0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (31)
  • R500+ (403)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Trade Secret Theft, Industrial Espionage, and the China Threat (Hardcover, New): Carl Roper Trade Secret Theft, Industrial Espionage, and the China Threat (Hardcover, New)
Carl Roper
R3,900 Discovery Miles 39 000 Ships in 12 - 17 working days

Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage as practiced by a range of nations from around the world-focusing on the mass scale in which information is being taken for China's growth and development. Supplying a current look at espionage, the book details the specific types of information China has targeted for its collection efforts in the past. It explains what China does to prepare for its massive collection efforts and describes what has been learned about China's efforts during various Congressional hearings, with expert advice and details from both the FBI and other government agencies. This book is the product of hundreds of hours of research, with material, both primary and secondary, reviewed, studied, and gleaned from numerous sources, including White House documentation and various government agencies. Within the text, you will learn the rationale and techniques used to obtain information in the past. You will see a bit of history over centuries where espionage has played a role in the economy of various countries and view some cases that have come to light when individuals were caught. The book supplies an understanding of how the economy of a nation can prosper or suffer, depending on whether that nation is protecting its intellectual property, or whether it is stealing such property for its own use. The text concludes by outlining specific measures that corporations and their employees can practice to protect their information and assets, both at home and abroad.

Security Management - A Critical Thinking Approach (Hardcover): Michael Land, Truett Ricks, Bobby Ricks Security Management - A Critical Thinking Approach (Hardcover)
Michael Land, Truett Ricks, Bobby Ricks
R2,674 Discovery Miles 26 740 Ships in 12 - 17 working days

Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.

Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Hardcover): Mark Tarallo Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Hardcover)
Mark Tarallo
R1,729 Discovery Miles 17 290 Ships in 12 - 17 working days

In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.

The Executive Protection Professional's Manual (Paperback): Philip Holder, Donna Lea Hawley The Executive Protection Professional's Manual (Paperback)
Philip Holder, Donna Lea Hawley
R1,755 Discovery Miles 17 550 Ships in 12 - 17 working days

There is a big difference between an "Executive Protection Professional" and a "Bodyguard." This book separates truth from myth. Two authors, both experts in their respective fields, give you the facts and critical knowledge about the field of executive protection. Together they provide a wealth of knowledge about this unique and exciting field.
This book not only explains what it takes to be an executive protection specialist but gives other valuable information as well. This includes, tips on defensive tactics, bomb search, searching for bugging devices, firearms training tips, defensive and evasive driving, and advance reconnaissance. This unique book also covers how to select the area of executive protection that you would like to work in, what you should make, the interview, and stories from real life experiences of an executive protection professional.
Philip Holder is the creator of the Six Zone Safeguard System of Self Defense
(Sometimes called the Sidewinder System after his "Sidewinder Executive Protection Consultants"). He is also the chief Instructor and Grandmaster of the North American Wing Chun Association and its Ying Gi Ga method of Wing Chun Kung Fu. His many years as an executive protection professional (EPP), his work as an executive protection consultant, and as a personal trainer, along with his 35 years in the martial arts and his experience in full contact fighting all come together to provide a true sense of realism in his classes and seminars.
Donna Lea Hawley is a retired lawyer who has written a number of books and articles on law, firearms, hunter education, and self defense. She teaches seminars on sports liability, shooting, carrying concealed weapons, the law of self defense and use of deadly force, and self defense for the past fifteen years. She is a firearms instructor who has taught over a thousand people shooting skills and firearms safety. She holds six NRA Instructor Certifications.
Describes the attributes, principles, and practices of the qualified protection professional.
Introduction to those considering entering the field.
Valuable source of continuing education for current practitioners.

