0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (5)
  • R250 - R500 (37)
  • R500+ (395)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Journalism, Citizenship and Surveillance Society (Hardcover): Karin Wahl-Jorgensen Journalism, Citizenship and Surveillance Society (Hardcover)
Karin Wahl-Jorgensen
R2,872 Discovery Miles 28 720 Ships in 12 - 17 working days

This book shows how surveillance society shapes and interacts with journalistic practices and discourses. It illustrates not only how surveillance debates play out in and through mediated discourses, but also how practices of surveillance inform the stories, everyday work and the ethics of journalists. The increasing entrenchment of data collection and surveillance in all kinds of social processes raises important questions around new threats to journalistic freedom and political dissent; the responsibilities of media organizations and state actors; the nature of journalists' relationship to the state; journalists' ability to protect their sources and data; and the ways in which media coverage shape public perceptions of surveillance, to mention just a few areas of concern. Against this backdrop, the contributions gathered in this book examine areas including media coverage of surveillance, encryption and privacy; journalists' views on surveillance and security; public debate around the power of intelligence agencies, and the strategies of privacy rights activists. The book raises fundamental questions around the role of journalism in creating the conditions for digital citizenship. The chapters in this book were originally published in a special issue of the journal, Digital Journalism.

Friendly Fire (Paperback): Ami Ayalon Friendly Fire (Paperback)
Ami Ayalon; As told to Anthony David; Foreword by Dennis Ross
R591 R527 Discovery Miles 5 270 Save R64 (11%) Ships in 9 - 15 working days

A powerful personal testimony and an urgent call for Israel to change direction, from an unexpected source: the former director of the internal security service, Shin Bet.

Raised on a kibbutz by parents who had fled the Holocaust, Ami Ayalon’s life exemplified the Zionist dream. His commitment to his country propelled a meteoric career, culminating in being named commander of the navy and receiving the Medal of Valour, Israel’s highest military decoration. All the time, he remained a staunch supporter of his country’s policies.

Then he was appointed director of the Shin Bet, Israel’s internal security service, and the unexpected happened. Forced to try and understand the lives and motivations of Palestinians for the first time, he gained empathy for ‘the enemy’ and learned that when Israel carries out anti-terrorist operations in a political context of hopelessness, the Palestinian public will support violence, because they have nothing to lose.

He came to understand that his patriotic life had blinded him to the self-defeating nature of policies that have undermined Israel’s civil society while heaping humiliation upon its neighbours. In this deeply personal journey of discovery, Ami Ayalon seeks input and perspectives from Palestinians and Israelis whose experiences differ from his own, and draws radical conclusions about what Israel must do to achieve relative peace and security.

Health, Safety, and Accident Management in the Chemical Process Industries - A Complete Compressed Domain Approach (Paperback,... Health, Safety, and Accident Management in the Chemical Process Industries - A Complete Compressed Domain Approach (Paperback, 2nd edition)
Ann Marie Flynn, Louis Theodore
R2,139 Discovery Miles 21 390 Ships in 12 - 17 working days

"Analyzes health and hazard risk assessment in commercial, industrial, and refining industries. Emphasizes legal requirements, emergency planning and response, safety equipment, process implementation, and occupational and environmental protection exposure guidelines. Presents applicatoins and calculations for risk analysis of real systems, as well as numerous end-of-chapter examples and references."

Building an Effective Information Security Policy Architecture (Paperback): Sandy Bacik Building an Effective Information Security Policy Architecture (Paperback)
Sandy Bacik
R2,032 Discovery Miles 20 320 Ships in 12 - 17 working days

Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.

Software Deployment, Updating, and Patching (Paperback): Bill Stackpole, Patrick Hanrion Software Deployment, Updating, and Patching (Paperback)
Bill Stackpole, Patrick Hanrion
R1,949 Discovery Miles 19 490 Ships in 12 - 17 working days

The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations. Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing systems with the latest packs and patches. Written by two of Microsoft's top experts, this clear and concise manual demonstrates how to perform inventories of IT assets, test compatibility, target deployment, and evaluate management technologies. It also shows you how to create and implement your own deployment plans with recovery and remediation options, and how to recognize potential vulnerabilities.

