![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.
Organizational communication impacts service efficiency and productivity. An increase in federal funding to strengthen communication within the airport stakeholders has failed to deliver expected results. The purpose of this qualitative case study is to explore whether miscommunication among the TSA agents and airport employees relates to effective implementation of airport security policies. The central research question focuses on the degree to which miscommunication between the TSA and airlines regarding prohibited items at security checkpoints impeded the effective execution of federal law regarding carry on luggage on commercial aircraft. Using Weick's organizational information theory, this study examines the implementation of airport security policy focusing on communication between government and industry organizations. A sample of 13 private airline employees and 7 airport employees at a large U.S. commercial airport participated in the study. Data was collected via semi structured interview questions. Data was coded and analyzed following an inductive coding strategy. According to study results, there is very little evidence of miscommunications between government and airline stakeholders regarding policy changes and expectations related to security procedures. However, miscommunication about the same policy changes to consumers confuses travelers, which may explain incidences of prohibited items at the security checkpoints. Implications for positive social change related to this study may assist policy makers in clarifying language to better inform travelers about security changes and prohibited items, the objective of which will promote safer flying experiences, reduce the potential for harm, and result in more expedient traveling.
From fires, floods, and power outages to hackers and software problems, companies need to protect against a variety of threats. Business Continuity Planning takes a best practices approach to provide a comprehensive continuity solution. It details how to build a plan to handle disruptions in business, keep vital operations up and running, and prevent losses that occur when productivity is crippled or security is compromised. The book explains how to evaluate a current plan for completeness and how to monitor and maintain it to ensure it remains up-to-date.
The service sector occupies a dominant position in the Japanese economy, yet few studies have looked at the way the industry developed. This book, first published in 1992, focuses on the growth and development of a major world security and communications corporation, SECOM. The success of the company has been rooted in the management strategies of Makoto Iida, who has shaped the company from a small localized business to an international industry at the forefront of innovation. The book first looks at the background of Makoto Iida, offering an insight into the nature of an entrepreneur and the issues this raises within the context of Japanese management styles. It then follows the company development stage by stage, assessing the importance of individual creativity in adapting and implementing traditional management techniques. It shows how strategies for human resources, service quality, new technology, globalization and corporate restructuring evolve within the context of a growing organization, and includes an analysis of the innovative marketing techniques and product development processes needed to sell security services to one of the world's safest countries.
Casino and Gaming Resort Investigations addresses the continued and growing need for gaming security professionals to properly and successfully investigate the increasing and unique types of crime they will face in their careers. As the gaming industry has grown, so has the need for competent and highly skilled investigators who must be prepared to manage a case of employee theft one day to a sophisticated sports book scam the next. This book provides the reader with the fundamental knowledge needed to understand how each gaming and non-gaming department functions and interacts within the overall gaming resort, allowing the investigator to determine and focus on the important elements of any investigation in any area. Each chapter delivers a background of a department or type of crime normally seen in the gaming environment, and then discusses what should be considered important or even critical for the investigator to know or determine in the course of the investigation. Likely scenarios, case histories, and tips, as well as cautions for investigators to be aware of, are used throughout the book. This book was written for and directed at gaming security and surveillance professionals, including gaming regulators, and tribal gaming authorities, who are almost daily confronted by the ingenious and the most common scams, theft, and frauds that are perpetrated in the gaming world.
Today, public space has become a fruitful venue for surveillance of many kinds. Emerging surveillance technologies used by governments, corporations, and even individual members of the public are reshaping the very nature of physical public space. Especially in urban environments, the ability of individuals to remain private or anonymous is being challenged. Surveillance, Privacy, and Public Space problematizes our traditional understanding of 'public space'. The chapter authors explore intertwined concepts to develop current privacy theory and frame future scholarly debate on the regulation of surveillance in public spaces. This book also explores alternative understandings of the impacts that modern living and technological progress have on the experience of being in public, as well as the very nature of what public space really is. Representing a range of disciplines and methods, this book provides a broad overview of the changing nature of public space and the complex interactions between emerging forms of surveillance and personal privacy in these public spaces. It will appeal to scholars and students in a variety of academic disciplines, including sociology, surveillance studies, urban studies, philosophy, law, communication and media studies, political science, and criminology.