U.S. Government Counterterrorism - A Guide to Who Does What (Hardcover): Michael Kraft, Edward Marks U.S. Government Counterterrorism - A Guide to Who Does What (Hardcover)
Michael Kraft, Edward Marks
R6,146 Discovery Miles 61 460 Ships in 12 - 17 working days

U.S. Government Counterterrorism: A Guide to Who Does What is the first readily available, unclassified guide to the many U.S. government agencies, bureau offices, and programs involved in all aspects of countering terrorism domestically and overseas. The authors, veterans of the U.S. government's counterterrorism efforts, present a rare insider's view of the counterterrorism effort, addressing such topics as government training initiatives, weapons of mass destruction, interagency coordination, research and development, and the congressional role in policy and budget issues. Includes a Foreword by Brian Michael Jenkins, Senior Advisor RAND Corporation Individual chapters describe the various agencies, their bureaus, and offices that develop and implement the counterterrorism policies and programs, providing a useful unclassified guide to government officials at all levels as well as students and others interested in how the U.S. counters terrorism. The book also discusses the challenges involved in coordinating the counterterrorism efforts at federal, state, and local levels and explains how key terror events influenced the development of programs, agencies, and counterterrorism legislation. The legislative underpinnings and tools of the U.S. counterterrorism efforts are covered as are the oft-debated issues of defining terrorism itself and efforts to counter violent extremism. In addition to outlining the specific agencies and programs, the authors provide unique insights into the broader context of counterterrorism efforts and developments in the last 10-plus years since 9/11 and they raise future considerations given recent landscape-altering global events. The authors were interviewed by National Defense Magazine in a January 23, 2012 article entitled Counterterrorism 101: Navigating the Bureaucratic Maze. They were interviewed on April 30, 2012 by Federal News Radio. Michael Kraft was also interviewed on June 27, 2014 by Federal News Radio.

Professional Security Management - A Strategic Guide (Hardcover): Charles Swanson Professional Security Management - A Strategic Guide (Hardcover)
Charles Swanson
R1,531 Discovery Miles 15 310 Ships in 12 - 17 working days

Historically, security managers have tended to be sourced from either the armed forces or law enforcement. But the increasing complexity of the organisations employing them, along with the technologies employed by them, is forcing an evolution and expansion of the role, and security managers must meet this challenge in order to succeed in their field and protect the assets of their employers. Risk management, crisis management, continuity management, strategic business operations, data security, IT, and business communications all fall under the purview of the security manager. This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses. It covers the basics of strategy, risk, and technology from the perspective of the security manager, focussing only on the 'need to know'. The reader will benefit from an understanding of how risk management aligns its functional aims with the strategic goals and operations of the organisation. This essential book supports professional vocational accreditation and qualifications, such as the Chartered Security Professional (CSyP) or Certified Protection Professional (CPP), and advises on pathways to higher education qualifications in the fields of security and risk management. It is ideal for any risk manager looking to further their training and development, as well as being complementary for risk and security management programs with a focus on practice.

Police Reform in China (Hardcover): Kam C. Wong Police Reform in China (Hardcover)
Kam C. Wong
R3,913 Discovery Miles 39 130 Ships in 12 - 17 working days

With nearly 20 percent of the world 's population located in China, what happens there is significant to all nations. Sweeping changes have altered the cultural landscape of China, and as opportunities for wealth have grown in recent years, so have opportunities for crime. Police Reform in China provides a rare and insightful glimpse of policing in the midst of such change.

The book begins with a historical account of police reform in the region since 2000. Next, it discusses the difficulties encountered in trying to understand Chinese policing, such as outdated perceptions, misinformation, cultural ignorance, ideological hegemony, and problems with paternalistic attitudes. The book recommends studying China from a local perspective informed by local research and data, suggesting that understanding China requires a cultural shift to the Chinese way of life in "thinking" and, more importantly, "feeling."

The author then summarizes selected policy papers from Gongan Yanjiu, a leading international policy journal. He first documents how the thinking and aspirations of various generations of Chinese leaders from Mao to Deng, and now Jiang and Hu, came to affect Chinese policing in theory and practice. He then addresses the emergence of a police legitimacy crisis as evidenced by the deterioration of public image and rebellions against police authority. Demonstrating how old ideologies are increasingly in conflict with the values and lifestyles of a new mentality, the book discusses steps that can be taken to improve professionalism. The final chapters investigate such problems as abuses of discretion and the improper use of firearms and highlight the importance of understanding the Chinese people, culture, values, and interests in order to truly effectuate successful police reform.

