0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (6)
  • R250 - R500 (40)
  • R500+ (376)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Vision in Japanese Entrepreneurship - The Evolution of a Security Enterprise (Paperback): H.T. Shimazaki Vision in Japanese Entrepreneurship - The Evolution of a Security Enterprise (Paperback)
H.T. Shimazaki
R791 Discovery Miles 7 910 Ships in 10 - 15 working days

The service sector occupies a dominant position in the Japanese economy, yet few studies have looked at the way the industry developed. This book, first published in 1992, focuses on the growth and development of a major world security and communications corporation, SECOM. The success of the company has been rooted in the management strategies of Makoto Iida, who has shaped the company from a small localized business to an international industry at the forefront of innovation. The book first looks at the background of Makoto Iida, offering an insight into the nature of an entrepreneur and the issues this raises within the context of Japanese management styles. It then follows the company development stage by stage, assessing the importance of individual creativity in adapting and implementing traditional management techniques. It shows how strategies for human resources, service quality, new technology, globalization and corporate restructuring evolve within the context of a growing organization, and includes an analysis of the innovative marketing techniques and product development processes needed to sell security services to one of the world's safest countries.

Journalism, Citizenship and Surveillance Society (Hardcover): Karin Wahl-Jorgensen Journalism, Citizenship and Surveillance Society (Hardcover)
Karin Wahl-Jorgensen
R2,654 Discovery Miles 26 540 Ships in 10 - 15 working days

This book shows how surveillance society shapes and interacts with journalistic practices and discourses. It illustrates not only how surveillance debates play out in and through mediated discourses, but also how practices of surveillance inform the stories, everyday work and the ethics of journalists. The increasing entrenchment of data collection and surveillance in all kinds of social processes raises important questions around new threats to journalistic freedom and political dissent; the responsibilities of media organizations and state actors; the nature of journalists' relationship to the state; journalists' ability to protect their sources and data; and the ways in which media coverage shape public perceptions of surveillance, to mention just a few areas of concern. Against this backdrop, the contributions gathered in this book examine areas including media coverage of surveillance, encryption and privacy; journalists' views on surveillance and security; public debate around the power of intelligence agencies, and the strategies of privacy rights activists. The book raises fundamental questions around the role of journalism in creating the conditions for digital citizenship. The chapters in this book were originally published in a special issue of the journal, Digital Journalism.

Surveillance, Privacy and Public Space (Paperback): Bryce Clayton Newell, Tjerk Timan, Bert-Jaap Koops Surveillance, Privacy and Public Space (Paperback)
Bryce Clayton Newell, Tjerk Timan, Bert-Jaap Koops
R1,358 Discovery Miles 13 580 Ships in 10 - 15 working days

Today, public space has become a fruitful venue for surveillance of many kinds. Emerging surveillance technologies used by governments, corporations, and even individual members of the public are reshaping the very nature of physical public space. Especially in urban environments, the ability of individuals to remain private or anonymous is being challenged. Surveillance, Privacy, and Public Space problematizes our traditional understanding of 'public space'. The chapter authors explore intertwined concepts to develop current privacy theory and frame future scholarly debate on the regulation of surveillance in public spaces. This book also explores alternative understandings of the impacts that modern living and technological progress have on the experience of being in public, as well as the very nature of what public space really is. Representing a range of disciplines and methods, this book provides a broad overview of the changing nature of public space and the complex interactions between emerging forms of surveillance and personal privacy in these public spaces. It will appeal to scholars and students in a variety of academic disciplines, including sociology, surveillance studies, urban studies, philosophy, law, communication and media studies, political science, and criminology.

Health, Safety, and Accident Management in the Chemical Process Industries - A Complete Compressed Domain Approach (Paperback,... Health, Safety, and Accident Management in the Chemical Process Industries - A Complete Compressed Domain Approach (Paperback, 2nd edition)
Ann Marie Flynn, Louis Theodore
R1,978 Discovery Miles 19 780 Ships in 10 - 15 working days

"Analyzes health and hazard risk assessment in commercial, industrial, and refining industries. Emphasizes legal requirements, emergency planning and response, safety equipment, process implementation, and occupational and environmental protection exposure guidelines. Presents applicatoins and calculations for risk analysis of real systems, as well as numerous end-of-chapter examples and references."

