the need for professional growth.Useful sample forms have been updated in addition tonew promotion opportunities and keys to conducting research on the Web.

- The only book of its kind dedicated to beginning a security consulting practice from the ground-up

- Proven, practical methods to establish and run a security consulting business

- Newchapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet

- The most up-to-date best practices from the IAPSC"

Emergency Notification (Hardcover): Robert C. Chandler Emergency Notification (Hardcover)
Robert C. Chandler
R1,661 Discovery Miles 16 610 Ships in 10 - 15 working days

This text provides critical information to help organizations improve their emergency communications, including the tools, automation technology, and processes of crisis notification. To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain the situation, campus personnel need to communicate immediately and efficiently, not only with the students, faculty, and staff, but also the local police, federal law enforcement, and media. Effective emergency notification makes things "right," it allows the right message to reach the right people at the right time—facilitating the right response. Emergency Notification explains how. This book offers must-know information for business security, senior management, human resources staff, government policymakers, and emergency planners, examining what, when, how, why, and with whom to communicate during crises. This text also covers risk communication, message mapping, information loading, audience comprehension, and practical issues like testing emergency notification systems.

Patriotic Information Systems (Hardcover): Todd Loendorf, G.David Garson Patriotic Information Systems (Hardcover)
Todd Loendorf, G.David Garson
R2,810 Discovery Miles 28 100 Ships in 10 - 15 working days

Database technology can be used for various ends, ranging from promotion of democracy to strengthening of nationalism to shoring up authoritarian regimes through misinformation. Its use affects every layer of society: from individuals to households to local governments, and is a consuming issue in the United States Governments stance on privacy, security, and technology.

Fighting Fraud - How to Establish and Manage an Anti-Fraud Program (Paperback): Gerald L. Kovacich Fighting Fraud - How to Establish and Manage an Anti-Fraud Program (Paperback)
Gerald L. Kovacich
R1,197 Discovery Miles 11 970 Ships in 12 - 19 working days

This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company. It provides an exceptional foundation for security professionals or business executives involved in developing and implementing a corporate anti-fraud program as part of a corporate assets protection program.
The author's intent is to provide the reader with a practitioner's guide (a "how-to" book), augmented by some background information to put it all in perspective. The approach used should enable the readers to immediately put in place a useful anti-fraud program under the leadership of the corporate security officer (CSO), or other corporate professional.
* Shows professionals how to save their companies money.
* Provides a roadmap for developing an anti-fraud program.
* Allows security professionals to tailor their anti-fraud program to their own corporate environment.
* Explains how fraud is costing corporations a competitive edge in the global marketplace.

The Right to Privacy (Hardcover): Samuel D. Warren, Louis D. Brandeis The Right to Privacy (Hardcover)
Samuel D. Warren, Louis D. Brandeis; Foreword by Steven Alan Childress
R580 Discovery Miles 5 800 Ships in 10 - 15 working days
Technology Development for Security Practitioners (Hardcover, 1st ed. 2021): Babak Akhgar, Dimitrios Kavallieros, Evangelos... Technology Development for Security Practitioners (Hardcover, 1st ed. 2021)
Babak Akhgar, Dimitrios Kavallieros, Evangelos Sdongos
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com

Public Safety and Security Administration (Paperback): P J. Ortmeier Public Safety and Security Administration (Paperback)
P J. Ortmeier
R1,521 Discovery Miles 15 210 Ships in 12 - 19 working days

This book addresses public safety and security from a holistic and visionary perspective. For the first time, safety and security organizations, as well as their administration, are brought together into an integrated work.
The protection of persons and property involves many public agencies and priivate organizations. Entities from the criminal jutics system (law enforcement, courts, corrections) as well as the fire service, private security and hazardous materials all contribute to public safety and security. This book addresses these entities, as well as safety and security issues, from a holistic and visionary perspective. It addresses criminal and non-criminal safety and security concerns, provides an overview of each entity (component) of the system of public safety and security, presents an overview of the administration process involved in planning, organizing, managing and evaluating public safety and security organizations and describes collateral functions of investigations, documentation and report writing.
Public safety and security organizations should not work in isolation. Rather, they should collaborate to protect persons and property. This book represents the first time all the public safety and security entities have been addressed in one text.

