![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.
"Analyzes health and hazard risk assessment in commercial, industrial, and refining industries. Emphasizes legal requirements, emergency planning and response, safety equipment, process implementation, and occupational and environmental protection exposure guidelines. Presents applicatoins and calculations for risk analysis of real systems, as well as numerous end-of-chapter examples and references."
Private companies are increasingly involved with the security of domestic violence victims. This has manifested in a number of ways, including private security companies working in partnership with domestic violence services, the proliferation of security-technology companies that seek a market within the domestic violence sector, and governments contracting private companies to provide security provision for victims. Private Security and Domestic Violence offers a world-first analysis of the risks and benefits of for-profit businesses engaging with a vulnerable and underprotected section of society. Based on original data gathered in Australia, this book provides internationally relevant insights on the dangers but also the potential benefits of increasing private sector involvement with victims of domestic abuse. It offers a unique crossover of the literature on private security, crime prevention and domestic violence. Aimed at scholars, policymakers, and frontline workers within the domestic violence sector, Private Security and Domestic Violence documents experimental new collaborations and partnerships between the private, community and governmental spheres and makes a case for the suitable regulatory solutions to be put in place to successfully manage private security involvement with domestic violence victims. By outlining the risks and the benefits of this new form of security provision and detailing a potential model of regulation, this book offers a pathway for improving how we provide for a chronically underprotected population. It will be of interest to criminology and criminal justice students and researchers engaged in studies of abuse, domestic violence, violent crime, victims and victimology, crime prevention, and security.
The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations. Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing systems with the latest packs and patches. Written by two of Microsoft's top experts, this clear and concise manual demonstrates how to perform inventories of IT assets, test compatibility, target deployment, and evaluate management technologies. It also shows you how to create and implement your own deployment plans with recovery and remediation options, and how to recognize potential vulnerabilities.
Few people are better able to describe how to survive in a war zone than those who have seen, experienced, and lived it first-hand. Comprised of a collection of original stories from international contributors, Surviving the International War Zone: Security Lessons Learned and Stories from Police and Military Peacekeeping Forces contains true accounts of unimaginable scenarios that could only occur in war-torn and conflict-ridden areas. Presenting accounts written by military and police officers who lived in different dangerous regions across the world, the book offers an inside look at the lives of the officers and the local people living in the war zone environment. Covering many facets of daily life, the book helps readers understand how to survive in deadly terrain. With contributions from soldiers and law enforcement personnel from 13 different countries who have lived and served in Iraq, Afghanistan, Sudan, Bosnia, Kosovo, East Timor, Cambodia, Haiti, and Liberia, the book includes practical tips for day-to-day life in a war zone. It examines topics such as: Surviving extreme temperatures and staying healthy Interacting with the indigenous population and cultural awareness Adjusting to the challenges of limited technology and resources Protecting oneself from the imminent threat of violence that is present in all war-torn regions Enhanced with photographs from the war zone, the stories in this volume range from accounts of unspeakable torture, to descriptions of deplorable living conditions, to moments of humor. Some of the stories will make you laugh; others may make you cry. Ultimately, the book provides an unparalleled insight into the full range of deep-seated and sometimes conflicting emotions of the people who have lived and served in war zones and have come home to tell about it.
Today, public space has become a fruitful venue for surveillance of many kinds. Emerging surveillance technologies used by governments, corporations, and even individual members of the public are reshaping the very nature of physical public space. Especially in urban environments, the ability of individuals to remain private or anonymous is being challenged. Surveillance, Privacy, and Public Space problematizes our traditional understanding of 'public space'. The chapter authors explore intertwined concepts to develop current privacy theory and frame future scholarly debate on the regulation of surveillance in public spaces. This book also explores alternative understandings of the impacts that modern living and technological progress have on the experience of being in public, as well as the very nature of what public space really is. Representing a range of disciplines and methods, this book provides a broad overview of the changing nature of public space and the complex interactions between emerging forms of surveillance and personal privacy in these public spaces. It will appeal to scholars and students in a variety of academic disciplines, including sociology, surveillance studies, urban studies, philosophy, law, communication and media studies, political science, and criminology.