The Private Is Political - Networked Privacy and Social Media (Hardcover): Alice E. Marwick The Private Is Political - Networked Privacy and Social Media (Hardcover)
Alice E. Marwick
R648 Discovery Miles 6 480 Ships in 10 - 15 working days

A compelling firsthand investigation of how social media and big data have amplified the close relationship between privacy and inequality   Online privacy is under constant attack by social media and big data technologies. But we cannot rely on individual actions to remedy this—it is a matter of social justice. Alice E. Marwick offers a new way of understanding how privacy is jeopardized, particularly for marginalized and disadvantaged communities—including immigrants, the poor, people of color, LGBTQ+ populations, and victims of online harassment.   Marwick shows that few resources or regulations for preventing personal information from spreading on the internet. Through a new theory of “networked privacy,†she reveals how current legal and technological frameworks are woefully inadequate in addressing issues of privacy—often by design. Drawing from interviews and focus groups encompassing a diverse group of Americans, Marwick shows that even heavy social media users care deeply about privacy and engage in extensive “privacy work†to protect it. But people are up against the violation machine of the modern internet. Safeguarding privacy must happen at the collective level.

Software Deployment, Updating, and Patching (Paperback): Bill Stackpole, Patrick Hanrion Software Deployment, Updating, and Patching (Paperback)
Bill Stackpole, Patrick Hanrion
R1,803 Discovery Miles 18 030 Ships in 10 - 15 working days

The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations. Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing systems with the latest packs and patches. Written by two of Microsoft's top experts, this clear and concise manual demonstrates how to perform inventories of IT assets, test compatibility, target deployment, and evaluate management technologies. It also shows you how to create and implement your own deployment plans with recovery and remediation options, and how to recognize potential vulnerabilities.

Building an Effective Information Security Policy Architecture (Paperback): Sandy Bacik Building an Effective Information Security Policy Architecture (Paperback)
Sandy Bacik
R1,879 Discovery Miles 18 790 Ships in 10 - 15 working days

Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.

Researching National Security Intelligence - Multidisciplinary Approaches (Paperback): Stephen Coulthart, Michael... Researching National Security Intelligence - Multidisciplinary Approaches (Paperback)
Stephen Coulthart, Michael Landon-Murray, Damien Van Puyvelde; Contributions by Stephen Coulthart, Michael Landon-Murray, …
R935 R799 Discovery Miles 7 990 Save R136 (15%) Ships in 18 - 22 working days

Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.

Surviving the International War Zone - Security Lessons Learned and Stories from Police and Military Peacekeeping Forces... Surviving the International War Zone - Security Lessons Learned and Stories from Police and Military Peacekeeping Forces (Paperback)
Robert R Rail
R1,920 Discovery Miles 19 200 Ships in 10 - 15 working days

Few people are better able to describe how to survive in a war zone than those who have seen, experienced, and lived it first-hand. Comprised of a collection of original stories from international contributors, Surviving the International War Zone: Security Lessons Learned and Stories from Police and Military Peacekeeping Forces contains true accounts of unimaginable scenarios that could only occur in war-torn and conflict-ridden areas. Presenting accounts written by military and police officers who lived in different dangerous regions across the world, the book offers an inside look at the lives of the officers and the local people living in the war zone environment. Covering many facets of daily life, the book helps readers understand how to survive in deadly terrain. With contributions from soldiers and law enforcement personnel from 13 different countries who have lived and served in Iraq, Afghanistan, Sudan, Bosnia, Kosovo, East Timor, Cambodia, Haiti, and Liberia, the book includes practical tips for day-to-day life in a war zone. It examines topics such as: Surviving extreme temperatures and staying healthy Interacting with the indigenous population and cultural awareness Adjusting to the challenges of limited technology and resources Protecting oneself from the imminent threat of violence that is present in all war-torn regions Enhanced with photographs from the war zone, the stories in this volume range from accounts of unspeakable torture, to descriptions of deplorable living conditions, to moments of humor. Some of the stories will make you laugh; others may make you cry. Ultimately, the book provides an unparalleled insight into the full range of deep-seated and sometimes conflicting emotions of the people who have lived and served in war zones and have come home to tell about it.

Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed): Amy Zegart Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed)
Amy Zegart
R684 Discovery Miles 6 840 Ships in 10 - 15 working days

In this provocative and thoughtful book, Amy Zegart challenges the conventional belief that national security agencies work reasonably well to serve the national interest as they were designed to do. Using a new institutionalist approach, Zegart asks what forces shaped the initial design of the Central Intelligence Agency, the Joint Chiefs of Staff, and the National Security Council in ways that meant they were handicapped from birth.
Ironically, she finds that much of the blame can be ascribed to cherished features of American democracy--frequent elections, the separation of powers, majority rule, political compromise--all of which constrain presidential power and give Congress little incentive to create an effective foreign policy system. At the same time, bureaucrats in rival departments had the expertise, the staying power, and the incentives to sabotage the creation of effective competitors, and this is exactly what they did.
Historical evidence suggests that most political players did not consider broad national concerns when they forged the CIA, JCS, and NSC in the late 1940s. Although President Truman aimed to establish a functional foreign policy system, he was stymied by self-interested bureaucrats, legislators, and military leaders. The NSC was established by accident, as a byproduct of political compromise; Navy opposition crippled the JCS from the outset; and the CIA emerged without the statutory authority to fulfill its assigned role thanks to the Navy, War, State, and Justice departments, which fought to protect their own intelligence apparatus.
Not surprisingly, the new security agencies performed poorly as they struggled to overcome their crippled evolution. Only the NSC overcame its initial handicaps as several presidents exploited loopholes in the National Security Act of 1947 to reinvent the NSC staff. The JCS, by contrast, remained mired in its ineffective design for nearly forty years--i.e., throughout the Cold War--and the CIA's pivotal analysis branch has never recovered from its origins. In sum, the author paints an astonishing picture: the agencies Americans count on most to protect them from enemies abroad are, by design, largely incapable of doing so.

Contemporary Security Management (Paperback, 4th edition): David A. Patterson, John Fay Contemporary Security Management (Paperback, 4th edition)
David A. Patterson, John Fay
R2,205 Discovery Miles 22 050 Ships in 10 - 15 working days

Contemporary Security Management, Fourth Edition, identifies and condenses into clear language the principal functions and responsibilities for security professionals in supervisory and managerial positions. Managers will learn to understand the mission of the corporate security department and how the mission intersects with the missions of other departments. The book assists managers with the critical interactions they will have with decision makers at all levels of an organization, keeping them aware of the many corporate rules, business laws, and protocols of the industry in which the corporation operates. Coverage includes the latest trends in ethics, interviewing, liability, and security-related standards. The book provides concise information on understanding budgeting, acquisition of capital equipment, employee performance rating, delegated authority, project management, counseling, and hiring. Productivity, protection of corporate assets, and monitoring of contract services and guard force operations are also detailed, as well as how to build quality relationships with leaders of external organizations, such as police, fire and emergency response agencies, and the Department of Homeland Security.

The Five Technological Forces Disrupting Security - How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical... The Five Technological Forces Disrupting Security - How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age (Paperback)
Steve Van Til
R1,563 Discovery Miles 15 630 Ships in 10 - 15 working days

The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. It also examines key questions on how these new technologies have lowered barriers for new entrants in the field and how they are likely to change market dynamics and affect customer choices. Set in the context of one of the early dot.com companies to enter physical security, the narrative is written for professionals from Chief Security Officers and systems integrators to product managers and investors.

Investigations: 150 Things You Should Know (Paperback, 2nd edition): Lawrence Fennelly, Marianna Perry Investigations: 150 Things You Should Know (Paperback, 2nd edition)
Lawrence Fennelly, Marianna Perry
R1,488 Discovery Miles 14 880 Ships in 10 - 15 working days

Investigations: 150 Things You Should Know, Second Edition, explores the essential tips and techniques for security investigations, providing a useful reference for those at any stage of their security career. This practical guide covers the legal guidelines that all investigators must follow. Through anecdotes, case studies and documented procedures, the authors present the most complete collection of investigative information available. Readers in the security and law enforcement fields will find this book easy to use and understand when seeking explanations about a wide variety of investigative topics, including constitutional law, documentary evidence, surveillance equipment, interviewing, interrogating and reporting.

Security Operations Center Guidebook - A Practical Guide for a Successful SOC (Paperback): Gregory Jarpey, Scott Mccoy Security Operations Center Guidebook - A Practical Guide for a Successful SOC (Paperback)
Gregory Jarpey, Scott Mccoy
R2,051 Discovery Miles 20 510 Ships in 10 - 15 working days

Security Operations Center Guidebook: A Practical Guide for a Successful SOC provides everything security professionals need to create and operate a world-class Security Operations Center. It starts by helping professionals build a successful business case using financial, operational, and regulatory requirements to support the creation and operation of an SOC. It then delves into the policies and procedures necessary to run an effective SOC and explains how to gather the necessary metrics to persuade upper management that a company's SOC is providing value. This comprehensive text also covers more advanced topics, such as the most common Underwriter Laboratory (UL) listings that can be acquired, how and why they can help a company, and what additional activities and services an SOC can provide to maximize value to a company.