Snowden's Box - Trust in the Age of Surveillance (Paperback): Jessica Bruder, Dale Maharidge Snowden's Box - Trust in the Age of Surveillance (Paperback)
Jessica Bruder, Dale Maharidge
R306 R264 Discovery Miles 2 640 Save R42 (14%) Ships in 9 - 15 working days

One day in the spring of 2013, a box appeared outside a fourth-floor apartment door in Brooklyn, New York. The recipient, who didn't know the sender, only knew she was supposed to bring this box to a friend, who would ferry it to another friend. This was Edward Snowden's box-printouts of documents proving that the US government had built a massive surveillance apparatus and used it to spy on its own people-and the friend on the end of this chain was filmmaker Laura Poitras. Thus the biggest national security leak of the digital era was launched via a remarkably analog network, the US Postal Service. This is just one of the odd, ironic details that emerges from the story of how Jessica Bruder and Dale Maharidge, two experienced journalists but security novices (and the friends who received and ferried the box) got drawn into the Snowden story as behind-the-scenes players. Their initially stumbling, increasingly paranoid, and sometimes comic efforts to help bring Snowden's leaks to light, and ultimately, to understand their significance, unfold in an engrossing narrative that includes emails and diary entries from Poitras. This is an illuminating essay on the status of transparency, privacy, and trust in the age of surveillance.

Bleeding Out - The Devastating Consequences of Urban Violence--And a Bold New Plan for Peace in the Streets (Hardcover): Thomas... Bleeding Out - The Devastating Consequences of Urban Violence--And a Bold New Plan for Peace in the Streets (Hardcover)
Thomas Abt 1
R789 R696 Discovery Miles 6 960 Save R93 (12%) Ships in 10 - 15 working days
Surviving the International War Zone - Security Lessons Learned and Stories from Police and Military Peacekeeping Forces... Surviving the International War Zone - Security Lessons Learned and Stories from Police and Military Peacekeeping Forces (Paperback)
Robert R Rail
R2,076 Discovery Miles 20 760 Ships in 12 - 17 working days

Few people are better able to describe how to survive in a war zone than those who have seen, experienced, and lived it first-hand. Comprised of a collection of original stories from international contributors, Surviving the International War Zone: Security Lessons Learned and Stories from Police and Military Peacekeeping Forces contains true accounts of unimaginable scenarios that could only occur in war-torn and conflict-ridden areas. Presenting accounts written by military and police officers who lived in different dangerous regions across the world, the book offers an inside look at the lives of the officers and the local people living in the war zone environment. Covering many facets of daily life, the book helps readers understand how to survive in deadly terrain. With contributions from soldiers and law enforcement personnel from 13 different countries who have lived and served in Iraq, Afghanistan, Sudan, Bosnia, Kosovo, East Timor, Cambodia, Haiti, and Liberia, the book includes practical tips for day-to-day life in a war zone. It examines topics such as: Surviving extreme temperatures and staying healthy Interacting with the indigenous population and cultural awareness Adjusting to the challenges of limited technology and resources Protecting oneself from the imminent threat of violence that is present in all war-torn regions Enhanced with photographs from the war zone, the stories in this volume range from accounts of unspeakable torture, to descriptions of deplorable living conditions, to moments of humor. Some of the stories will make you laugh; others may make you cry. Ultimately, the book provides an unparalleled insight into the full range of deep-seated and sometimes conflicting emotions of the people who have lived and served in war zones and have come home to tell about it.

The Future of U.S.-India Security Cooperation (Paperback): Sumit Ganguly, M. Chris Mason The Future of U.S.-India Security Cooperation (Paperback)
Sumit Ganguly, M. Chris Mason
R976 Discovery Miles 9 760 Ships in 12 - 17 working days

This book deals with the evolution, current status and potential of U.S.-India strategic cooperation. From very modest beginnings, the U.S.-India strategic partnership has developed significantly over the last decade. In considerable part, this growth has stemmed from overlapping concerns about the rise and assertiveness of the People's Republic of China, as well as the instability of Pakistan. Despite the emergence of this partnership, significant differences remain, some of which stem from Cold War legacies, others from divergent global strategic interests and institutional design. In spite of these areas of discord, the overall trajectory of the relationship appears promising. Increased cooperation and closer policy coordination underscore a deepening of the relationship, while fundamental differences in national approaches to strategic challenges demand flexibility and compromise in the future. -- .

Privacy Matters - Conversations about Surveillance Within and Beyond the Classroom (Paperback): Privacy Matters - Conversations about Surveillance Within and Beyond the Classroom (Paperback)
R726 Discovery Miles 7 260 Ships in 12 - 17 working days
Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback): Chuck Wilson Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback)
Chuck Wilson
R1,127 Discovery Miles 11 270 Ships in 12 - 17 working days

As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.