Contemporary Security Management, Fourth Edition, identifies and condenses into clear language the principal functions and responsibilities for security professionals in supervisory and managerial positions. Managers will learn to understand the mission of the corporate security department and how the mission intersects with the missions of other departments. The book assists managers with the critical interactions they will have with decision makers at all levels of an organization, keeping them aware of the many corporate rules, business laws, and protocols of the industry in which the corporation operates. Coverage includes the latest trends in ethics, interviewing, liability, and security-related standards. The book provides concise information on understanding budgeting, acquisition of capital equipment, employee performance rating, delegated authority, project management, counseling, and hiring. Productivity, protection of corporate assets, and monitoring of contract services and guard force operations are also detailed, as well as how to build quality relationships with leaders of external organizations, such as police, fire and emergency response agencies, and the Department of Homeland Security.
Investigations: 150 Things You Should Know, Second Edition, explores the essential tips and techniques for security investigations, providing a useful reference for those at any stage of their security career. This practical guide covers the legal guidelines that all investigators must follow. Through anecdotes, case studies and documented procedures, the authors present the most complete collection of investigative information available. Readers in the security and law enforcement fields will find this book easy to use and understand when seeking explanations about a wide variety of investigative topics, including constitutional law, documentary evidence, surveillance equipment, interviewing, interrogating and reporting.
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.
As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.
The first book dedicated to the sociology of privatized security, this collection studies the important global trend of shifting security from public to private hands and the associated rise of Private Military and Security Companies (PMSCs) and their contractors. The volume first explores the trend itself, making important historical and theoretical revisions to the existing social science of private security. These chapters discuss why rulers buy, rent and create private militaries, why mercenaries have become private patriots, and why the legitimacy of military missions is undermined by the use of contractors. The next section challenges the idea that states have a monopoly on legitimate violence and questions our legal and economic assumptions about private security. The collection concludes with a discussion of the contractors themselves, focusing on gender, race, ethnicity, and other demographic factors. Featuring a mix of qualitative and quantitative methods and a range of theoretical and methodological innovations, this book will inspire sociologists to examine, with fresh eyes, the behind-the-scenes tension between the high drama of war and conflict and the mundane realities of privatized security contractors and their everyday lives.
One day in the spring of 2013, a box appeared outside a fourth-floor apartment door in Brooklyn, New York. The recipient, who didn't know the sender, only knew she was supposed to bring this box to a friend, who would ferry it to another friend. This was Edward Snowden's box-printouts of documents proving that the US government had built a massive surveillance apparatus and used it to spy on its own people-and the friend on the end of this chain was filmmaker Laura Poitras. Thus the biggest national security leak of the digital era was launched via a remarkably analog network, the US Postal Service. This is just one of the odd, ironic details that emerges from the story of how Jessica Bruder and Dale Maharidge, two experienced journalists but security novices (and the friends who received and ferried the box) got drawn into the Snowden story as behind-the-scenes players. Their initially stumbling, increasingly paranoid, and sometimes comic efforts to help bring Snowden's leaks to light, and ultimately, to understand their significance, unfold in an engrossing narrative that includes emails and diary entries from Poitras. This is an illuminating essay on the status of transparency, privacy, and trust in the age of surveillance.
Sports Team Security examines the security needs for sports teams and events of all sizes. This groundbreaking book provides a fundamental model for sports team security that can be applied almost universally, from youth sports to the Super Bowl and World Cup. The book develops, compares, and contrasts current methodologies in sports security, for both amateur and professional athletes, examining which paradigms work best and under which circumstances. This valuable information is applicable to nearly anyone involved in the safety of athletes, including event managers, law enforcement, parents, school administrators and coaches, security practitioners, tourism industry professionals, and legal professionals. It explores areas rarely investigated, providing key advice for creating best practices and guidelines in sports team security.
