0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (35)
  • R500+ (397)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Private Security and Domestic Violence - The Risks and Benefits of Private Security Companies Working With Victims of Domestic... Private Security and Domestic Violence - The Risks and Benefits of Private Security Companies Working With Victims of Domestic Violence (Hardcover)
Diarmaid Harkin
R4,062 Discovery Miles 40 620 Ships in 12 - 17 working days

Private companies are increasingly involved with the security of domestic violence victims. This has manifested in a number of ways, including private security companies working in partnership with domestic violence services, the proliferation of security-technology companies that seek a market within the domestic violence sector, and governments contracting private companies to provide security provision for victims. Private Security and Domestic Violence offers a world-first analysis of the risks and benefits of for-profit businesses engaging with a vulnerable and underprotected section of society. Based on original data gathered in Australia, this book provides internationally relevant insights on the dangers but also the potential benefits of increasing private sector involvement with victims of domestic abuse. It offers a unique crossover of the literature on private security, crime prevention and domestic violence. Aimed at scholars, policymakers, and frontline workers within the domestic violence sector, Private Security and Domestic Violence documents experimental new collaborations and partnerships between the private, community and governmental spheres and makes a case for the suitable regulatory solutions to be put in place to successfully manage private security involvement with domestic violence victims. By outlining the risks and the benefits of this new form of security provision and detailing a potential model of regulation, this book offers a pathway for improving how we provide for a chronically underprotected population. It will be of interest to criminology and criminal justice students and researchers engaged in studies of abuse, domestic violence, violent crime, victims and victimology, crime prevention, and security.

Asset Protection and Security Management Handbook (Hardcover): James Walsh Asset Protection and Security Management Handbook (Hardcover)
James Walsh
R3,979 Discovery Miles 39 790 Ships in 12 - 17 working days

The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.

Based on the ASIS asset protection course, the text provides information vital to security planning and operational requirements. It addresses the most comonly recognized issues in the field and explores the future of asset protection management. The authors examine the latest in crime detection, prevention, and interrogation techniques. The Asset Protection and Security Management Handbook will not only help you to explore effective security training and educational programs for your organization, but will also help you discover proven methods of selling your security program to top management.

Corporate Security in the Asia-Pacific Region - Crisis, Crime, Fraud, and Misconduct (Paperback): Christopher J. Cubbage, CPP,... Corporate Security in the Asia-Pacific Region - Crisis, Crime, Fraud, and Misconduct (Paperback)
Christopher J. Cubbage, CPP, David J. Brooks, PhD
R1,773 Discovery Miles 17 730 Ships in 12 - 17 working days

As corporations and governments become more litigious and risk averse, international risk management becomes more complex. Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct examines real cases of corporate crisis, crime, fraud, and other misconduct that corporate security professionals need to be aware of to effectively protect people, operations, and assets within the region. Current security threats and risks are addressed to help readers conduct an informed risk assessment and analysis of operational risk. Providing detailed guidance on how to address the unique threats and risks in this dynamic and growing business environment, the book: Presents an overview of the region, with relevant historical background Offers recent case examples of crime and common issues facing a given region or country Highlights the range and frequency of corporate security-related breaches and crimes specific to countries in the region Provides detailed write-ups of every country in the region including the major players-Japan, China, India, Indonesia, Singapore, Malaysia, Thailand, and the Philippines Outlines security best practices for navigating the political and law enforcement challenges involved with operating in the region This book provides readers with the regional snapshot and geo-political background needed to understand the cultural differences, challenges, and the state of affairs for any country in the region. Filled with detailed cases of crime, theft of trade secrets, risk factors, and best practices, this book provides the real-world understanding you'll need to conduct better-informed security management that will lead to improved decisions on how to protect your people and assets in the Asia-Pacific region.

Business Continuity Planning - Protecting Your Organization's Life (Hardcover): Ken Doughty Business Continuity Planning - Protecting Your Organization's Life (Hardcover)
Ken Doughty
R3,957 Discovery Miles 39 570 Ships in 12 - 17 working days

From fires, floods, and power outages to hackers and software problems, companies need to protect against a variety of threats. Business Continuity Planning takes a best practices approach to provide a comprehensive continuity solution. It details how to build a plan to handle disruptions in business, keep vital operations up and running, and prevent losses that occur when productivity is crippled or security is compromised. The book explains how to evaluate a current plan for completeness and how to monitor and maintain it to ensure it remains up-to-date.