The Sociology of Privatized Security (Hardcover, 1st ed. 2019): Ori Swed, Thomas Crosbie The Sociology of Privatized Security (Hardcover, 1st ed. 2019)
Ori Swed, Thomas Crosbie
R3,577 Discovery Miles 35 770 Ships in 10 - 15 working days

The first book dedicated to the sociology of privatized security, this collection studies the important global trend of shifting security from public to private hands and the associated rise of Private Military and Security Companies (PMSCs) and their contractors. The volume first explores the trend itself, making important historical and theoretical revisions to the existing social science of private security. These chapters discuss why rulers buy, rent and create private militaries, why mercenaries have become private patriots, and why the legitimacy of military missions is undermined by the use of contractors. The next section challenges the idea that states have a monopoly on legitimate violence and questions our legal and economic assumptions about private security. The collection concludes with a discussion of the contractors themselves, focusing on gender, race, ethnicity, and other demographic factors. Featuring a mix of qualitative and quantitative methods and a range of theoretical and methodological innovations, this book will inspire sociologists to examine, with fresh eyes, the behind-the-scenes tension between the high drama of war and conflict and the mundane realities of privatized security contractors and their everyday lives.

Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed): Amy Zegart Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed)
Amy Zegart
R736 Discovery Miles 7 360 Ships in 12 - 17 working days

In this provocative and thoughtful book, Amy Zegart challenges the conventional belief that national security agencies work reasonably well to serve the national interest as they were designed to do. Using a new institutionalist approach, Zegart asks what forces shaped the initial design of the Central Intelligence Agency, the Joint Chiefs of Staff, and the National Security Council in ways that meant they were handicapped from birth.
Ironically, she finds that much of the blame can be ascribed to cherished features of American democracy--frequent elections, the separation of powers, majority rule, political compromise--all of which constrain presidential power and give Congress little incentive to create an effective foreign policy system. At the same time, bureaucrats in rival departments had the expertise, the staying power, and the incentives to sabotage the creation of effective competitors, and this is exactly what they did.
Historical evidence suggests that most political players did not consider broad national concerns when they forged the CIA, JCS, and NSC in the late 1940s. Although President Truman aimed to establish a functional foreign policy system, he was stymied by self-interested bureaucrats, legislators, and military leaders. The NSC was established by accident, as a byproduct of political compromise; Navy opposition crippled the JCS from the outset; and the CIA emerged without the statutory authority to fulfill its assigned role thanks to the Navy, War, State, and Justice departments, which fought to protect their own intelligence apparatus.
Not surprisingly, the new security agencies performed poorly as they struggled to overcome their crippled evolution. Only the NSC overcame its initial handicaps as several presidents exploited loopholes in the National Security Act of 1947 to reinvent the NSC staff. The JCS, by contrast, remained mired in its ineffective design for nearly forty years--i.e., throughout the Cold War--and the CIA's pivotal analysis branch has never recovered from its origins. In sum, the author paints an astonishing picture: the agencies Americans count on most to protect them from enemies abroad are, by design, largely incapable of doing so.

Handbook of SCADA/Control Systems Security (Hardcover, 2nd edition): Robert Radvanovsky, Jacob Brodsky Handbook of SCADA/Control Systems Security (Hardcover, 2nd edition)
Robert Radvanovsky, Jacob Brodsky; Burt G. Look
R4,599 Discovery Miles 45 990 Ships in 12 - 17 working days

This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized. Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in Social implications and impacts Governance and management Architecture and modeling Commissioning and operations The future of SCADA and control systems security The book also includes four case studies of well-known public cyber security-related incidents. The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.

The Stasi - Myth and Reality (Hardcover): Mike Dennis, Norman Laporte The Stasi - Myth and Reality (Hardcover)
Mike Dennis, Norman Laporte
R4,565 Discovery Miles 45 650 Ships in 12 - 17 working days

The East German Ministry of State Security, popularly known as the Stasi, was one of the largest and most intrusive secret police systems in world history. So extensive was the system of surveillance and control that in any given year throughout the 1970s and 1980s, about one in fifty of the 13 million East German adults were working for the Stasi either as an officer or as an informer. Drawing on original sources from the Stasi archives and the recollections of contemporary witnesses, The Stasi: Myth and Reality reveals the intricacies of the relationship between the Stasi enforcers, its agents and its targets/victims, and demonstrates how far the Stasi octopus extended its tentacles into people's lives and all spheres of society. The origins and developments of this vast system of repression are examined, as well as the motivation of the informers and the ways in which they penetrated the niches of East German society. The final chapters assess the ministry's failure to help overcome the GDR's inherent structural defects and demonstrate how the Stasi's bureaucratic procedures contributed to the implosion of the Communist system at the end of the 1980's.