Terrorism and Homeland Security - Perspectives, Thoughts, and Opinions (Hardcover): Dale L. June Terrorism and Homeland Security - Perspectives, Thoughts, and Opinions (Hardcover)
Dale L. June
R2,566 Discovery Miles 25 660 Ships in 12 - 17 working days

Since 9/11, the terms homeland security and terrorism have become firmly entrenched in our lexicon. The days of walking through a simple metal detector at the airport are over, and our security landscape is forever changed. Terrorism and Homeland Security: Perspectives, Thoughts, and Opinions brings together the work of academic researchers and law enforcement and intelligence personnel to present a sober appraisal of the issues surrounding the current state of our security infrastructure.

Topics highlighted in this thought-provoking volume include:

  • The history of terrorism; the growth of the Taliban, Hamas, and Hezbollah; and the rise of transnational anti-Western Islamism
  • Progress made in protecting nations and individuals from terrorism
  • An analysis of a captured al-Qaeda training manual
  • The concept of martyrdom and suicide bombing
  • Political and strategic warfare and propaganda
  • Cooperative antiterrorism efforts between the United States and the European Union
  • Chemical, biological, radiological, and nuclear terrorism
  • Insider threats and how citizens can help their communities be vigilant about detecting terrorism
  • Intelligence gathering by means of interpersonal contact
  • Terrorist threats south of the border
  • Tools for locating bomb makers and clandestine labs

An examination of the causes and effects of terrorism and the complicated issues surrounding homeland security, this thought-provoking anthology provides a broad perspective for understanding the threat we face and how we can best meet the challenges of 21st century homeland security.

Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition): Rebecca Herold Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition)
Rebecca Herold
R3,773 Discovery Miles 37 730 Ships in 12 - 17 working days

Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:

  • Lists the laws and associated excerpts of the specific passages that require training and awareness
  • Contains a plethora of forms, examples, and samples in the book's 22 appendices
  • Highlights common mistakes that many organizations make
  • Directs readers to additional resources for more specialized information
  • Includes 250 awareness activities ideas and 42 helpful tips for trainers

Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization.

Praise for:

The first edition was outstanding. The new second edition is even better ... the definitive and indispensable guide for information security and privacy awareness and training professionals, worth every cent. As with the first edition, we recommend it unreservedly..
-NoticeBored.com

NATO, Security and Risk Management - From Kosovo to Khandahar (Paperback): M.J. Williams NATO, Security and Risk Management - From Kosovo to Khandahar (Paperback)
M.J. Williams
R1,314 Discovery Miles 13 140 Ships in 12 - 17 working days

This new volume explores the crisis in transatlantic relations and analyses the role of NATO following the collapse of the Soviet Union. The book offers a unified theory of cooperation in the new security paradigm to explain the current state of transatlantic relations and NATO's failure to adequately transform itself into a security institution for the 21st century. It argues that a new preoccupation with risk filled the vacuum left by the collapse of the Soviet Union, and uses the literature of the Risk Society to analyse the strained politics of the North Atlantic community. Using case studies to show how the West has pursued a strategy of risk management, and the effect this has had on NATO's politics, the book argues that a better understanding of how risk affects Western political cohesion will allow policy makers a way of adapting the structure of NATO to make it more effective as a tool for security. Having analysed NATO's recent failings, the book offers a theory for the way in which it can become an active risk manager, through the replacement of its established structure by smaller, ad hoc groupings.

Japanese - Descriptive Grammar (Paperback): John Hinds Japanese - Descriptive Grammar (Paperback)
John Hinds
R2,040 Discovery Miles 20 400 Ships in 12 - 17 working days

First published in 1986. Routledge is an imprint of Taylor & Francis, an informa company.