Traditionally, resources on terrorism and counterterrorism tend to focus on the social, behavioral, and legal aspects of the subject, with minimal emphasis on the scientific and technological aspects. Taking into account these practical considerations, the second edition of Science and Technology of Terrorism and Counterterrorism discusses the nature of terrorism and the materials used by terrorists. It describes how intelligence professionals and law enforcement personnel can detect and destroy these materials, and how they can deal with terrorist groups. This volume begins by introducing the shift in analysis of terrorist attacks after September 11, 2001 and summarizes selected case studies. It discusses the origin and nature of terrorism and the factors involved in diplomacy. Covering a broad range of topics, the book examines: Aerosol dispersion of toxic materials Bioterrorism and the manufacture, detection, and delivery of biological agents Agricultural terrorism Nuclear terrorism and nuclear weapons systems, threats, and safeguards Chemical terrorism, including manufacture, detection, delivery, and decontamination Cyber-terrorism Personal protective equipment The role of government at federal, state, and local levels The role of international agencies and their resources, capabilities, and responsibilities The National Infrastructure Protection Plan As terrorist activities increase globally, it is critical that those charged with protecting the public understand the myriad of ways in which terrorists operate. While we cannot predict where, when, and how terrorists will strike, our vigilance in staying abreast of the terrorist threat is the only way to have a fighting chance against those who seek to destroy our world.
From the highly acclaimed author of WAYS OF BEING. We live in times of increasing inscrutability. Our news feeds are filled with unverified, unverifiable speculation, much of it automatically generated by anonymous software. As a result, we no longer understand what is happening around us. Underlying all of these trends is a single idea: the belief that quantitative data can provide a coherent model of the world, and the efficacy of computable information to provide us with ways of acting within it. Yet the sheer volume of information available to us today reveals less than we hope. Rather, it heralds a new Dark Age: a world of ever-increasing incomprehension. In his brilliant new work, leading artist and writer James Bridle offers us a warning against the future in which the contemporary promise of a new technologically assisted Enlightenment may just deliver its opposite: an age of complex uncertainty, predictive algorithms, surveillance, and the hollowing out of empathy. Surveying the history of art, technology and information systems he reveals the dark clouds that gather over discussions of the digital sublime.
As corporations and governments become more litigious and risk averse, international risk management becomes more complex. Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct examines real cases of corporate crisis, crime, fraud, and other misconduct that corporate security professionals need to be aware of to effectively protect people, operations, and assets within the region. Current security threats and risks are addressed to help readers conduct an informed risk assessment and analysis of operational risk. Providing detailed guidance on how to address the unique threats and risks in this dynamic and growing business environment, the book: Presents an overview of the region, with relevant historical background Offers recent case examples of crime and common issues facing a given region or country Highlights the range and frequency of corporate security-related breaches and crimes specific to countries in the region Provides detailed write-ups of every country in the region including the major players-Japan, China, India, Indonesia, Singapore, Malaysia, Thailand, and the Philippines Outlines security best practices for navigating the political and law enforcement challenges involved with operating in the region This book provides readers with the regional snapshot and geo-political background needed to understand the cultural differences, challenges, and the state of affairs for any country in the region. Filled with detailed cases of crime, theft of trade secrets, risk factors, and best practices, this book provides the real-world understanding you'll need to conduct better-informed security management that will lead to improved decisions on how to protect your people and assets in the Asia-Pacific region.
Between 1994-2014, Israel's security service was transformed, becoming one of the most extreme examples of privatised security in the world. This book is an investigation into this period and the conditions that created 'Occupation Inc.': the institution of a private military-security-industrial complex. State sponsored violence is increasing as a result of this securitisation, but why is it necessary, and what are its implications? In this book, Shir Hever considers the impact of the ongoing Palestinian resistance to Israeli occupation, the influence of U.S. military aid and the rise of neoliberalism in Israel, to make sense of this dramatic change in security policy. Through the lens of political economy, this book shows how the Israeli security elites turn violence into a commodity in order to preserve their status and wealth, providing a fresh new perspective on the Israeli occupation.
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.
Management of hazardous chemicals and materials-particularly during emergency release situations-is a critical part of routine training required for workers and professionals in the chemical, petroleum and manufacturing industries. Proper storage of highly reactive chemical agents, correct choice of protective clothing and safety issues in confined spaces are vital to operating facilities. Inattention to these and other issues covered in this book can result in a loss of life, dispersal of toxic chemical agents into the environment, or fire and explosion and subsequent legal liabilities.Emergency Response and Hazardous Chemical Management: Principles and Practices provides a concise reference for management and workers on the important issues regarding the use and management of hazardous chemicals as well as the critical issues in the emergency response management of uncontrolled releases of hazardous agents. This book combines practical information on hazardous chemical response and environmental management with scientific and management issues important in the development of sound chemical management planning. Important current topics such as hazardous chemical management in confined spaces are also covered in detail.