From Police to Security Professional - A Guide to a Successful Career Transition (Paperback): Michael S. D'Angelo From Police to Security Professional - A Guide to a Successful Career Transition (Paperback)
Michael S. D'Angelo
R1,690 Discovery Miles 16 900 Ships in 12 - 17 working days

Former police and military personnel possess attractive skill sets for the private security industry; however, the transition to the corporate arena is not without challenges. Competition for these jobs is fierce. Many candidates possess degrees in security management-some having spent their entire professional careers in private security. From Police to Security Professional: A Guide to a Successful Career Transition provides tips on overcoming the inherent obstacles law enforcement professionals face in making the switch and supplies a practical roadmap for entry into the private security world. The foundation of the book comes from the author's own journey and the many hurdles he encountered transitioning to private sector security. With his help, you'll learn: The unique skills, experience, and mentality required to enter into the private security industry from a law enforcement background The opportunities available and the different areas within the industry-including benefits and income potential How to properly evaluate your training portfolio How to tailor your resume to garner the attention of hiring executives The many professional associations and certifications that could be helpful in your career Vital to your ability to succeed is understanding that security management has evolved into a distinct profession in its own right-one that brings with it different education, experience, and skill sets that clearly differentiate it from law enforcement. This book will help you better understand and be prepared for the policies, processes, and a corporate environment that operates in a very different way than the police structure to which you are accustomed. With the author's help, you'll give yourself every advantage to get the job and succeed in your new career.

Trade Secret Theft, Industrial Espionage, and the China Threat (Hardcover, New): Carl Roper Trade Secret Theft, Industrial Espionage, and the China Threat (Hardcover, New)
Carl Roper
R4,580 Discovery Miles 45 800 Ships in 12 - 17 working days

Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage as practiced by a range of nations from around the world-focusing on the mass scale in which information is being taken for China's growth and development. Supplying a current look at espionage, the book details the specific types of information China has targeted for its collection efforts in the past. It explains what China does to prepare for its massive collection efforts and describes what has been learned about China's efforts during various Congressional hearings, with expert advice and details from both the FBI and other government agencies. This book is the product of hundreds of hours of research, with material, both primary and secondary, reviewed, studied, and gleaned from numerous sources, including White House documentation and various government agencies. Within the text, you will learn the rationale and techniques used to obtain information in the past. You will see a bit of history over centuries where espionage has played a role in the economy of various countries and view some cases that have come to light when individuals were caught. The book supplies an understanding of how the economy of a nation can prosper or suffer, depending on whether that nation is protecting its intellectual property, or whether it is stealing such property for its own use. The text concludes by outlining specific measures that corporations and their employees can practice to protect their information and assets, both at home and abroad.

Security Management - A Critical Thinking Approach (Hardcover): Michael Land, Truett Ricks, Bobby Ricks Security Management - A Critical Thinking Approach (Hardcover)
Michael Land, Truett Ricks, Bobby Ricks
R3,740 R3,028 Discovery Miles 30 280 Save R712 (19%) Ships in 12 - 17 working days

Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.

The Private Is Political - Networked Privacy and Social Media (Hardcover): Alice E. Marwick The Private Is Political - Networked Privacy and Social Media (Hardcover)
Alice E. Marwick
R696 Discovery Miles 6 960 Ships in 12 - 17 working days

A compelling firsthand investigation of how social media and big data have amplified the close relationship between privacy and inequality   Online privacy is under constant attack by social media and big data technologies. But we cannot rely on individual actions to remedy this—it is a matter of social justice. Alice E. Marwick offers a new way of understanding how privacy is jeopardized, particularly for marginalized and disadvantaged communities—including immigrants, the poor, people of color, LGBTQ+ populations, and victims of online harassment.   Marwick shows that few resources or regulations for preventing personal information from spreading on the internet. Through a new theory of “networked privacy,†she reveals how current legal and technological frameworks are woefully inadequate in addressing issues of privacy—often by design. Drawing from interviews and focus groups encompassing a diverse group of Americans, Marwick shows that even heavy social media users care deeply about privacy and engage in extensive “privacy work†to protect it. But people are up against the violation machine of the modern internet. Safeguarding privacy must happen at the collective level.

Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Hardcover): Mark Tarallo Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Hardcover)
Mark Tarallo
R1,963 Discovery Miles 19 630 Ships in 12 - 17 working days

In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.

U.S. Government Counterterrorism - A Guide to Who Does What (Hardcover): Michael Kraft, Edward Marks U.S. Government Counterterrorism - A Guide to Who Does What (Hardcover)
Michael Kraft, Edward Marks
R6,882 Discovery Miles 68 820 Ships in 12 - 17 working days

U.S. Government Counterterrorism: A Guide to Who Does What is the first readily available, unclassified guide to the many U.S. government agencies, bureau offices, and programs involved in all aspects of countering terrorism domestically and overseas. The authors, veterans of the U.S. government's counterterrorism efforts, present a rare insider's view of the counterterrorism effort, addressing such topics as government training initiatives, weapons of mass destruction, interagency coordination, research and development, and the congressional role in policy and budget issues. Includes a Foreword by Brian Michael Jenkins, Senior Advisor RAND Corporation Individual chapters describe the various agencies, their bureaus, and offices that develop and implement the counterterrorism policies and programs, providing a useful unclassified guide to government officials at all levels as well as students and others interested in how the U.S. counters terrorism. The book also discusses the challenges involved in coordinating the counterterrorism efforts at federal, state, and local levels and explains how key terror events influenced the development of programs, agencies, and counterterrorism legislation. The legislative underpinnings and tools of the U.S. counterterrorism efforts are covered as are the oft-debated issues of defining terrorism itself and efforts to counter violent extremism. In addition to outlining the specific agencies and programs, the authors provide unique insights into the broader context of counterterrorism efforts and developments in the last 10-plus years since 9/11 and they raise future considerations given recent landscape-altering global events. The authors were interviewed by National Defense Magazine in a January 23, 2012 article entitled Counterterrorism 101: Navigating the Bureaucratic Maze. They were interviewed on April 30, 2012 by Federal News Radio. Michael Kraft was also interviewed on June 27, 2014 by Federal News Radio.

Air Transport Security - Issues, Challenges and National Policies (Hardcover): Joseph S. Szyliowicz, Luca Zamparini Air Transport Security - Issues, Challenges and National Policies (Hardcover)
Joseph S. Szyliowicz, Luca Zamparini
R3,558 Discovery Miles 35 580 Ships in 12 - 17 working days

This timely book provides a multidisciplinary and comparative analysis of the ongoing terrorist threats against all aspects of air transportation, the effectiveness of the responses, globally, regionally, and nationally, and the continuing challenges to policy makers seeking to achieve a safe and secure global aviation system. The first section provides an overview of the industry?'s characteristics, the economic and regulatory issues shaping the security environment, such as legal frameworks and the role of the private sector in safeguarding passenger and air cargo flights. The second section provides comparative analyses of security policies and practices in several key countries: the United States, Canada, Brazil, Kenya, Israel, Malaysia, Japan and Australia. The book concludes with a comparative analysis of the contemporary state of aviation security policies and practices and its future challenges. Containing extensive interdisciplinary analyses of the main issues and challenges related to all aspects of aviation security, the book will be of great interest not only to scholars, students and practitioners concerned with aviation security, and to institutions that provide courses or programs in aviation management and related fields, but also to anyone dealing with such related topics as terrorism, public policy, transport, urban studies and logistics. Contributors include: H. Avilai, D. Brittin, E. Irandu, T. Prenzler, J. Price, P. Puri, D. Rhoades, F. Rossi Dal Pozzo, M.S. Sandhu, J. Szyliowicz, T. Udagawa, S. Vaithilingam, M.J. Williams, K. Zaidi, L. Zamparini

Police Reform in China (Hardcover): Kam C. Wong Police Reform in China (Hardcover)
Kam C. Wong
R4,595 Discovery Miles 45 950 Ships in 12 - 17 working days

With nearly 20 percent of the world 's population located in China, what happens there is significant to all nations. Sweeping changes have altered the cultural landscape of China, and as opportunities for wealth have grown in recent years, so have opportunities for crime. Police Reform in China provides a rare and insightful glimpse of policing in the midst of such change.