Practical Hacking Techniques and Countermeasures (Hardcover): Mark D Spivey Practical Hacking Techniques and Countermeasures (Hardcover)
Mark D Spivey
R4,950 Discovery Miles 49 500 Ships in 12 - 17 working days

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

Professional Security Management - A Strategic Guide (Hardcover): Charles Swanson Professional Security Management - A Strategic Guide (Hardcover)
Charles Swanson
R1,573 Discovery Miles 15 730 Ships in 9 - 15 working days

Historically, security managers have tended to be sourced from either the armed forces or law enforcement. But the increasing complexity of the organisations employing them, along with the technologies employed by them, is forcing an evolution and expansion of the role, and security managers must meet this challenge in order to succeed in their field and protect the assets of their employers. Risk management, crisis management, continuity management, strategic business operations, data security, IT, and business communications all fall under the purview of the security manager. This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses. It covers the basics of strategy, risk, and technology from the perspective of the security manager, focussing only on the 'need to know'. The reader will benefit from an understanding of how risk management aligns its functional aims with the strategic goals and operations of the organisation. This essential book supports professional vocational accreditation and qualifications, such as the Chartered Security Professional (CSyP) or Certified Protection Professional (CPP), and advises on pathways to higher education qualifications in the fields of security and risk management. It is ideal for any risk manager looking to further their training and development, as well as being complementary for risk and security management programs with a focus on practice.

Emergency Response and Hazardous Chemical Management - Principles and Practices (Hardcover): Clyde B. Strong, T.Rick Irvin Emergency Response and Hazardous Chemical Management - Principles and Practices (Hardcover)
Clyde B. Strong, T.Rick Irvin
R4,685 Discovery Miles 46 850 Ships in 12 - 17 working days

Management of hazardous chemicals and materials-particularly during emergency release situations-is a critical part of routine training required for workers and professionals in the chemical, petroleum and manufacturing industries. Proper storage of highly reactive chemical agents, correct choice of protective clothing and safety issues in confined spaces are vital to operating facilities. Inattention to these and other issues covered in this book can result in a loss of life, dispersal of toxic chemical agents into the environment, or fire and explosion and subsequent legal liabilities.Emergency Response and Hazardous Chemical Management: Principles and Practices provides a concise reference for management and workers on the important issues regarding the use and management of hazardous chemicals as well as the critical issues in the emergency response management of uncontrolled releases of hazardous agents. This book combines practical information on hazardous chemical response and environmental management with scientific and management issues important in the development of sound chemical management planning. Important current topics such as hazardous chemical management in confined spaces are also covered in detail.

Terrorist Recognition Handbook - A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Third... Terrorist Recognition Handbook - A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Third Edition (Hardcover, 3rd edition)
Desmond Wenger, Malcolm W. Nance
R5,578 Discovery Miles 55 780 Ships in 12 - 17 working days

First published in 2003, Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities remains one of the only books available to provide detailed information on terrorist methodology revealing terrorist motivation, organizational structure, planning, financing, and operational tactics to carry out attacks. This fully revised and updated third edition contains the detailed analysis and history of prior editions with completely new case studies and information on new and emerging terrorist practices and trends. Updates to the third edition include: The newest geopolitical challenges and terrorism to emerge from the geopolitical climate post-Arab Spring Details on the newest attack tactics and procedures of al-Qaeda including al-Qaeda of the Arabian Peninsula, the Islamic Maghreb, and East and North Africa Lessons learned from recent terrorist operations and information gained from plots foiled by the FBI in the U.S. Current strategic factors and regional variables affecting global terrorism and regional insurgencies Potential points of failure in terrorist operations where plots can be most easily detected and disrupted The increasing trend of self radicalized, Internet- educated "lone wolf" operations, as demonstrated in the Boston Marathon bombing The rebirth of U.S. and European militia groups Written for counterterrorism practitioners who risk their lives to uncover planned attacks on civilian populations, this book will serve as a guide to train intelligence operatives, law enforcement entities, and military intelligence agents and soldiers to recognize and disrupt the various stages of developing terrorist plots.