Targeted Violence - A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings (Hardcover, New):... Targeted Violence - A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings (Hardcover, New)
Glenn P. McGovern
R3,902 Discovery Miles 39 020 Ships in 12 - 17 working days

Drawn from case examples of incidents from around the world, Targeted Violence A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics used, and groups responsible for targeted killings and kidnappings. The author, a former SWAT and JTTF team member whose experience includes providing protection to diplomats, high-ranking military personnel, prosecutors, and organized crime informants presents a wealth of global statistics on assassinations, contract killings, and kidnappings that have occurred from 1950 to the present.

Leaving no stone unturned, the book breaks down the various incidents of targeted violence by region, country, month, day of the week, and time of day. It reports on likely locations for each type of attack, success rates, who is likely to initiate the attacks, and who they are most likely to target. The book s easy-to-follow format allows readers, experienced or not in personal protective work, to determine the types of attacks known to have occurred in any region.

This complete reference includes 35 case studies that examine attacks on motorcades and pedestrians dating back to 1973 highlighting the lessons to be learned from each example. It analyzes the modus operandi of individual assailants and groups in order to determine commonalities between targeted victims and why certain groups tend to target a specific type of individual. The text concludes with a chapter on victimology.

Just like anyone, assassins and hit men fall into routines and can become creatures of habit. By studying and understanding the collection of historical information contained in these pages, security, military, and law enforcement professionals responsible for providing protection will be better prepared to identify potential threats and develop the tactics needed to thwart such attacks.

Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback): Todd Fitzgerald Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback)
Todd Fitzgerald
R1,368 Discovery Miles 13 680 Ships in 12 - 17 working days

Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.

Negotiating Claims - The Emergence of Indigenous Land Claim Negotiation Policies in Australia, Canada, New Zealand, and the... Negotiating Claims - The Emergence of Indigenous Land Claim Negotiation Policies in Australia, Canada, New Zealand, and the United States (Paperback)
Christa Scholtz
R1,387 Discovery Miles 13 870 Ships in 12 - 17 working days

Why do governments choose to negotiate indigenous land claims rather than resolve claims through some other means? In this book Scholtz explores why a government would choose to implement a negotiation policy, where it commits itself to a long-run strategy of negotiation over a number of claims and over a significant course of time.

Through an examination strongly grounded in archival research of post-World War Two government decision-making in four established democracies - Australia, Canada, New Zealand, and the United States - Scholtz argues that negotiation policies emerge when indigenous people mobilize politically prior to significant judicial determinations on land rights, and not after judicial change alone. Negotiating Claims links collective action and judicial change to explain the emergence of new policy institutions.

Challenges to US and Mexican Police and Tourism Stability (Hardcover): Peter E. Tarlow Challenges to US and Mexican Police and Tourism Stability (Hardcover)
Peter E. Tarlow
R2,822 Discovery Miles 28 220 Ships in 12 - 17 working days

In Challenges to US and Mexican Police and Tourism Stability, author Peter Tarlow examines the US-Mexico border crisis and its impact on tourism, along with tourism security in both the United States and Mexico. He also examines the impact of police corruption and cartels on the tourism industry. Presenting detailed case studies of the U.S. cities of Chicago, New York, San Francisco, and Washington D.C, the collection concludes with comparisons on the issues facing tourism policing in the US and Mexico, exploring the dangers, hopes and recommendations for the future. The way a state's police force operates generates a range of complex and interconnected issues, including law enforcement's role in tourism. Recent debates have arisen around the media and law enforcement such as the incidents leading to the George Floyd protests and the Defund-the-Police movement. Challenges to US and Mexican Police and Tourism Stability examines the impacts that historical, political, and social campaigns targeting police practices have had on law enforcement in general and on the tourism industry in particular, specifically focusing on recent developments in both the USA and Mexico. The Tourism Security-Safety and Post Conflict Destinations series provides an insightful guide for policy makers, specialists and social scientists interested in the future of tourism in a society where uncertainness, anxiety and fear prevail.

