0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (40)
  • R500+ (418)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Targeted Violence - A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings (Hardcover, New):... Targeted Violence - A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings (Hardcover, New)
Glenn P. McGovern
R4,159 Discovery Miles 41 590 Ships in 12 - 17 working days

Drawn from case examples of incidents from around the world, Targeted Violence A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics used, and groups responsible for targeted killings and kidnappings. The author, a former SWAT and JTTF team member whose experience includes providing protection to diplomats, high-ranking military personnel, prosecutors, and organized crime informants presents a wealth of global statistics on assassinations, contract killings, and kidnappings that have occurred from 1950 to the present.

Leaving no stone unturned, the book breaks down the various incidents of targeted violence by region, country, month, day of the week, and time of day. It reports on likely locations for each type of attack, success rates, who is likely to initiate the attacks, and who they are most likely to target. The book s easy-to-follow format allows readers, experienced or not in personal protective work, to determine the types of attacks known to have occurred in any region.

This complete reference includes 35 case studies that examine attacks on motorcades and pedestrians dating back to 1973 highlighting the lessons to be learned from each example. It analyzes the modus operandi of individual assailants and groups in order to determine commonalities between targeted victims and why certain groups tend to target a specific type of individual. The text concludes with a chapter on victimology.

Just like anyone, assassins and hit men fall into routines and can become creatures of habit. By studying and understanding the collection of historical information contained in these pages, security, military, and law enforcement professionals responsible for providing protection will be better prepared to identify potential threats and develop the tactics needed to thwart such attacks.

Negotiating Claims - The Emergence of Indigenous Land Claim Negotiation Policies in Australia, Canada, New Zealand, and the... Negotiating Claims - The Emergence of Indigenous Land Claim Negotiation Policies in Australia, Canada, New Zealand, and the United States (Paperback)
Christa Scholtz
R1,476 Discovery Miles 14 760 Ships in 12 - 17 working days

Why do governments choose to negotiate indigenous land claims rather than resolve claims through some other means? In this book Scholtz explores why a government would choose to implement a negotiation policy, where it commits itself to a long-run strategy of negotiation over a number of claims and over a significant course of time.

Through an examination strongly grounded in archival research of post-World War Two government decision-making in four established democracies - Australia, Canada, New Zealand, and the United States - Scholtz argues that negotiation policies emerge when indigenous people mobilize politically prior to significant judicial determinations on land rights, and not after judicial change alone. Negotiating Claims links collective action and judicial change to explain the emergence of new policy institutions.

Small Arms and Security - New Emerging International Norms (Paperback): Denise Garcia Small Arms and Security - New Emerging International Norms (Paperback)
Denise Garcia
R1,390 Discovery Miles 13 900 Ships in 12 - 17 working days

This book examines the emergence of new international norms to govern the spread of small arms, and the extent to which these norms have been established in the policies and practices of states, regions and international organizations. It also attempts to establish criteria for assessing norm emergence, and to assess the process of norm development by comparing what actually happens at the multilateral level.
If norm-making on small arms and related multilateral negotiations have mostly dealt with 'illicit arms', and most of the norms examined here fall on the arms supplier side of the arms equation, the author argues that the creation of international norms and the setting of widely agreed standards amongst states on all aspects of the demand for, availability, and spread of both legal and illegal small arms and light weapons must become central to the multilateral coordination of policy responses in order to tackle the growing violence associated with small arms availability.
Small Arms and Security will be of interest to researchers and professionals in the fields of peace and conflict studies, global governance, international security and disarmament.

NATO, Security and Risk Management - From Kosovo to Khandahar (Hardcover): M.J. Williams NATO, Security and Risk Management - From Kosovo to Khandahar (Hardcover)
M.J. Williams
R4,583 Discovery Miles 45 830 Ships in 12 - 17 working days

This new volume explores the crisis in transatlantic relations and analyses the role of NATO following the collapse of the Soviet Union. The book offers a unified theory of cooperation in the new security paradigm to explain the current state of transatlantic relations and NATO's failure to adequately transform itself into a security institution for the 21st century. It argues that a new preoccupation with risk filled the vacuum left by the collapse of the Soviet Union, and uses the literature of the Risk Society to analyse the strained politics of the North Atlantic community. Using case studies to show how the West has pursued a strategy of risk management, and the effect this has had on NATO's politics, the book argues that a better understanding of how risk affects Western political cohesion will allow policy makers a way of adapting the structure of NATO to make it more effective as a tool for security. Having analysed NATO's recent failings, the book offers a theory for the way in which it can become an active risk manager, through the replacement of its established structure by smaller, ad hoc groupings.