Personal Security - A Guide for International Travelers (Hardcover): Tanya Spencer Personal Security - A Guide for International Travelers (Hardcover)
Tanya Spencer
R5,538 Discovery Miles 55 380 Ships in 12 - 17 working days

Maintain peace of mind while you are working or living abroad-wherever and however you travel. As an international traveler, you know there are risks. But are you doing everything you can to protect yourself and your belongings? Whether you are traveling for work or pleasure, Personal Security: A Guide for International Travelers enables you to prevent security incidents and react in life-saving ways during a crisis. This comprehensive manual answers questions such as: Which criteria should you use for selecting the safest hotel or airline? How to deal with corrupt officials? What are special considerations for women, families, elderly, or travelers with disabilities? What support can you expect from your organization and what are your responsibilities? Benefit from lessons learned from leading experts and seasoned travelers Learn how criminals select their targets and manipulate situations, whether for street crime or serious attack such as kidnapping or terrorism See yourself from the local perspective Deal with common travel inconveniences and stress factors proactively Improve your situational awareness Increase your effectiveness by realistically assessing threats Make the most out of the opportunities that traveling brings Tanya Spencer has traveled extensively to high-risk destinations and has trained 1000s of people how to safely navigate the complexities of international travel. Emphasizing prevention, the book covers medical, cultural, and political considerations, so you understand exactly what you must do before and while you are abroad. It provides flexible frameworks, models, and tools that allow you to easily apply the wealth of tips and advice to any travel situation you might face. Before your next trip, benefit from these time-tested strategies for proactively managing travel risks.

Physical Security and Safety - A Field Guide for the Practitioner (Hardcover): Truett A Ricks, Bobby E. Ricks, Jeffrey Dingle Physical Security and Safety - A Field Guide for the Practitioner (Hardcover)
Truett A Ricks, Bobby E. Ricks, Jeffrey Dingle
R5,396 Discovery Miles 53 960 Ships in 12 - 17 working days

How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the procedures and processes needed for loss reduction, protection of organizational assets, and security and safety management. Presents Vital Information on Recognizing and Understanding Security Needs The book is divided into two parts. The first half of the text, Security and Safety Planning, explores the theory and concepts of security and covers: threat decomposition, identifying security threats and vulnerabilities, protection, and risk assessment. The second half, Infrastructure Protection, examines the overall physical protection program and covers: access and perimeter control, alarm systems, response force models, and practical considerations for protecting information technology (IT). Addresses general safety concerns and specific issues covered by Occupational Safety and Health Administration (OSHA) and fire protection regulations Discusses security policies and procedures required for implementing a system and developing an attitude of effective physical security Acts as a handbook for security applications and as a reference of security considerations Physical Security and Safety: A Field Guide for the Practitioner offers relevant discourse on physical security in the workplace, and provides a guide for security, risk management, and safety professionals.

Web Security - A WhiteHat Perspective (Hardcover): Hanqing Wu, Liz Zhao Web Security - A WhiteHat Perspective (Hardcover)
Hanqing Wu, Liz Zhao
R5,149 Discovery Miles 51 490 Ships in 12 - 17 working days

In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.

Security Strategy - From Requirements to Reality (Hardcover): Bill Stackpole, Eric Oksendahl Security Strategy - From Requirements to Reality (Hardcover)
Bill Stackpole, Eric Oksendahl
R5,123 Discovery Miles 51 230 Ships in 12 - 17 working days

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise. Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.

Managing A Network Vulnerability Assessment (Hardcover): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Hardcover)
Thomas R. Peltier, Justin Peltier, John A Blackley
R4,971 Discovery Miles 49 710 Ships in 12 - 17 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

From Police to Security Professional - A Guide to a Successful Career Transition (Hardcover): Michael S. D'Angelo From Police to Security Professional - A Guide to a Successful Career Transition (Hardcover)
Michael S. D'Angelo
R5,679 Discovery Miles 56 790 Ships in 12 - 17 working days

Former police and military personnel possess attractive skill sets for the private security industry; however, the transition to the corporate arena is not without challenges. Competition for these jobs is fierce. Many candidates possess degrees in security management'some having spent their entire professional careers in private security. From Police to Security Professional: A Guide to a Successful Career Transition provides tips on overcoming the inherent obstacles law enforcement professionals face in making the switch and supplies a practical roadmap for entry into the private security world. The foundation of the book comes from the author's own journey and the many hurdles he encountered transitioning to private sector security. With his help, you'll learn: The unique skills, experience, and mentality required to enter into the private security industry from a law enforcement background The opportunities available and the different areas within the industry including benefits and income potential How to properly evaluate your training portfolio How to tailor your resume to garner the attention of hiring executives The many professional associations and certifications that could be helpful in your career Vital to your ability to succeed is understanding that security management has evolved into a distinct profession in its own right one that brings with it different education, experience, and skill sets that clearly differentiate it from law enforcement. This book will help you better understand and be prepared for the policies, processes, and a corporate environment that operates in a very different way than the police structure to which you are accustomed. With the author's help, you'll give yourself every advantage to get the job and succeed in your new career.