Small Arms and Security - New Emerging International Norms (Paperback): Denise Garcia Small Arms and Security - New Emerging International Norms (Paperback)
Denise Garcia
R1,334 Discovery Miles 13 340 Ships in 12 - 17 working days

This book examines the emergence of new international norms to govern the spread of small arms, and the extent to which these norms have been established in the policies and practices of states, regions and international organizations. It also attempts to establish criteria for assessing norm emergence, and to assess the process of norm development by comparing what actually happens at the multilateral level.
If norm-making on small arms and related multilateral negotiations have mostly dealt with 'illicit arms', and most of the norms examined here fall on the arms supplier side of the arms equation, the author argues that the creation of international norms and the setting of widely agreed standards amongst states on all aspects of the demand for, availability, and spread of both legal and illegal small arms and light weapons must become central to the multilateral coordination of policy responses in order to tackle the growing violence associated with small arms availability.
Small Arms and Security will be of interest to researchers and professionals in the fields of peace and conflict studies, global governance, international security and disarmament.

NATO, Security and Risk Management - From Kosovo to Khandahar (Hardcover): M.J. Williams NATO, Security and Risk Management - From Kosovo to Khandahar (Hardcover)
M.J. Williams
R4,298 Discovery Miles 42 980 Ships in 12 - 17 working days

This new volume explores the crisis in transatlantic relations and analyses the role of NATO following the collapse of the Soviet Union. The book offers a unified theory of cooperation in the new security paradigm to explain the current state of transatlantic relations and NATO's failure to adequately transform itself into a security institution for the 21st century. It argues that a new preoccupation with risk filled the vacuum left by the collapse of the Soviet Union, and uses the literature of the Risk Society to analyse the strained politics of the North Atlantic community. Using case studies to show how the West has pursued a strategy of risk management, and the effect this has had on NATO's politics, the book argues that a better understanding of how risk affects Western political cohesion will allow policy makers a way of adapting the structure of NATO to make it more effective as a tool for security. Having analysed NATO's recent failings, the book offers a theory for the way in which it can become an active risk manager, through the replacement of its established structure by smaller, ad hoc groupings.

The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd edition):... The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd edition)
Douglas Landoll
R1,752 Discovery Miles 17 520 Ships in 12 - 17 working days

Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting. The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk.com) provides downloads for checklists, spreadsheets, figures, and tools.

Small Arms and Security - New Emerging International Norms (Hardcover, New): Denise Garcia Small Arms and Security - New Emerging International Norms (Hardcover, New)
Denise Garcia
R4,168 Discovery Miles 41 680 Ships in 12 - 17 working days

This book examines the emergence of new international norms to govern the spread of small arms, and the extent to which these norms have been established in the policies and practices of states, regions and international organizations. It also attempts to establish criteria for assessing norm emergence, and to assess the process of norm development by comparing what actually happens at the multilateral level. If norm-making on small arms and related multilateral negotiations have mostly dealt with 'illicit arms', and most of the norms examined here fall on the arms supplier side of the arms equation, the author argues that the creation of international norms and the setting of widely agreed standards amongst states on all aspects of the demand for, availability, and spread of both legal and illegal small arms and light weapons must become central to the multilateral coordination of policy responses in order to tackle the growing violence associated with small arms availability. Small Arms and Security will be of interest to researchers and professionals in the fields of peace and conflict studies, global governance, international security and disarmament.