The book begins with a historical account of police reform in the region since 2000. Next, it discusses the difficulties encountered in trying to understand Chinese policing, such as outdated perceptions, misinformation, cultural ignorance, ideological hegemony, and problems with paternalistic attitudes. The book recommends studying China from a local perspective informed by local research and data, suggesting that understanding China requires a cultural shift to the Chinese way of life in "thinking" and, more importantly, "feeling."

The author then summarizes selected policy papers from Gongan Yanjiu, a leading international policy journal. He first documents how the thinking and aspirations of various generations of Chinese leaders from Mao to Deng, and now Jiang and Hu, came to affect Chinese policing in theory and practice. He then addresses the emergence of a police legitimacy crisis as evidenced by the deterioration of public image and rebellions against police authority. Demonstrating how old ideologies are increasingly in conflict with the values and lifestyles of a new mentality, the book discusses steps that can be taken to improve professionalism. The final chapters investigate such problems as abuses of discretion and the improper use of firearms and highlight the importance of understanding the Chinese people, culture, values, and interests in order to truly effectuate successful police reform.

Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition): Rebecca Herold Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition)
Rebecca Herold
R4,288 Discovery Miles 42 880 Ships in 12 - 17 working days

Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:

  • Lists the laws and associated excerpts of the specific passages that require training and awareness
  • Contains a plethora of forms, examples, and samples in the book's 22 appendices
  • Highlights common mistakes that many organizations make
  • Directs readers to additional resources for more specialized information
  • Includes 250 awareness activities ideas and 42 helpful tips for trainers

Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization.

Praise for:

The first edition was outstanding. The new second edition is even better ... the definitive and indispensable guide for information security and privacy awareness and training professionals, worth every cent. As with the first edition, we recommend it unreservedly..
-NoticeBored.com

Terrorism and Homeland Security - Perspectives, Thoughts, and Opinions (Hardcover): Dale L. June Terrorism and Homeland Security - Perspectives, Thoughts, and Opinions (Hardcover)
Dale L. June
R2,908 Discovery Miles 29 080 Ships in 12 - 17 working days

Since 9/11, the terms homeland security and terrorism have become firmly entrenched in our lexicon. The days of walking through a simple metal detector at the airport are over, and our security landscape is forever changed. Terrorism and Homeland Security: Perspectives, Thoughts, and Opinions brings together the work of academic researchers and law enforcement and intelligence personnel to present a sober appraisal of the issues surrounding the current state of our security infrastructure.

Topics highlighted in this thought-provoking volume include:

  • The history of terrorism; the growth of the Taliban, Hamas, and Hezbollah; and the rise of transnational anti-Western Islamism
  • Progress made in protecting nations and individuals from terrorism
  • An analysis of a captured al-Qaeda training manual
  • The concept of martyrdom and suicide bombing
  • Political and strategic warfare and propaganda
  • Cooperative antiterrorism efforts between the United States and the European Union
  • Chemical, biological, radiological, and nuclear terrorism
  • Insider threats and how citizens can help their communities be vigilant about detecting terrorism
  • Intelligence gathering by means of interpersonal contact
  • Terrorist threats south of the border
  • Tools for locating bomb makers and clandestine labs

An examination of the causes and effects of terrorism and the complicated issues surrounding homeland security, this thought-provoking anthology provides a broad perspective for understanding the threat we face and how we can best meet the challenges of 21st century homeland security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Voices - Tributes in memory of Shamar…
Sharon Gamsby Hardcover R1,132 Discovery Miles 11 320
Sardonic Wrath
Darkthrone CD R293 Discovery Miles 2 930
Perfect Clarity - A Tibetan Buddhist…
Padmasambhava Guru Rinpoche, Milarepa Yogi, … Paperback R493 R461 Discovery Miles 4 610
Kingdom of Madness
edguy CD R369 Discovery Miles 3 690
Afspraak Met Moord - In Die Kake Van Die…
Jana Marx Paperback R320 R300 Discovery Miles 3 000
Crocheted Wreaths and Garlands - 35…
Kate Eastwood Paperback  (1)
R423 R378 Discovery Miles 3 780
The Atlanta Ripper - The Unsolved Story…
Jeffrey C. Wells Paperback R548 R502 Discovery Miles 5 020
Best in Show: Knit Your Own Zoo
Joanna Osborne, Sally Muir Hardcover  (1)
R489 R367 Discovery Miles 3 670
The Bracelet
Becky Archibald Hardcover R513 Discovery Miles 5 130
Ordered by Love - An Introduction to…
Thomas M. Ward Hardcover R752 Discovery Miles 7 520

 

Partners