Business Theft and Fraud - Detection and Prevention (Hardcover): James R. Youngblood Business Theft and Fraud - Detection and Prevention (Hardcover)
James R. Youngblood
R5,685 Discovery Miles 56 850 Ships in 12 - 17 working days

Business Theft and Fraud: Detection and Prevention offers a broad perspective on business-related theft, providing a detailed discussion of numerous avenues of theft, including internal and external fraud, organized retail crime, mortgage fraud, cyber fraud, and extortion. Combining current research and the author's extensive experience with loss prevention and security, this professional text identifies industry trouble areas and offers techniques to combat business theft, such as how to identify sales underreporting, track sales by shifts, and educate employees on computer-related fraud. This publication is critical for those involved with loss prevention, security, or criminal justice. Business Theft and Frauds accessible, franchise-oriented scope will help many professionals identify and thwart threats in the evolving business world.

National Security Surveillance in Southern Africa - An Anti-Capitalist Perspective (Hardcover): Jane Duncan National Security Surveillance in Southern Africa - An Anti-Capitalist Perspective (Hardcover)
Jane Duncan
R3,022 Discovery Miles 30 220 Ships in 9 - 15 working days

In spite of Edward Snowden's disclosures about government abuses of dragnet communication surveillance, the surveillance industry continues to expand around the world. Many people have become resigned to a world where they cannot have a reasonable expectation of privacy. The author looks at what can be done to rein in these powers and restructure how they are used beyond the limited and often ineffective reforms that have been attempted. Using southern Africa as a backdrop, and its liberation history, Jane Duncan examines what an anti-capitalist perspective on intelligence and security powers could look like. Are the police and intelligence agencies even needed, and if so, what should they do and why? What lessons can be learnt from how security was organised during the struggles for liberation in the region? Southern Africa is seeing thousands of people in the region taking to the streets in protests. In response, governments are scrambling to acquire surveillance technologies to monitor these new protest movements. Southern Africa faces no major terrorism threats at the moment, which should make it easier to develop clearer anti-surveillance campaigns than in Europe or the US. Yet, because of tactical and strategic ambivalence about security powers, movements often engage in limited calls for intelligence and policing reforms, and fail to provide an alternative vision for policing and intelligence. Surveillance and Intelligence in Southern Africa examines what that vision could look like.

Japanese - Descriptive Grammar (Hardcover, Revised): John Hinds Japanese - Descriptive Grammar (Hardcover, Revised)
John Hinds
R7,477 Discovery Miles 74 770 Ships in 12 - 17 working days

First published in 2003. Routledge is an imprint of Taylor & Francis, an informa company.

Introduction to Homeland Defense and Defense Support of Civil Authorities (DSCA) - The U.S. Military s Role to Support and... Introduction to Homeland Defense and Defense Support of Civil Authorities (DSCA) - The U.S. Military s Role to Support and Defend (Hardcover)
Bert B. Tussing, Robert McCreight
R3,200 Discovery Miles 32 000 Ships in 12 - 17 working days

The application of our Armed Forces within the states and territories of the United States is far from intuitive. The challenges of defending the country against assaults within the homeland are much more complex than engaging our enemies on foreign soil. Likewise, the introduction of the military's appreciable capabilities in response to disasters, be they natural or manmade, comes with authorities and restrictions reflective of an American ethos that will always hold those forces as the servants of the people, never their overseers. Introduction to Homeland Defense and Defense Support of Civil Authorities (DSCA): The U.S. Military's Role to Support and Defend examines the requirements and regulations that guide the utilization of our forces in the domestic environment. Topics include: The importance of the distinctions between homeland security, homeland defense, and Defense Support of Civil Authorities as they pertain to both authorities and responsibilities The deliberately subservient position of the military to civil authorities when engaged in response and recovery operations following a disaster The unique relationship between the United States Navy and the United States Coast Guard in a mutually supportive effort that bridges requirements between defense on the high seas and law enforcement in territorial waters The air defense mission over the United States, orchestrating manned aircraft, unmanned aircraft, and cruise missiles against threats of the same nature The exceptional challenges that would be associated with the application of land forces in a defense mission on American soil The development of the CBRN (Chemical, Biological, Radiological, Nuclear) Enterprise as a function of the nation's focus on preventing, responding to and recovering from a Weapons of Mass Destruction attack New challenges emerging in the domestic environment that will call for the application of military resources, to include the Arctic, complex catastrophes, and cybersecurity issues