Theorizing Surveillance (Hardcover): David Lyon Theorizing Surveillance (Hardcover)
David Lyon
R3,907 Discovery Miles 39 070 Ships in 12 - 17 working days

This book is about explaining surveillance processes and practices in contemporary society. Surveillance studies is a relatively new multi-disciplinary enterprise that aims to understand who watches who, how the watched participate in and sometimes question their surveillance, why surveillance occurs, and with what effects. This book brings together some of the world's leading surveillance scholars to discuss the why question. The field has been dominated, since the groundbreaking work of Michel Foucault, by the idea of the panopticon and this book explores why this metaphor has been central to discussions of surveillance, what is fruitful in the panoptic approach, and what other possible approaches can throw better light on the phenomena in question. Since the advent of networked computer databases, and especially since 9/11, questions of surveillance have come increasingly to the forefront of democratic, political and policy debates in the global north (and to an extent in the global south). Civil liberties, democratic participation and privacy are some of the issues that are raised by these developments. adequate understanding of how, how well and whether or not surveillance works. This book explores the theoretical questions in a way that is grounded in and attuned to empirical realities.

Private Security in Africa - From the Global Assemblage to the Everyday (Hardcover): Doctor Paul Higate, Mats Utas Private Security in Africa - From the Global Assemblage to the Everyday (Hardcover)
Doctor Paul Higate, Mats Utas
R2,819 Discovery Miles 28 190 Ships in 12 - 17 working days

Across Africa, growing economic inequality, instability and urbanization have led to the rapid spread of private security providers. While these PSPs have already had a significant impact on African societies, their impact has so far received little in the way of comprehensive analysis. Drawing on a wide range of disciplinary approaches, and encompassing anthropology, sociology and political science, Private Security in Africa offers unique insight into the lives and experiences of security providers and those affected by them, as well as into the fragile state context which has allowed them to thrive. Featuring original empirical research and case studies ranging from private policing in South Africa to the recruitment of Sierra Leoneans for private security work in Iraq, the book considers the full implications of PSPs for security and the state, not only for Africa but for the world as a whole.

One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Hardcover): Simon... One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Hardcover)
Simon Chesterman
R1,457 Discovery Miles 14 570 Ships in 12 - 17 working days

What limits, if any, should be placed on a government's efforts to spy on its citizens in the name of national security? Spying on foreigners has long been regarded as an unseemly but necessary enterprise. Spying on one's own citizens in a democracy, by contrast, has historically been subject to various forms of legal and political restraint. For most of the twentieth century these regimes were kept distinct. That position is no longer tenable. Modern threats do not respect national borders. Changes in technology make it impractical to distinguish between 'foreign' and 'local' communications. And our culture is progressively reducing the sphere of activity that citizens can reasonably expect to be kept from government eyes. The main casualty of this transformed environment will be privacy. Recent battles over privacy have been dominated by fights over warrantless electronic surveillance and CCTV; the coming years will see debates over DNA databases, data mining, and biometric identification. There will be protests and lawsuits, editorials and elections resisting these attacks on privacy. Those battles are worthy. But the war will be lost. Modern threats increasingly require that governments collect such information, governments are increasingly able to collect it, and citizens increasingly accept that they will collect it. This book proposes a move away from questions of whether governments should collect information and onto more problematic and relevant questions concerning its use. By reframing the relationship between privacy and security in the language of a social contract, mediated by a citizenry who are active participants rather than passive targets, the book offers a framework to defend freedom without sacrificing liberty.

Global Surveillance and Policing - Borders, security, identity (Hardcover, illustrated edition): Elia Zureik, Mark Salter Global Surveillance and Policing - Borders, security, identity (Hardcover, illustrated edition)
Elia Zureik, Mark Salter
R3,052 Discovery Miles 30 520 Ships in 12 - 17 working days

Since the 9.11 attacks in North America and the accession of the Schengen Accord in Europe there has been widespread concern with international borders, the passage of people and the flow of information across borders. States have fundamentally changed the ways in which they police and monitor this mobile population and its personal data. This book brings together leading authorities in the field who have been working on the common problem of policing and surveillance at physical and virtual borders at a time of increased perceived threat. It is concerned with both theoretical and empirical aspects of the ways in which the modern state attempts to control its borders and mobile population. It will be essential reading for students, practitioners, policy makers.