The Business of Criminal Justice - A Guide for Theory and Practice (Hardcover): Daniel Adrian Doss, Chengqi Guo, Joo Young Lee The Business of Criminal Justice - A Guide for Theory and Practice (Hardcover)
Daniel Adrian Doss, Chengqi Guo, Joo Young Lee
R5,346 Discovery Miles 53 460 Ships in 12 - 17 working days

This book represents the manifestation of a new presentation of old perspectives within the discipline of criminal justice. It contains practical considerations of rendering such decisions, it is expected to be an appropriate reference among practitioner personnel.

Corporate Security in the Asia-Pacific Region - Crisis, Crime, Fraud, and Misconduct (Paperback): Christopher J. Cubbage, CPP,... Corporate Security in the Asia-Pacific Region - Crisis, Crime, Fraud, and Misconduct (Paperback)
Christopher J. Cubbage, CPP, David J. Brooks, PhD
R1,802 Discovery Miles 18 020 Ships in 12 - 17 working days

As corporations and governments become more litigious and risk averse, international risk management becomes more complex. Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct examines real cases of corporate crisis, crime, fraud, and other misconduct that corporate security professionals need to be aware of to effectively protect people, operations, and assets within the region. Current security threats and risks are addressed to help readers conduct an informed risk assessment and analysis of operational risk. Providing detailed guidance on how to address the unique threats and risks in this dynamic and growing business environment, the book: Presents an overview of the region, with relevant historical background Offers recent case examples of crime and common issues facing a given region or country Highlights the range and frequency of corporate security-related breaches and crimes specific to countries in the region Provides detailed write-ups of every country in the region including the major players-Japan, China, India, Indonesia, Singapore, Malaysia, Thailand, and the Philippines Outlines security best practices for navigating the political and law enforcement challenges involved with operating in the region This book provides readers with the regional snapshot and geo-political background needed to understand the cultural differences, challenges, and the state of affairs for any country in the region. Filled with detailed cases of crime, theft of trade secrets, risk factors, and best practices, this book provides the real-world understanding you'll need to conduct better-informed security management that will lead to improved decisions on how to protect your people and assets in the Asia-Pacific region.

Private Security and Domestic Violence - The Risks and Benefits of Private Security Companies Working With Victims of Domestic... Private Security and Domestic Violence - The Risks and Benefits of Private Security Companies Working With Victims of Domestic Violence (Hardcover)
Diarmaid Harkin
R4,128 Discovery Miles 41 280 Ships in 12 - 17 working days

Private companies are increasingly involved with the security of domestic violence victims. This has manifested in a number of ways, including private security companies working in partnership with domestic violence services, the proliferation of security-technology companies that seek a market within the domestic violence sector, and governments contracting private companies to provide security provision for victims. Private Security and Domestic Violence offers a world-first analysis of the risks and benefits of for-profit businesses engaging with a vulnerable and underprotected section of society. Based on original data gathered in Australia, this book provides internationally relevant insights on the dangers but also the potential benefits of increasing private sector involvement with victims of domestic abuse. It offers a unique crossover of the literature on private security, crime prevention and domestic violence. Aimed at scholars, policymakers, and frontline workers within the domestic violence sector, Private Security and Domestic Violence documents experimental new collaborations and partnerships between the private, community and governmental spheres and makes a case for the suitable regulatory solutions to be put in place to successfully manage private security involvement with domestic violence victims. By outlining the risks and the benefits of this new form of security provision and detailing a potential model of regulation, this book offers a pathway for improving how we provide for a chronically underprotected population. It will be of interest to criminology and criminal justice students and researchers engaged in studies of abuse, domestic violence, violent crime, victims and victimology, crime prevention, and security.