Cyber Security Essentials (Hardcover): James Graham, Ryan Olson, Rick Howard Cyber Security Essentials (Hardcover)
James Graham, Ryan Olson, Rick Howard
R4,796 Discovery Miles 47 960 Ships in 10 - 15 working days

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

Snowden's Box - Trust in the Age of Surveillance (Paperback): Jessica Bruder, Dale Maharidge Snowden's Box - Trust in the Age of Surveillance (Paperback)
Jessica Bruder, Dale Maharidge
R282 R243 Discovery Miles 2 430 Save R39 (14%) Ships in 9 - 17 working days

One day in the spring of 2013, a box appeared outside a fourth-floor apartment door in Brooklyn, New York. The recipient, who didn't know the sender, only knew she was supposed to bring this box to a friend, who would ferry it to another friend. This was Edward Snowden's box-printouts of documents proving that the US government had built a massive surveillance apparatus and used it to spy on its own people-and the friend on the end of this chain was filmmaker Laura Poitras. Thus the biggest national security leak of the digital era was launched via a remarkably analog network, the US Postal Service. This is just one of the odd, ironic details that emerges from the story of how Jessica Bruder and Dale Maharidge, two experienced journalists but security novices (and the friends who received and ferried the box) got drawn into the Snowden story as behind-the-scenes players. Their initially stumbling, increasingly paranoid, and sometimes comic efforts to help bring Snowden's leaks to light, and ultimately, to understand their significance, unfold in an engrossing narrative that includes emails and diary entries from Poitras. This is an illuminating essay on the status of transparency, privacy, and trust in the age of surveillance.

Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback): Chuck Wilson Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback)
Chuck Wilson
R1,045 Discovery Miles 10 450 Ships in 10 - 15 working days

As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R4,785 Discovery Miles 47 850 Ships in 10 - 15 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

The Sociology of Privatized Security (Hardcover, 1st ed. 2019): Ori Swed, Thomas Crosbie The Sociology of Privatized Security (Hardcover, 1st ed. 2019)
Ori Swed, Thomas Crosbie
R3,140 Discovery Miles 31 400 Ships in 18 - 22 working days

The first book dedicated to the sociology of privatized security, this collection studies the important global trend of shifting security from public to private hands and the associated rise of Private Military and Security Companies (PMSCs) and their contractors. The volume first explores the trend itself, making important historical and theoretical revisions to the existing social science of private security. These chapters discuss why rulers buy, rent and create private militaries, why mercenaries have become private patriots, and why the legitimacy of military missions is undermined by the use of contractors. The next section challenges the idea that states have a monopoly on legitimate violence and questions our legal and economic assumptions about private security. The collection concludes with a discussion of the contractors themselves, focusing on gender, race, ethnicity, and other demographic factors. Featuring a mix of qualitative and quantitative methods and a range of theoretical and methodological innovations, this book will inspire sociologists to examine, with fresh eyes, the behind-the-scenes tension between the high drama of war and conflict and the mundane realities of privatized security contractors and their everyday lives.

Sports Travel Security (Paperback): Peter Tarlow Sports Travel Security (Paperback)
Peter Tarlow
R2,210 R1,839 Discovery Miles 18 390 Save R371 (17%) Ships in 10 - 15 working days

Sports Team Security examines the security needs for sports teams and events of all sizes. This groundbreaking book provides a fundamental model for sports team security that can be applied almost universally, from youth sports to the Super Bowl and World Cup. The book develops, compares, and contrasts current methodologies in sports security, for both amateur and professional athletes, examining which paradigms work best and under which circumstances. This valuable information is applicable to nearly anyone involved in the safety of athletes, including event managers, law enforcement, parents, school administrators and coaches, security practitioners, tourism industry professionals, and legal professionals. It explores areas rarely investigated, providing key advice for creating best practices and guidelines in sports team security.