In Challenges to US and Mexican Police and Tourism Stability, author Peter Tarlow examines the US-Mexico border crisis and its impact on tourism, along with tourism security in both the United States and Mexico. He also examines the impact of police corruption and cartels on the tourism industry. Presenting detailed case studies of the U.S. cities of Chicago, New York, San Francisco, and Washington D.C, the collection concludes with comparisons on the issues facing tourism policing in the US and Mexico, exploring the dangers, hopes and recommendations for the future. The way a state's police force operates generates a range of complex and interconnected issues, including law enforcement's role in tourism. Recent debates have arisen around the media and law enforcement such as the incidents leading to the George Floyd protests and the Defund-the-Police movement. Challenges to US and Mexican Police and Tourism Stability examines the impacts that historical, political, and social campaigns targeting police practices have had on law enforcement in general and on the tourism industry in particular, specifically focusing on recent developments in both the USA and Mexico. The Tourism Security-Safety and Post Conflict Destinations series provides an insightful guide for policy makers, specialists and social scientists interested in the future of tourism in a society where uncertainness, anxiety and fear prevail.
This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized. Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in Social implications and impacts Governance and management Architecture and modeling Commissioning and operations The future of SCADA and control systems security The book also includes four case studies of well-known public cyber security-related incidents. The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.
The East German Ministry of State Security, popularly known as the Stasi, was one of the largest and most intrusive secret police systems in world history. So extensive was the system of surveillance and control that in any given year throughout the 1970s and 1980s, about one in fifty of the 13 million East German adults were working for the Stasi either as an officer or as an informer. Drawing on original sources from the Stasi archives and the recollections of contemporary witnesses, The Stasi: Myth and Reality reveals the intricacies of the relationship between the Stasi enforcers, its agents and its targets/victims, and demonstrates how far the Stasi octopus extended its tentacles into people's lives and all spheres of society. The origins and developments of this vast system of repression are examined, as well as the motivation of the informers and the ways in which they penetrated the niches of East German society. The final chapters assess the ministry's failure to help overcome the GDR's inherent structural defects and demonstrate how the Stasi's bureaucratic procedures contributed to the implosion of the Communist system at the end of the 1980's.
Securitising Russia shows the impact of twenty-first-century security concerns on the way Russia is ruled. It demonstrates how President Putin has wrestled with terrorism, immigration, media freedom, religious pluralism, and economic globalism, and argues that fears of a return to old-style authoritarianism oversimplify the complex context of contemporary Russia. The book focuses on the internal security issues common to many states in the early twenty-first-century, and places them in the particular context of Russia. Detailed analysis of the place of security in Russia's political discourse and policy-making reveals nuances often missing from overarching assessments of Russia today. To characterise the Putin regime as the 'KGB-resurgent' is to miss vital continuities, contexts, and on-going political conflicts which make up the contemporary Russian scene. Securitising Russia draws together current debates about whether Russia is a 'normal' country developing its own democratic and market structures, or a nascent authoritarian regime returning to the past. -- .
Former police and military personnel possess attractive skill sets for the private security industry; however, the transition to the corporate arena is not without challenges. Competition for these jobs is fierce. Many candidates possess degrees in security management-some having spent their entire professional careers in private security. From Police to Security Professional: A Guide to a Successful Career Transition provides tips on overcoming the inherent obstacles law enforcement professionals face in making the switch and supplies a practical roadmap for entry into the private security world. The foundation of the book comes from the author's own journey and the many hurdles he encountered transitioning to private sector security. With his help, you'll learn: The unique skills, experience, and mentality required to enter into the private security industry from a law enforcement background The opportunities available and the different areas within the industry-including benefits and income potential How to properly evaluate your training portfolio How to tailor your resume to garner the attention of hiring executives The many professional associations and certifications that could be helpful in your career Vital to your ability to succeed is understanding that security management has evolved into a distinct profession in its own right-one that brings with it different education, experience, and skill sets that clearly differentiate it from law enforcement. This book will help you better understand and be prepared for the policies, processes, and a corporate environment that operates in a very different way than the police structure to which you are accustomed. With the author's help, you'll give yourself every advantage to get the job and succeed in your new career.