Small Arms and Security - New Emerging International Norms (Hardcover, New): Denise Garcia Small Arms and Security - New Emerging International Norms (Hardcover, New)
Denise Garcia
R4,259 Discovery Miles 42 590 Ships in 10 - 15 working days

This book examines the emergence of new international norms to govern the spread of small arms, and the extent to which these norms have been established in the policies and practices of states, regions and international organizations. It also attempts to establish criteria for assessing norm emergence, and to assess the process of norm development by comparing what actually happens at the multilateral level. If norm-making on small arms and related multilateral negotiations have mostly dealt with 'illicit arms', and most of the norms examined here fall on the arms supplier side of the arms equation, the author argues that the creation of international norms and the setting of widely agreed standards amongst states on all aspects of the demand for, availability, and spread of both legal and illegal small arms and light weapons must become central to the multilateral coordination of policy responses in order to tackle the growing violence associated with small arms availability. Small Arms and Security will be of interest to researchers and professionals in the fields of peace and conflict studies, global governance, international security and disarmament.

Casino and Gaming Resort Investigations (Hardcover): Derk J. Boss, Alan W. Zajic Casino and Gaming Resort Investigations (Hardcover)
Derk J. Boss, Alan W. Zajic
R4,152 Discovery Miles 41 520 Ships in 12 - 17 working days

Casino and Gaming Resort Investigations addresses the continued and growing need for gaming security professionals to properly and successfully investigate the increasing and unique types of crime they will face in their careers. As the gaming industry has grown, so has the need for competent and highly skilled investigators who must be prepared to manage a case of employee theft one day to a sophisticated sports book scam the next. This book provides the reader with the fundamental knowledge needed to understand how each gaming and non-gaming department functions and interacts within the overall gaming resort, allowing the investigator to determine and focus on the important elements of any investigation in any area. Each chapter delivers a background of a department or type of crime normally seen in the gaming environment, and then discusses what should be considered important or even critical for the investigator to know or determine in the course of the investigation. Likely scenarios, case histories, and tips, as well as cautions for investigators to be aware of, are used throughout the book. This book was written for and directed at gaming security and surveillance professionals, including gaming regulators, and tribal gaming authorities, who are almost daily confronted by the ingenious and the most common scams, theft, and frauds that are perpetrated in the gaming world.

Vision in Japanese Entrepreneurship - The Evolution of a Security Enterprise (Hardcover): H.T. Shimazaki Vision in Japanese Entrepreneurship - The Evolution of a Security Enterprise (Hardcover)
H.T. Shimazaki
R2,676 R2,100 Discovery Miles 21 000 Save R576 (22%) Ships in 12 - 17 working days

The service sector occupies a dominant position in the Japanese economy, yet few studies have looked at the way the industry developed. This book, first published in 1992, focuses on the growth and development of a major world security and communications corporation, SECOM. The success of the company has been rooted in the management strategies of Makoto Iida, who has shaped the company from a small localized business to an international industry at the forefront of innovation. The book first looks at the background of Makoto Iida, offering an insight into the nature of an entrepreneur and the issues this raises within the context of Japanese management styles. It then follows the company development stage by stage, assessing the importance of individual creativity in adapting and implementing traditional management techniques. It shows how strategies for human resources, service quality, new technology, globalization and corporate restructuring evolve within the context of a growing organization, and includes an analysis of the innovative marketing techniques and product development processes needed to sell security services to one of the world's safest countries.

The Private Is Political - Networked Privacy and Social Media (Hardcover): Alice E. Marwick The Private Is Political - Networked Privacy and Social Media (Hardcover)
Alice E. Marwick
R663 Discovery Miles 6 630 Ships in 12 - 17 working days

A compelling firsthand investigation of how social media and big data have amplified the close relationship between privacy and inequality   Online privacy is under constant attack by social media and big data technologies. But we cannot rely on individual actions to remedy this—it is a matter of social justice. Alice E. Marwick offers a new way of understanding how privacy is jeopardized, particularly for marginalized and disadvantaged communities—including immigrants, the poor, people of color, LGBTQ+ populations, and victims of online harassment.   Marwick shows that few resources or regulations for preventing personal information from spreading on the internet. Through a new theory of “networked privacy,†she reveals how current legal and technological frameworks are woefully inadequate in addressing issues of privacy—often by design. Drawing from interviews and focus groups encompassing a diverse group of Americans, Marwick shows that even heavy social media users care deeply about privacy and engage in extensive “privacy work†to protect it. But people are up against the violation machine of the modern internet. Safeguarding privacy must happen at the collective level.

