![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
For two hundred years the provision of military security has been a central and defining function of the modern nation-state. The increasing reliance on private military and security companies in contemporary conflict marks a fundamental transformation in the organization of military violence, and it raises issues of accountability and ethics that are of particular concern to feminists. This privatization of force not only enables states to circumvent citizens' democratic control over questions of war and peace, but also undermines women's and minority groups' claims for greater inclusion in the military sphere. Gender and Private Security in Global Politics brings together key scholars from the fields of international relations, security studies, and gender studies to argue that privatization of military security is a deeply gendered process. The chapters employ a variety of feminist perspectives, including critical, postcolonial, poststructuralist, and queer feminist perspectives, as well as a wide range of methodological approaches including ethnography, participant-observation, genealogy, and discourse analysis. This is the first book to develop an extended feminist analysis of private militaries and to draw on feminist concerns regarding power, justice and equality to consider how to reform and regulate private forces.
This work deals with international principles regarding the use of language in the administration of justice, and looks at the way in which multilingual countries such as Belgium and Switzerland approach this complex problem. The title then compares language practice in the judiciary and security services in South Africa and some countries of the Southern African Development Community against the background of evolving language policy in the region. This title discusses the use of official languages in a specific domain of government from the point of view that a language cannot be regarded as official simplu because a constitution prescribes it. Important conclusions are drawn regarding the role of the multilingual state.
Eight previous iterations of this text have proven to be highly regarded and considered the definitive training guide and instructional text for first-line security officers in both the private and public sectors. The material included in the newest version covers all the subjects essential to the training of protection officers. This valuable resource and its predecessors have been utilized worldwide by the International Foundation for Protection Officers since 1988, as the core curriculum for the Certified Protection Officer (CPO) Program. The Professional Protection Officer: Practical Security Strategies and Emerging Trends provides critical updates and fresh guidance, as well as diagrams and illustrations; all have been tailored to the training and certification needs of today's protection professionals.
Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or managerial positions. Covering everything needed from how to work with today's generation security force employees to the latest advances in the security industry, Security Supervision and Management, Fourth Edition, shows security officers how to become a more efficient and well-rounded security professional. Security Supervision and Management, Fourth Edition, is also the only text needed to prepare for the Certified in Security Supervision and Management (CSSM) designation offered by International Foundation for Protection Officers (IFPO). The IFPO also publishes The Professional Protection Officer: Practical Security Strategies and Emerging Trends, now in its 8th edition.
Edward Snowden's revelations about the mass surveillance capabilities of the US National Security Agency (NSA) and other security services triggered an ongoing debate about the relationship between privacy and security in the digital world. This discussion has been dispersed into a number of national platforms, reflecting local political realities but also raising questions that cut across national public spheres. What does this debate tell us about the role of journalism in making sense of global events? This book looks at discussions of these debates in the mainstream media in the USA, United Kingdom, France, Germany, Russia and China. The chapters focus on editorials, commentaries and op-eds and look at how opinion-based journalism has negotiated key questions on the legitimacy of surveillance and its implications to security and privacy. The authors provide a thoughtful analysis of the possibilities and limits of 'transnational journalism' at a crucial time of political and digital change.
Since 9/11, business and industry has paid close attention to
security within their own organizations. In fact, at no other time
in modern history has business and industry been more concerned
with security issues. A new concern for security measures to combat
potential terrorism, sabotage, theft and disruption -- which could
bring any business to it's knees --has swept the nation. This has
opened up a huge opportunity for private investigators and security
professionals as consultants. Many retiring law enforcement and
security management professionals look to enter the private
security consulting market. Security consulting often involves
conducting in-depth security surveys so businesses will know
exactly where security holes are present and where they need
improvement to limit their exposure to various threats. The fourth
edition of "Security Consulting" introduces security and law
enforcement professionals to the career and business of security
consulting. It provides new and potential consultants with the
practical guidelines needed to start up and maintain a successful
independent practice. Updated and expanded information is included
on marketing, fees and expenses, forensic consulting, the use of
computers, and the need for professional growth.Useful sample forms
have been updated in addition tonew promotion opportunities and
keys to conducting research on the Web. - The only book of its kind dedicated to beginning a security consulting practice from the ground-up - Proven, practical methods to establish and run a security consulting business - Newchapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet - The most up-to-date best practices from the IAPSC"
"Contemporary Security Management, 3rd Edition "teaches security
professionals how to operate an efficient security department and
how to integrate smoothly with other groups inside and outside
their own organizations. Fay demonstrates the specifics of security
management: * how to organize, plan, develop and manage a security
operation. * how to identify vulnerabilities. * how to determine
the protective resources required to offset threats. * how to
implement all necessary physical and IT security measures. Security
professionals share the responsibility for mitigating damage,
serving as a resource to an Emergency Tactical Center, assisting
the return of business continuity, and liaising with local response
agencies such as police and fire departments, emergency medical
responders, and emergency warning centers. At the organizational
level, the book addresses budgeting, employee performance,
counseling, hiring and termination, employee theft and other
misconduct, and offers sound advice on building constructive
relationships with organizational peers and company
management.