Suicides, excessive overtime, hostility and violence on the factory floor in China. Drawing on vivid testimonies from rural migrant workers, student interns, managers and trade union staff, Dying for an iPhone is a devastating expose of two of the world's most powerful companies: Foxconn and Apple. As the leading manufacturer of iPhones, iPads and Kindles, and employing one million workers in China alone, Taiwanese-invested Foxconn's drive to dominate global electronics manufacturing has aligned perfectly with China's goal of becoming the world leader in technology. This book reveals the human cost of that ambition and what our demands for the newest and best technology mean for workers. Foxconn workers have repeatedly demonstrated their power to strike at key nodes of transnational production, challenge management and the Chinese state, and confront global tech behemoths. Dying for an iPhone allows us to assess the impact of global capitalism's deepening crisis on workers.
Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage as practiced by a range of nations from around the world-focusing on the mass scale in which information is being taken for China's growth and development. Supplying a current look at espionage, the book details the specific types of information China has targeted for its collection efforts in the past. It explains what China does to prepare for its massive collection efforts and describes what has been learned about China's efforts during various Congressional hearings, with expert advice and details from both the FBI and other government agencies. This book is the product of hundreds of hours of research, with material, both primary and secondary, reviewed, studied, and gleaned from numerous sources, including White House documentation and various government agencies. Within the text, you will learn the rationale and techniques used to obtain information in the past. You will see a bit of history over centuries where espionage has played a role in the economy of various countries and view some cases that have come to light when individuals were caught. The book supplies an understanding of how the economy of a nation can prosper or suffer, depending on whether that nation is protecting its intellectual property, or whether it is stealing such property for its own use. The text concludes by outlining specific measures that corporations and their employees can practice to protect their information and assets, both at home and abroad.
Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.
From the rising significance of non-state actors to the increasing influence of regional powers, the nature and conduct of international politics has arguably changed dramatically since the height of the Cold War. Yet much of the literature on deterrence and compellence continues to draw (whether implicitly or explicitly) upon assumptions and precepts formulated in-and predicated upon-politics in a state-centric, bipolar world. Coercion moves beyond these somewhat hidebound premises and examines the critical issue of coercion in the 21st century, with a particular focus on new actors, strategies and objectives in this very old bargaining game. The chapters in this volume examine intra-state, inter-state, and transnational coercion and deterrence as well as both military and non-military instruments of persuasion, thus expanding our understanding of coercion for conflict in the 21st century. ? Scholars have analyzed the causes, dynamics, and effects of coercion for decades, but previous works have principally focused on a single state employing conventional military means to pressure another state to alter its behavior. In contrast, this volume captures fresh developments, both theoretical and policy relevant. This chapters in this volume focus on tools (terrorism, sanctions, drones, cyber warfare, intelligence, and forced migration), actors (insurgents, social movements, and NGOs) and mechanisms (trilateral coercion, diplomatic and economic isolation, foreign-imposed regime change, coercion of nuclear proliferators, and two-level games) that have become more prominent in recent years, but which have yet to be extensively or systematically addressed in either academic or policy literatures.
"Introduction to Security" has been the leading text on private
security for over thirty years. Celebrated for its balanced and
professional approach, this new edition gives future security
professionals a broad, solid base that prepares them to serve in a
variety of positions. Security is a diverse and rapidly growing
field that is immune to outsourcing. The author team as well as an
outstanding group of subject-matter experts combine their knowledge
and experience with a full package of materials geared to
experiential learning. As a recommended title for security
certifications, and an information source for the military, this is
an essential reference for all security professionals. This timely
revision expands on key topics and adds new material on important
issues in the 21st century environment such as the importance of
communication skills; the value of education; internet-related
security risks; changing business paradigms; and brand
protection. |
You may like...
Biometrics - Concepts, Methodologies…
Information Reso Management Association
Hardcover
R9,436
Discovery Miles 94 360
Journalism and the Nsa Revelations…
Adrienne Russell, Risto Kunelius, …
Hardcover
R3,655
Discovery Miles 36 550
Making Public Places Safer…
Brandon C. Welsh, David P. Farrington
Hardcover
R1,181
Discovery Miles 11 810
|