Practical Hacking Techniques and Countermeasures (Hardcover): Mark D Spivey Practical Hacking Techniques and Countermeasures (Hardcover)
Mark D Spivey
R4,882 Discovery Miles 48 820 Ships in 12 - 17 working days

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

The Stasi - Myth and Reality (Paperback): Mike Dennis, Norman Laporte The Stasi - Myth and Reality (Paperback)
Mike Dennis, Norman Laporte
R1,835 Discovery Miles 18 350 Ships in 12 - 17 working days

A study of the powerful and much-feared East German Ministry of State Security from its establishment in 1950 to its fall in 1990.

The Stasi was a central institution of the GDR, and this book illuminates the nature and operation of the entire East German regime, addressing one of the most important topics in modern German history. The emphasis is primarily on the key years under Erich Honecker, who was Head of State from 1976 and ousted in 1989. The book looks at all aspects of the control, operation and impact of the security police, their methods, targets, structure, accountability, and in particular the crucial question of how far they were an arm of the ruling communist party or were themselves a virtually autonomous political actor.

Asset Protection and Security Management Handbook (Hardcover): James Walsh Asset Protection and Security Management Handbook (Hardcover)
James Walsh
R3,896 Discovery Miles 38 960 Ships in 12 - 17 working days

The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.

Based on the ASIS asset protection course, the text provides information vital to security planning and operational requirements. It addresses the most comonly recognized issues in the field and explores the future of asset protection management. The authors examine the latest in crime detection, prevention, and interrogation techniques. The Asset Protection and Security Management Handbook will not only help you to explore effective security training and educational programs for your organization, but will also help you discover proven methods of selling your security program to top management.

Professional Security Management - A Strategic Guide (Hardcover): Charles Swanson Professional Security Management - A Strategic Guide (Hardcover)
Charles Swanson
R1,599 Discovery Miles 15 990 Ships in 9 - 15 working days

Historically, security managers have tended to be sourced from either the armed forces or law enforcement. But the increasing complexity of the organisations employing them, along with the technologies employed by them, is forcing an evolution and expansion of the role, and security managers must meet this challenge in order to succeed in their field and protect the assets of their employers. Risk management, crisis management, continuity management, strategic business operations, data security, IT, and business communications all fall under the purview of the security manager. This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses. It covers the basics of strategy, risk, and technology from the perspective of the security manager, focussing only on the 'need to know'. The reader will benefit from an understanding of how risk management aligns its functional aims with the strategic goals and operations of the organisation. This essential book supports professional vocational accreditation and qualifications, such as the Chartered Security Professional (CSyP) or Certified Protection Professional (CPP), and advises on pathways to higher education qualifications in the fields of security and risk management. It is ideal for any risk manager looking to further their training and development, as well as being complementary for risk and security management programs with a focus on practice.

Science and Technology of Terrorism and Counterterrorism (Paperback, 2nd edition): Tushar K. Ghosh, Mark A. Prelas, Dabir S.... Science and Technology of Terrorism and Counterterrorism (Paperback, 2nd edition)
Tushar K. Ghosh, Mark A. Prelas, Dabir S. Viswanath, Sudarshan K. Loyalka; Thomas M. Haladyna
R1,914 Discovery Miles 19 140 Ships in 12 - 17 working days