This text provides critical information to help organizations improve their emergency communications, including the tools, automation technology, and processes of crisis notification. To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain the situation, campus personnel need to communicate immediately and efficiently, not only with the students, faculty, and staff, but also the local police, federal law enforcement, and media. Effective emergency notification makes things "right," it allows the right message to reach the right people at the right time—facilitating the right response. Emergency Notification explains how. This book offers must-know information for business security, senior management, human resources staff, government policymakers, and emergency planners, examining what, when, how, why, and with whom to communicate during crises. This text also covers risk communication, message mapping, information loading, audience comprehension, and practical issues like testing emergency notification systems.
Database technology can be used for various ends, ranging from promotion of democracy to strengthening of nationalism to shoring up authoritarian regimes through misinformation. Its use affects every layer of society: from individuals to households to local governments, and is a consuming issue in the United States Governments stance on privacy, security, and technology.
This practical reference provides the basics for instituting a
corporate anti-fraud program that helps prepare corporate security
professionals and other corporate managers for fighting corporate
fraud from inside the company. It provides an exceptional
foundation for security professionals or business executives
involved in developing and implementing a corporate anti-fraud
program as part of a corporate assets protection program.
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
This book addresses public safety and security from a holistic and
visionary perspective. For the first time, safety and security
organizations, as well as their administration, are brought
together into an integrated work.
Model Security Policies, Plans, and Procedures contains sample
security policy, planning, and procedural documents drawn from the
proven experiences of hundreds of America's most successful
corporations. If your job requires you to develop or update
security policies, plans, or procedures, this book will be a highly
valuable resource. The samples cover the key concepts of
organizational protection. Putting the samples to use, either as
presented or as drafting guides, can eliminate many hours of
tedious research and writing.
By covering the essential tips and techniques for investigators,
Investigations: 150 Things You Should Know becomes a useful
reference. By further covering the legal guidelines that
investigators must follow, it becomes indispensable. Through
anecdotes, case studies, and documented procedures the authors of
this book have amassed the most complete collection of
investigative information available.
This book describes the risk management methodology as a specific
process, a theory, or a procedure for determining your assets,
vulnerabilities, and threats and how security professionals can
protect them. Risk management is essentially a process methodology that will
provide a cost-benefit payback factor to senior management.
This detailed volume and accompanying CD-ROM focus on the set electronic transaction (SET) system and review the fundamentals through to practical instruction on how to develop and implement the entire SET system. Topics addressed include: electronic commerce and the various payment and security systems that have led to online credit card commerce; cryptographic extensions utilized by the SET system; and the technical details behind SET, from purchase initiation, through certificate management, to data transport protocols. Actual programming examples and computer code to construct and roll out the SET system are also included. The book should be of interest to business executives as well as engineers.
Threats of terrorism, natural disaster, identity theft, job loss, illegal immigration, and even biblical apocalypse - all are perils that trigger alarm in people today. Although there may be a factual basis for many of these fears, they do not simply represent objective conditions. Feelings of insecurity are instilled by politicians and the media, and sustained by urban fortification, technological surveillance, and economic vulnerability. ""Surveillance in the Time of Insecurity"" fuses advanced theoretical accounts of state power and neoliberalism with original research from the social settings in which insecurity dynamics play out in the new century. Torin Monahan explores the counterterrorism-themed show ""24"", Rapture fiction, traffic control centers, security conferences, public housing, and gated communities, and examines how each manifests complex relationships of inequality, insecurity, and surveillance. Alleviating insecurity requires that we confront its mythic dimensions, the politics inherent in new configurations of security provision, and the structural obstacles to achieving equality in societies.
Today the private security industry employs approximately 1.5 million people and spends over USD52 billion annually. In contrast, public police forces employ approximately 600,000 people and spend USD30 billion annually. Private policing promises to be a big part of the response to today's increased security concerns, as citizens realize that security is much more than the presence of guards and the perception of safety. This book addresses the impact and implications of private policing on public streets, and begins with a look at private policing from conceptual, historical, economic, legal and functional perspectives. These approaches provide the background for the text, which focuses on a private policing patrol program in a community on the south side of Chicago. The text also demonstrates a number of substantive legal and public policy issues which directly or indirectly relate to the provision of security services; some people see the need for a ""dual system"" of policing - one for the wealthy and one for the poor - and others see the provision of private security as the primary protective resource in contemporary America. The author also examines how private policing is different from and similar to public policing.
Private Security Law: Case Studies is uniquely designed for the
special needs of private security practitioners, students, and
instructors. Part One of the book encompasses negligence,
intentional torts, agency contracts, alarms, and damages. Part Two
covers authority of the private citizen, deprivation of rights, and
entrapment. |
![]() ![]() You may like...
Transducers and Arrays for Underwater…
John L. Butler, Charles H Sherman
Hardcover
Spotlight-Mode Synthetic Aperture Radar…
Charles V. J. Jakowatz, Daniel E. Wahl, …
Hardcover
R7,079
Discovery Miles 70 790
|