Maintain peace of mind while you are working or living abroad-wherever and however you travel. As an international traveler, you know there are risks. But are you doing everything you can to protect yourself and your belongings? Whether you are traveling for work or pleasure, Personal Security: A Guide for International Travelers enables you to prevent security incidents and react in life-saving ways during a crisis. This comprehensive manual answers questions such as: Which criteria should you use for selecting the safest hotel or airline? How to deal with corrupt officials? What are special considerations for women, families, elderly, or travelers with disabilities? What support can you expect from your organization and what are your responsibilities? Benefit from lessons learned from leading experts and seasoned travelers Learn how criminals select their targets and manipulate situations, whether for street crime or serious attack such as kidnapping or terrorism See yourself from the local perspective Deal with common travel inconveniences and stress factors proactively Improve your situational awareness Increase your effectiveness by realistically assessing threats Make the most out of the opportunities that traveling brings Tanya Spencer has traveled extensively to high-risk destinations and has trained 1000s of people how to safely navigate the complexities of international travel. Emphasizing prevention, the book covers medical, cultural, and political considerations, so you understand exactly what you must do before and while you are abroad. It provides flexible frameworks, models, and tools that allow you to easily apply the wealth of tips and advice to any travel situation you might face. Before your next trip, benefit from these time-tested strategies for proactively managing travel risks.
First published in 2003, Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities remains one of the only books available to provide detailed information on terrorist methodology revealing terrorist motivation, organizational structure, planning, financing, and operational tactics to carry out attacks. This fully revised and updated third edition contains the detailed analysis and history of prior editions with completely new case studies and information on new and emerging terrorist practices and trends. Updates to the third edition include: The newest geopolitical challenges and terrorism to emerge from the geopolitical climate post-Arab Spring Details on the newest attack tactics and procedures of al-Qaeda including al-Qaeda of the Arabian Peninsula, the Islamic Maghreb, and East and North Africa Lessons learned from recent terrorist operations and information gained from plots foiled by the FBI in the U.S. Current strategic factors and regional variables affecting global terrorism and regional insurgencies Potential points of failure in terrorist operations where plots can be most easily detected and disrupted The increasing trend of self radicalized, Internet- educated "lone wolf" operations, as demonstrated in the Boston Marathon bombing The rebirth of U.S. and European militia groups Written for counterterrorism practitioners who risk their lives to uncover planned attacks on civilian populations, this book will serve as a guide to train intelligence operatives, law enforcement entities, and military intelligence agents and soldiers to recognize and disrupt the various stages of developing terrorist plots.
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.
How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the procedures and processes needed for loss reduction, protection of organizational assets, and security and safety management. Presents Vital Information on Recognizing and Understanding Security Needs The book is divided into two parts. The first half of the text, Security and Safety Planning, explores the theory and concepts of security and covers: threat decomposition, identifying security threats and vulnerabilities, protection, and risk assessment. The second half, Infrastructure Protection, examines the overall physical protection program and covers: access and perimeter control, alarm systems, response force models, and practical considerations for protecting information technology (IT). Addresses general safety concerns and specific issues covered by Occupational Safety and Health Administration (OSHA) and fire protection regulations Discusses security policies and procedures required for implementing a system and developing an attitude of effective physical security Acts as a handbook for security applications and as a reference of security considerations Physical Security and Safety: A Field Guide for the Practitioner offers relevant discourse on physical security in the workplace, and provides a guide for security, risk management, and safety professionals.
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise. Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.
Essentials of Modeling and Analytics illustrates how and why analytics can be used effectively by loss prevention staff. The book offers an in-depth overview of analytics, first illustrating how analytics are used to solve business problems, then exploring the tools and training that staff will need in order to engage solutions. The text also covers big data analytical tools and discusses if and when they are right for retail loss prevention professionals, and illustrates how to use analytics to test the effectiveness of loss prevention initiatives. Ideal for loss prevention personnel on all levels, this book can also be used for loss prevention analytics courses. Essentials of Modeling and Analytics was named one of the best Analytics books of all time by BookAuthority, one of the world's leading independent sites for nonfiction book recommendations.
Business Theft and Fraud: Detection and Prevention offers a broad perspective on business-related theft, providing a detailed discussion of numerous avenues of theft, including internal and external fraud, organized retail crime, mortgage fraud, cyber fraud, and extortion. Combining current research and the author's extensive experience with loss prevention and security, this professional text identifies industry trouble areas and offers techniques to combat business theft, such as how to identify sales underreporting, track sales by shifts, and educate employees on computer-related fraud. This publication is critical for those involved with loss prevention, security, or criminal justice. Business Theft and Frauds accessible, franchise-oriented scope will help many professionals identify and thwart threats in the evolving business world.