Traditionally, resources on terrorism and counterterrorism tend to focus on the social, behavioral, and legal aspects of the subject, with minimal emphasis on the scientific and technological aspects. Taking into account these practical considerations, the second edition of Science and Technology of Terrorism and Counterterrorism discusses the nature of terrorism and the materials used by terrorists. It describes how intelligence professionals and law enforcement personnel can detect and destroy these materials, and how they can deal with terrorist groups. This volume begins by introducing the shift in analysis of terrorist attacks after September 11, 2001 and summarizes selected case studies. It discusses the origin and nature of terrorism and the factors involved in diplomacy. Covering a broad range of topics, the book examines: Aerosol dispersion of toxic materials Bioterrorism and the manufacture, detection, and delivery of biological agents Agricultural terrorism Nuclear terrorism and nuclear weapons systems, threats, and safeguards Chemical terrorism, including manufacture, detection, delivery, and decontamination Cyber-terrorism Personal protective equipment The role of government at federal, state, and local levels The role of international agencies and their resources, capabilities, and responsibilities The National Infrastructure Protection Plan As terrorist activities increase globally, it is critical that those charged with protecting the public understand the myriad of ways in which terrorists operate. While we cannot predict where, when, and how terrorists will strike, our vigilance in staying abreast of the terrorist threat is the only way to have a fighting chance against those who seek to destroy our world.

Surveillance, Privacy and Public Space (Hardcover): Bryce Clayton Newell, Tjerk Timan, Bert-Jaap Koops Surveillance, Privacy and Public Space (Hardcover)
Bryce Clayton Newell, Tjerk Timan, Bert-Jaap Koops
R4,139 Discovery Miles 41 390 Ships in 12 - 17 working days

Today, public space has become a fruitful venue for surveillance of many kinds. Emerging surveillance technologies used by governments, corporations, and even individual members of the public are reshaping the very nature of physical public space. Especially in urban environments, the ability of individuals to remain private or anonymous is being challenged. Surveillance, Privacy, and Public Space problematizes our traditional understanding of 'public space'. The chapter authors explore intertwined concepts to develop current privacy theory and frame future scholarly debate on the regulation of surveillance in public spaces. This book also explores alternative understandings of the impacts that modern living and technological progress have on the experience of being in public, as well as the very nature of what public space really is. Representing a range of disciplines and methods, this book provides a broad overview of the changing nature of public space and the complex interactions between emerging forms of surveillance and personal privacy in these public spaces. It will appeal to scholars and students in a variety of academic disciplines, including sociology, surveillance studies, urban studies, philosophy, law, communication and media studies, political science, and criminology.

Business Theft and Fraud - Detection and Prevention (Hardcover): James R. Youngblood Business Theft and Fraud - Detection and Prevention (Hardcover)
James R. Youngblood
R5,330 Discovery Miles 53 300 Ships in 12 - 17 working days

Business Theft and Fraud: Detection and Prevention offers a broad perspective on business-related theft, providing a detailed discussion of numerous avenues of theft, including internal and external fraud, organized retail crime, mortgage fraud, cyber fraud, and extortion. Combining current research and the author's extensive experience with loss prevention and security, this professional text identifies industry trouble areas and offers techniques to combat business theft, such as how to identify sales underreporting, track sales by shifts, and educate employees on computer-related fraud. This publication is critical for those involved with loss prevention, security, or criminal justice. Business Theft and Frauds accessible, franchise-oriented scope will help many professionals identify and thwart threats in the evolving business world.

Physical Security and Safety - A Field Guide for the Practitioner (Hardcover): Truett A Ricks, Bobby E. Ricks, Jeffrey Dingle Physical Security and Safety - A Field Guide for the Practitioner (Hardcover)
Truett A Ricks, Bobby E. Ricks, Jeffrey Dingle
R5,335 Discovery Miles 53 350 Ships in 12 - 17 working days

How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the procedures and processes needed for loss reduction, protection of organizational assets, and security and safety management. Presents Vital Information on Recognizing and Understanding Security Needs The book is divided into two parts. The first half of the text, Security and Safety Planning, explores the theory and concepts of security and covers: threat decomposition, identifying security threats and vulnerabilities, protection, and risk assessment. The second half, Infrastructure Protection, examines the overall physical protection program and covers: access and perimeter control, alarm systems, response force models, and practical considerations for protecting information technology (IT). Addresses general safety concerns and specific issues covered by Occupational Safety and Health Administration (OSHA) and fire protection regulations Discusses security policies and procedures required for implementing a system and developing an attitude of effective physical security Acts as a handbook for security applications and as a reference of security considerations Physical Security and Safety: A Field Guide for the Practitioner offers relevant discourse on physical security in the workplace, and provides a guide for security, risk management, and safety professionals.