The Stasi - Myth and Reality (Hardcover): Mike Dennis, Norman Laporte The Stasi - Myth and Reality (Hardcover)
Mike Dennis, Norman Laporte
R4,213 Discovery Miles 42 130 Ships in 10 - 15 working days

The East German Ministry of State Security, popularly known as the Stasi, was one of the largest and most intrusive secret police systems in world history. So extensive was the system of surveillance and control that in any given year throughout the 1970s and 1980s, about one in fifty of the 13 million East German adults were working for the Stasi either as an officer or as an informer. Drawing on original sources from the Stasi archives and the recollections of contemporary witnesses, The Stasi: Myth and Reality reveals the intricacies of the relationship between the Stasi enforcers, its agents and its targets/victims, and demonstrates how far the Stasi octopus extended its tentacles into people's lives and all spheres of society. The origins and developments of this vast system of repression are examined, as well as the motivation of the informers and the ways in which they penetrated the niches of East German society. The final chapters assess the ministry's failure to help overcome the GDR's inherent structural defects and demonstrate how the Stasi's bureaucratic procedures contributed to the implosion of the Communist system at the end of the 1980's.

Knowledge and information - The Potential and Peril of Human Intelligence (Hardcover): Peter Frankopan, Jessica Frazier, Adrian... Knowledge and information - The Potential and Peril of Human Intelligence (Hardcover)
Peter Frankopan, Jessica Frazier, Adrian Wooldridge
R660 R571 Discovery Miles 5 710 Save R89 (13%) Ships in 17 - 22 working days
Handbook of SCADA/Control Systems Security (Hardcover, 2nd edition): Robert Radvanovsky, Jacob Brodsky Handbook of SCADA/Control Systems Security (Hardcover, 2nd edition)
Robert Radvanovsky, Jacob Brodsky; Burt G. Look
R4,244 Discovery Miles 42 440 Ships in 10 - 15 working days

This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized. Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in Social implications and impacts Governance and management Architecture and modeling Commissioning and operations The future of SCADA and control systems security The book also includes four case studies of well-known public cyber security-related incidents. The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.

Securitising Russia - The Domestic Politics of Vladimir Putin (Hardcover, New): Edwin Bacon, Bettina Renz, Julian Cooper Securitising Russia - The Domestic Politics of Vladimir Putin (Hardcover, New)
Edwin Bacon, Bettina Renz, Julian Cooper
R2,373 R2,212 Discovery Miles 22 120 Save R161 (7%) Ships in 10 - 15 working days

Securitising Russia shows the impact of twenty-first-century security concerns on the way Russia is ruled. It demonstrates how President Putin has wrestled with terrorism, immigration, media freedom, religious pluralism, and economic globalism, and argues that fears of a return to old-style authoritarianism oversimplify the complex context of contemporary Russia. The book focuses on the internal security issues common to many states in the early twenty-first-century, and places them in the particular context of Russia. Detailed analysis of the place of security in Russia's political discourse and policy-making reveals nuances often missing from overarching assessments of Russia today. To characterise the Putin regime as the 'KGB-resurgent' is to miss vital continuities, contexts, and on-going political conflicts which make up the contemporary Russian scene. Securitising Russia draws together current debates about whether Russia is a 'normal' country developing its own democratic and market structures, or a nascent authoritarian regime returning to the past. -- .

Effective Security Management (Hardcover, 6th edition): Charles A. Sennewald, Curtis Baillie Effective Security Management (Hardcover, 6th edition)
Charles A. Sennewald, Curtis Baillie
R1,702 Discovery Miles 17 020 Ships in 10 - 15 working days

Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers. The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Machine See, Machine Do - How Technology…
Patrick K Lin Hardcover R683 R612 Discovery Miles 6 120
Biometrics - Concepts, Methodologies…
Information Reso Management Association Hardcover R9,432 Discovery Miles 94 320
Contemporary Security Management
John Fay Hardcover R1,479 Discovery Miles 14 790
Risk Management for Security…
Carl Roper Hardcover R1,849 Discovery Miles 18 490
Security Consulting
Charles A. Sennewald Paperback R1,107 Discovery Miles 11 070
The Enforcers - Inside Cape Town's…
Caryn Dolley Paperback  (1)
R295 R264 Discovery Miles 2 640
Geospatial Technologies and Homeland…
Daniel Sui Hardcover R4,219 Discovery Miles 42 190
Gender and Private Security in Global…
Maya Eichler Hardcover R3,575 Discovery Miles 35 750
The Stasi - Myth and Reality
Mike Dennis, Norman Laporte Paperback R1,844 Discovery Miles 18 440
Silent Weapons for Quiet Wars - An…
Anonymous Hardcover R592 R536 Discovery Miles 5 360

 

Partners