Former police and military personnel possess attractive skill sets for the private security industry; however, the transition to the corporate arena is not without challenges. Competition for these jobs is fierce. Many candidates possess degrees in security management'some having spent their entire professional careers in private security. From Police to Security Professional: A Guide to a Successful Career Transition provides tips on overcoming the inherent obstacles law enforcement professionals face in making the switch and supplies a practical roadmap for entry into the private security world. The foundation of the book comes from the author's own journey and the many hurdles he encountered transitioning to private sector security. With his help, you'll learn: The unique skills, experience, and mentality required to enter into the private security industry from a law enforcement background The opportunities available and the different areas within the industry including benefits and income potential How to properly evaluate your training portfolio How to tailor your resume to garner the attention of hiring executives The many professional associations and certifications that could be helpful in your career Vital to your ability to succeed is understanding that security management has evolved into a distinct profession in its own right one that brings with it different education, experience, and skill sets that clearly differentiate it from law enforcement. This book will help you better understand and be prepared for the policies, processes, and a corporate environment that operates in a very different way than the police structure to which you are accustomed. With the author's help, you'll give yourself every advantage to get the job and succeed in your new career.
In Challenges to US and Mexican Police and Tourism Stability, author Peter Tarlow examines the US-Mexico border crisis and its impact on tourism, along with tourism security in both the United States and Mexico. He also examines the impact of police corruption and cartels on the tourism industry. Presenting detailed case studies of the U.S. cities of Chicago, New York, San Francisco, and Washington D.C, the collection concludes with comparisons on the issues facing tourism policing in the US and Mexico, exploring the dangers, hopes and recommendations for the future. The way a state's police force operates generates a range of complex and interconnected issues, including law enforcement's role in tourism. Recent debates have arisen around the media and law enforcement such as the incidents leading to the George Floyd protests and the Defund-the-Police movement. Challenges to US and Mexican Police and Tourism Stability examines the impacts that historical, political, and social campaigns targeting police practices have had on law enforcement in general and on the tourism industry in particular, specifically focusing on recent developments in both the USA and Mexico. The Tourism Security-Safety and Post Conflict Destinations series provides an insightful guide for policy makers, specialists and social scientists interested in the future of tourism in a society where uncertainness, anxiety and fear prevail.
First published in 2003. Routledge is an imprint of Taylor & Francis, an informa company.
This book is intended for electric utility managers, directors, and power system planners, regulators, and policy makers interested in the steps needed to realize the value of a modern power delivery system. This book describes the elements needed in planning and implementing a "Smart Grid" by outlining how the electricity delivery system can be modernized so it monitors, protects, and automatically optimizes the operation of its interconnected elements-from the central and distributed generator through the high-voltage network and distribution system, to energy storage installations and to end-use consumers and their thermostats, electric vehicles, appliances, and other household devices. This comprehensive guide highlights emerging concepts of cyber and physical security, resiliency, and the newest architecture-"The Integrated Grid." You'll gain an understanding of how a two-way flow of electricity and information can be used to create an automated, widely distributed energy delivery network.
Since 9/11, the U.S. government and the private sector have devised sophisticated ways of protecting people and assets. The threats have evolved, however, becoming more insidious. They no longer comprise just terrorists who target critical infrastructures. They also include insider threats, such as PFC Manning and NSA contractor Snowden who leaked classified defense information, active shooter incidents like the Sandy Hook Elementary School massacre, and the 2013 Boston Marathon terrorist bombing. These events make it imperative for the public and private sectors to engage in effective partnership to protect people, facilities, and national infrastructure assets. Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection, Second Edition identifies the role the private sector plays in securing our homeland and offers strategies to aid in the fight against national and international threats. Addressing mandates and legislation introduced since the first edition, this new edition includes: Updates to the NIPP (National Infrastructure Protection Plan) New case studies of both proper security policies and procedures in practice versus costly security breaches Greater focus on smaller business and practical "immediate use" guidance New measures for assessing and addressing vulnerabilities and threats New appendices with sample plans and practical checklists Supplying tools that can easily be adapted and applied to every business situation at all budget levels, the book helps businesses counter the total threat, from traditional terrorists to inside betrayers-providing a clear blueprint for securing people and assets. |
You may like...
Journalism and the Nsa Revelations…
Adrienne Russell, Risto Kunelius, …
Hardcover
R3,332
Discovery Miles 33 320
|