Web Security - A WhiteHat Perspective (Hardcover): Hanqing Wu, Liz Zhao Web Security - A WhiteHat Perspective (Hardcover)
Hanqing Wu, Liz Zhao
R5,235 Discovery Miles 52 350 Ships in 12 - 17 working days

In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.

Managing A Network Vulnerability Assessment (Hardcover): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Hardcover)
Thomas R. Peltier, Justin Peltier, John A Blackley
R4,903 Discovery Miles 49 030 Ships in 12 - 17 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R4,898 Discovery Miles 48 980 Ships in 12 - 17 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Security Strategy - From Requirements to Reality (Hardcover): Bill Stackpole, Eric Oksendahl Security Strategy - From Requirements to Reality (Hardcover)
Bill Stackpole, Eric Oksendahl
R5,208 Discovery Miles 52 080 Ships in 12 - 17 working days

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise. Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.

Business Continuity Planning - Protecting Your Organization's Life (Hardcover): Ken Doughty Business Continuity Planning - Protecting Your Organization's Life (Hardcover)
Ken Doughty
R3,724 Discovery Miles 37 240 Ships in 12 - 17 working days

From fires, floods, and power outages to hackers and software problems, companies need to protect against a variety of threats. Business Continuity Planning takes a best practices approach to provide a comprehensive continuity solution. It details how to build a plan to handle disruptions in business, keep vital operations up and running, and prevent losses that occur when productivity is crippled or security is compromised. The book explains how to evaluate a current plan for completeness and how to monitor and maintain it to ensure it remains up-to-date.

Essentials of Modeling and Analytics - Retail Risk Management and Asset Protection (Hardcover): David B. Speights, Daniel M.... Essentials of Modeling and Analytics - Retail Risk Management and Asset Protection (Hardcover)
David B. Speights, Daniel M. Downs, Adi Raz
R4,020 Discovery Miles 40 200 Ships in 12 - 17 working days

Essentials of Modeling and Analytics illustrates how and why analytics can be used effectively by loss prevention staff. The book offers an in-depth overview of analytics, first illustrating how analytics are used to solve business problems, then exploring the tools and training that staff will need in order to engage solutions. The text also covers big data analytical tools and discusses if and when they are right for retail loss prevention professionals, and illustrates how to use analytics to test the effectiveness of loss prevention initiatives. Ideal for loss prevention personnel on all levels, this book can also be used for loss prevention analytics courses. Essentials of Modeling and Analytics was named one of the best Analytics books of all time by BookAuthority, one of the world's leading independent sites for nonfiction book recommendations.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Privacy in Practice - Establish and…
Alan Tang Paperback R1,390 Discovery Miles 13 900
Ransomware and Cybercrime
Andrew Jenkinson Paperback R963 Discovery Miles 9 630
Digital Blood on Their Hands - The…
Andrew Jenkinson Paperback R881 Discovery Miles 8 810
Cognitive Risk
James Bone, Jessie H Lee Paperback R1,123 Discovery Miles 11 230
Zero Trust Journey Across the Digital…
Abbas Kudrati, Binil A. Pillai Paperback R1,414 Discovery Miles 14 140
Access Rules - Freeing Data from Big…
Viktor Mayer-Schoenberger, Thomas Ramge Hardcover R554 Discovery Miles 5 540
Interviewing Vulnerable Suspects…
Jane Tudor-Owen, Celine van Golde, … Hardcover R3,755 Discovery Miles 37 550
The Auditor's Guide to Blockchain…
Shaun Aghili Hardcover R3,052 Discovery Miles 30 520
Multllinguallsm, the Judicial Authority…
Kas Deprez, Theo du Plessis, … Paperback R590 R546 Discovery Miles 5 460
The Enforcers - Inside Cape Town's…
Caryn Dolley Paperback  (1)
R295 R236 Discovery Miles 2 360

 

Partners