Focuses on the theories, concepts, practices and problems related to the present and future of public safety and security
Examines different strategies for problem solving which personnel working in the field may utilize
Synthesizes college-level lectures prepared, presented, and updated by the author over the past twenty years

Model Security Policies, Plans and Procedures (Paperback): John Fay Model Security Policies, Plans and Procedures (Paperback)
John Fay
R1,776 Discovery Miles 17 760 Ships in 12 - 19 working days

Model Security Policies, Plans, and Procedures contains sample security policy, planning, and procedural documents drawn from the proven experiences of hundreds of America's most successful corporations. If your job requires you to develop or update security policies, plans, or procedures, this book will be a highly valuable resource. The samples cover the key concepts of organizational protection. Putting the samples to use, either as presented or as drafting guides, can eliminate many hours of tedious research and writing.

Offers a practical mode of reference for security professionalsContains sample plans, policies and procedures

Investigations 150 Things You Should Know (Paperback): Lawrence Fennelly, Louis Tyska Investigations 150 Things You Should Know (Paperback)
Lawrence Fennelly, Louis Tyska
R1,128 Discovery Miles 11 280 Ships in 12 - 19 working days

By covering the essential tips and techniques for investigators, Investigations: 150 Things You Should Know becomes a useful reference. By further covering the legal guidelines that investigators must follow, it becomes indispensable. Through anecdotes, case studies, and documented procedures the authors of this book have amassed the most complete collection of investigative information available.
This ready reference is for anyone interested in investigations. Readers in and out of the law enforcement field will find this book easy to use and understand when seeking explanations about a wide variety of investigative topics including: constitutional law, documentary evidence, interviewing and interrogating, and surveillance.

Comprehensive overview of investigation
Easily readable and accessible information supplies all the necessary elements for the beginner or expert investigator
Further investigative resources are listed in valuable appendices

Risk Management for Security Professionals (Hardcover): Carl Roper Risk Management for Security Professionals (Hardcover)
Carl Roper
R2,832 R1,962 Discovery Miles 19 620 Save R870 (31%) Ships in 12 - 19 working days

This book describes the risk management methodology as a specific process, a theory, or a procedure for determining your assets, vulnerabilities, and threats and how security professionals can protect them.
Risk Management for Security Professionals is a practical handbook for security managers who need to learn risk management skills. It goes beyond the physical security realm to encompass all risks to which a company may be exposed. Risk Management as presented in this book has several goals:
Provides standardized common approach to risk management through a framework that effectively links security strategies and related costs to realistic threat assessment and risk levels
Offers flexible yet structured framework that can be applied to the risk assessment and decision support process in support of your business or organization
Increases awareness in terms of potential loss impacts, threats and vulnerabilities to organizational assets
Ensures that various security recommendations are based on an integrated assessment of loss impacts, threats, vulnerabilities and resource constraints

Risk management is essentially a process methodology that will provide a cost-benefit payback factor to senior management.
Provides a stand-alone guide to the risk management process
Helps security professionals learn the risk countermeasures and their pros and cons
Addresses a systematic approach to logical decision-making about the allocation of scarce security resources

Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management Association Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R10,238 Discovery Miles 102 380 Ships in 10 - 15 working days
Secure Electronic Transactions - Introduction and Technical Reference (Hardcover): Larry Loeb Secure Electronic Transactions - Introduction and Technical Reference (Hardcover)
Larry Loeb
R2,219 Discovery Miles 22 190 Ships in 10 - 15 working days

This detailed volume and accompanying CD-ROM focus on the set electronic transaction (SET) system and review the fundamentals through to practical instruction on how to develop and implement the entire SET system. Topics addressed include: electronic commerce and the various payment and security systems that have led to online credit card commerce; cryptographic extensions utilized by the SET system; and the technical details behind SET, from purchase initiation, through certificate management, to data transport protocols. Actual programming examples and computer code to construct and roll out the SET system are also included. The book should be of interest to business executives as well as engineers.

Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management Association Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,234 Discovery Miles 102 340 Ships in 10 - 15 working days
Censorship, Surveillance, and Privacy - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover): Information Reso... Censorship, Surveillance, and Privacy - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover)
Information Reso Management Association
R9,712 Discovery Miles 97 120 Ships in 10 - 15 working days
Surveillance in the Time of Insecurity (Hardcover, New): Surveillance in the Time of Insecurity (Hardcover, New)
R2,314 Discovery Miles 23 140 Ships in 12 - 19 working days

Threats of terrorism, natural disaster, identity theft, job loss, illegal immigration, and even biblical apocalypse - all are perils that trigger alarm in people today. Although there may be a factual basis for many of these fears, they do not simply represent objective conditions. Feelings of insecurity are instilled by politicians and the media, and sustained by urban fortification, technological surveillance, and economic vulnerability. ""Surveillance in the Time of Insecurity"" fuses advanced theoretical accounts of state power and neoliberalism with original research from the social settings in which insecurity dynamics play out in the new century. Torin Monahan explores the counterterrorism-themed show ""24"", Rapture fiction, traffic control centers, security conferences, public housing, and gated communities, and examines how each manifests complex relationships of inequality, insecurity, and surveillance. Alleviating insecurity requires that we confront its mythic dimensions, the politics inherent in new configurations of security provision, and the structural obstacles to achieving equality in societies.

The Privatization of Police in America - An Analysis and Case Study (Paperback): James F. Pastor The Privatization of Police in America - An Analysis and Case Study (Paperback)
James F. Pastor
R972 R718 Discovery Miles 7 180 Save R254 (26%) Ships in 12 - 19 working days

Today the private security industry employs approximately 1.5 million people and spends over USD52 billion annually. In contrast, public police forces employ approximately 600,000 people and spend USD30 billion annually. Private policing promises to be a big part of the response to today's increased security concerns, as citizens realize that security is much more than the presence of guards and the perception of safety. This book addresses the impact and implications of private policing on public streets, and begins with a look at private policing from conceptual, historical, economic, legal and functional perspectives. These approaches provide the background for the text, which focuses on a private policing patrol program in a community on the south side of Chicago. The text also demonstrates a number of substantive legal and public policy issues which directly or indirectly relate to the provision of security services; some people see the need for a ""dual system"" of policing - one for the wealthy and one for the poor - and others see the provision of private security as the primary protective resource in contemporary America. The author also examines how private policing is different from and similar to public policing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Fault-tolerant Control and Diagnosis for…
Rafael Martinez-Guerra, Fidel Melendez-Vazquez, … Hardcover R2,881 Discovery Miles 28 810
Transient and Permanent Error Control…
Qiaoyan Yu, Paul Ampadu Hardcover R2,869 Discovery Miles 28 690
Mechatronics '98
J. Adolfsson, J. Karlsen Hardcover R7,196 Discovery Miles 71 960
A Brief History Of Time - From Big Bang…
Stephen Hawking Paperback  (4)
R333 R302 Discovery Miles 3 020
Dynamic Modeling, Simulation and Control…
Ranjan Vepa Hardcover R4,576 R3,719 Discovery Miles 37 190
Masters Of Death
Olivie Blake Paperback R385 R349 Discovery Miles 3 490
Warped Passages - Unraveling the…
Lisa Randall Paperback R456 Discovery Miles 4 560
Elphie - A Wicked Childhood
Gregory Maguire Paperback R440 R340 Discovery Miles 3 400
The Nature of Things (Royal Collector's…
Titus Lucretius Hardcover R982 Discovery Miles 9 820
Text Mining and its Applications…
Spiros Sirmakessis Hardcover R5,701 Discovery Miles 57 010

 

Partners