Private Security and Domestic Violence - The Risks and Benefits of Private Security Companies Working With Victims of Domestic... Private Security and Domestic Violence - The Risks and Benefits of Private Security Companies Working With Victims of Domestic Violence (Hardcover)
Diarmaid Harkin
R3,872 Discovery Miles 38 720 Ships in 12 - 17 working days

Private companies are increasingly involved with the security of domestic violence victims. This has manifested in a number of ways, including private security companies working in partnership with domestic violence services, the proliferation of security-technology companies that seek a market within the domestic violence sector, and governments contracting private companies to provide security provision for victims. Private Security and Domestic Violence offers a world-first analysis of the risks and benefits of for-profit businesses engaging with a vulnerable and underprotected section of society. Based on original data gathered in Australia, this book provides internationally relevant insights on the dangers but also the potential benefits of increasing private sector involvement with victims of domestic abuse. It offers a unique crossover of the literature on private security, crime prevention and domestic violence. Aimed at scholars, policymakers, and frontline workers within the domestic violence sector, Private Security and Domestic Violence documents experimental new collaborations and partnerships between the private, community and governmental spheres and makes a case for the suitable regulatory solutions to be put in place to successfully manage private security involvement with domestic violence victims. By outlining the risks and the benefits of this new form of security provision and detailing a potential model of regulation, this book offers a pathway for improving how we provide for a chronically underprotected population. It will be of interest to criminology and criminal justice students and researchers engaged in studies of abuse, domestic violence, violent crime, victims and victimology, crime prevention, and security.

Casino and Gaming Resort Investigations (Hardcover): Derk J. Boss, Alan W. Zajic Casino and Gaming Resort Investigations (Hardcover)
Derk J. Boss, Alan W. Zajic
R3,895 Discovery Miles 38 950 Ships in 12 - 17 working days

Casino and Gaming Resort Investigations addresses the continued and growing need for gaming security professionals to properly and successfully investigate the increasing and unique types of crime they will face in their careers. As the gaming industry has grown, so has the need for competent and highly skilled investigators who must be prepared to manage a case of employee theft one day to a sophisticated sports book scam the next. This book provides the reader with the fundamental knowledge needed to understand how each gaming and non-gaming department functions and interacts within the overall gaming resort, allowing the investigator to determine and focus on the important elements of any investigation in any area. Each chapter delivers a background of a department or type of crime normally seen in the gaming environment, and then discusses what should be considered important or even critical for the investigator to know or determine in the course of the investigation. Likely scenarios, case histories, and tips, as well as cautions for investigators to be aware of, are used throughout the book. This book was written for and directed at gaming security and surveillance professionals, including gaming regulators, and tribal gaming authorities, who are almost daily confronted by the ingenious and the most common scams, theft, and frauds that are perpetrated in the gaming world.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Silent Weapons for Quiet Wars - An…
Anonymous Hardcover R643 R533 Discovery Miles 5 330
The Complete Q-anon - Q-anon…
Anonymous Conservative Hardcover R793 Discovery Miles 7 930
Secure Electronic Transactions…
Larry Loeb Hardcover R2,152 Discovery Miles 21 520
The Right to Privacy
Samuel D. Warren, Louis D. Brandeis Hardcover R538 Discovery Miles 5 380
Biometrics - Concepts, Methodologies…
Information Reso Management Association Hardcover R9,978 Discovery Miles 99 780
Multllinguallsm, the Judicial Authority…
Kas Deprez, Theo du Plessis, … Paperback R590 R546 Discovery Miles 5 460
Ransomware and Cybercrime
Andrew Jenkinson Paperback R924 Discovery Miles 9 240
Tell Me Everything - The Story of a…
Erika Krouse Paperback R505 R433 Discovery Miles 4 330
The Auditor's Guide to Blockchain…
Shaun Aghili Hardcover R2,875 R2,406 Discovery Miles 24 060
Emergency Notification
Robert C. Chandler Hardcover R1,606 Discovery Miles 16 060

 

Partners