Here and Now - The Politics of Social Space in D.H. Lawrence and Virginia Woolf (Paperback): Youngjoo Son Here and Now - The Politics of Social Space in D.H. Lawrence and Virginia Woolf (Paperback)
Youngjoo Son
R1,148 Discovery Miles 11 480 Ships in 12 - 17 working days

Working at the crossroads of contemporary geographical and cultural theory, the book explores how social spaces function as sites which foreground D. H. Lawrence and Virginia Woolf's critiques of the social order and longings for change. Looking at various social spaces from homes to nations to utopian space brought into the here and now the book shows the ways in which these writers criticize and deconstruct the contemporary symbolic, physical, and discursive spatial topoi of the dominant socio-spatial order and envision a more liberating and inclusive human geography. In addition, the book calls for the need to redress the tendency of some spatial theories to underestimate the political potential of literary discourse about space, instead of simply and mechanically appropriating some theoretical concepts to literary criticism. One of the central findings in the book, therefore, is that literary texts can perform subversive interventions in the production of social space through their critical interaction with dominant spatial codes.

Terrorism and the Olympics - Major Event Security and Lessons for the Future (Paperback): Anthony Richards, Pete Fussey, Andrew... Terrorism and the Olympics - Major Event Security and Lessons for the Future (Paperback)
Anthony Richards, Pete Fussey, Andrew Silke
R1,687 Discovery Miles 16 870 Ships in 12 - 17 working days

The book aims to outline the progress, problems and challenges of delivering a safe and secure Olympics in the context of the contemporary serious and enduring terrorist threat. The enormous media profile and symbolic significance of the Olympic Games, the history of terrorists aiming to use such high-profile events to advance their cause, and Al Qaeda's aim to cause mass casualties, all have major implications for the security of London 2012. Drawing on contributions from leading academics and practitioners in the field the book will assess the current terrorist threat, particularly focusing on terrorist targeting and how the Olympics might feature in this, before addressing particular response themes such as transport security, the role of surveillance, resilient designing of Olympic sites, the role of private security, and the challenge of inter-agency coordination. The book will conclude by providing an assessment of the legacy of Olympic security to date and will discuss the anticipated issues and dilemmas of the future. This book will be of interest to students of terrorism studies, security studies, counter-terrorism and sports studies.

Bounty Hunters, Marshals, and Sheriffs - Forward to the Past (Hardcover, New): Jacqueline Pope Bounty Hunters, Marshals, and Sheriffs - Forward to the Past (Hardcover, New)
Jacqueline Pope
R2,254 Discovery Miles 22 540 Ships in 10 - 15 working days

Sheriffs, marshals, and bounty hunters are remembered as relics of our Wild West past. Pope looks at these agents of the law who operate outside police departments, particularly their roles in urban areas. She examines reasons for becoming a sheriff, marshal (usually appointed and not elected), or bounty hunter, as well as employment requirements, responsibilities, and relationships with local police and city officials. Pope argues ultimately that these law enforcers, to a much greater degree than the police, threaten low-income people. Urban sheriffs do not make arrests, but rather serve summonses, track down scofflaws, and confiscate property. Marshals carry out evictions. Bounty hunters are usually armed and work often in urban areas, hunting down wanted persons for a variety of crimes. Although they are not policemen, they are authorized to capture people and can do so without the restrictions imposed on traditional law enforcement officers. Pope focuses her attention on sheriffs, marshals, and bounty hunters in Arizona, New Jersey, New Mexico and New York. She examines their activities in the nineteenth century and today, providing interviews with sheriffs, marshals, bounty hunters, policemen, and with people who have been pursued by them. A work of interest to students, researchers, and citizens concerned with the workings of the U.S. criminal justice system.

Terrorism and the Olympics - Major Event Security and Lessons for the Future (Hardcover): Anthony Richards, Pete Fussey, Andrew... Terrorism and the Olympics - Major Event Security and Lessons for the Future (Hardcover)
Anthony Richards, Pete Fussey, Andrew Silke
R4,377 Discovery Miles 43 770 Ships in 12 - 17 working days

The book aims to outline the progress, problems and challenges of delivering a safe and secure Olympics in the context of the contemporary serious and enduring terrorist threat. The enormous media profile and symbolic significance of the Olympic Games, the history of terrorists aiming to use such high-profile events to advance their cause, and Al Qaeda's aim to cause mass casualties, all have major implications for the security of London 2012. Drawing on contributions from leading academics and practitioners in the field the book will assess the current terrorist threat, particularly focusing on terrorist targeting and how the Olympics might feature in this, before addressing particular response themes such as transport security, the role of surveillance, resilient designing of Olympic sites, the role of private security, and the challenge of inter-agency coordination. The book will conclude by providing an assessment of the legacy of Olympic security to date and will discuss the anticipated issues and dilemmas of the future. This book will be of interest to students of terrorism studies, security studies, counter-terrorism and sports studies.

Biosurveillance - Methods and Case Studies (Hardcover): Taha Kass-Hout, Xiaohui Zhang Biosurveillance - Methods and Case Studies (Hardcover)
Taha Kass-Hout, Xiaohui Zhang
R4,392 Discovery Miles 43 920 Ships in 12 - 17 working days

As evidenced by the anthrax attacks in 2001, the SARS outbreak in 2003, and the H1N1 influenza pandemic in 2009, a pathogen does not recognize geographic or national boundaries, often leading to devastating consequences. Automated biosurveillance systems have emerged as key solutions for mitigating current and future health- related events. Focusing on this promising public health innovation, Biosurveillance: Methods and Case Studies discusses how these systems churn through vast amounts of health-related data to support epidemiologists and public health officials in the early identification, situation awareness, and response management of natural and man-made health-related events. The book follows a natural sequence from theory to application. The initial chapters build a foundation while subsequent chapters present more applied case studies from around the world, including China, the United States, Denmark, and the Asia-Pacific region. The contributors share candid, first-hand insights on lessons learned and unresolved issues that will help chart the future of biosurveillance. As this book illustrates, biosurveillance operates in a complex, multidimensional problem space that incorporates varied data. Capturing the progress of modern-day pioneers who are walking in John Snow's footsteps, this volume shows how contemporary information technology can be applied to the age-old challenge of combating the spread of disease and illness.

The Cambridge Handbook of Race and Surveillance (Hardcover): Michael Kwet The Cambridge Handbook of Race and Surveillance (Hardcover)
Michael Kwet
R4,046 R3,693 Discovery Miles 36 930 Save R353 (9%) Ships in 12 - 17 working days

Featuring chapters authored by leading scholars in the fields of criminology, critical race studies, history, and more, The Cambridge Handbook of Race and Surveillance cuts across history and geography to provide a detailed examination of how race and surveillance intersect throughout space and time. The volume reviews surveillance technology from the days of colonial conquest to the digital era, focusing on countries such as the United States, Canada, the UK, South Africa, the Philippines, India, Brazil, and Palestine. Weaving together narratives on how technology and surveillance have developed over time to reinforce racial discrimination, the book delves into the often-overlooked origins of racial surveillance, from skin branding, cranial measurements, and fingerprinting to contemporary manifestations in big data, commercial surveillance, and predictive policing. Lucid, accessible, and expertly researched, this handbook provides a crucial investigation of issues spanning history and at the forefront of contemporary life.

El Misterioso Candor de Los Trenes (Spanish, Hardcover): Jose Alemany El Misterioso Candor de Los Trenes (Spanish, Hardcover)
Jose Alemany
R850 Discovery Miles 8 500 Ships in 12 - 17 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Security Supervision and Management…
Ifpo Paperback R1,562 Discovery Miles 15 620
Machine See, Machine Do - How Technology…
Patrick K Lin Hardcover R761 R652 Discovery Miles 6 520
Investigations 150 Things You Should…
Lawrence Fennelly, Louis Tyska Paperback R1,087 Discovery Miles 10 870
Emergency Notification
Robert C. Chandler Hardcover R1,683 Discovery Miles 16 830
Public Safety and Security…
P J. Ortmeier Paperback R1,472 Discovery Miles 14 720
Fighting Fraud - How to Establish and…
Gerald L. Kovacich Paperback R1,155 Discovery Miles 11 550
Tell Me Everything - The Story of a…
Erika Krouse Paperback R518 R452 Discovery Miles 4 520
European Security Law
Martin Trybus, Nigel White Hardcover R2,651 Discovery Miles 26 510
Multllinguallsm, the Judicial Authority…
Kas Deprez, Theo du Plessis, … Paperback R590 R546 Discovery Miles 5 460
Censorship, Surveillance, and Privacy…
Information Reso Management Association Hardcover R9,935 Discovery Miles 99 350

 

Partners