0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (40)
  • R500+ (418)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Seen But Not Heard - Placing Children and Youth on the Security Governance Agenda (Paperback): Nosworthy David Seen But Not Heard - Placing Children and Youth on the Security Governance Agenda (Paperback)
Nosworthy David
R949 Discovery Miles 9 490 Ships in 12 - 17 working days

For all those who read the pages of this important study, they will undoubtedly appreciate the important responsibility the security sector has towards children. It will enable them to think through how child protection strategies can become an integral part of efforts to create a more secure and better world. What is particularly impressive is that the reflection and arguments presented here bring together and combine a common vision of the priorities that influence the security sector and civil society, and this fact alone is full of promise for it envisages investments in children today that will benefit the young people who will become the leaders of tomorrow. The book offers an excellent opportunity to broaden the debate on conflict and children away from just child soldiers, but to focus also on young people in general and the active contribution that they have to make to peacebuilding and social development. From a security governance perspective there is a clear responsibility on the part of multiple actors at multiple layers to formulate the collaborative approaches required to provide a secure environment for all children everywhere.

Intelligence on the Frontier Between State and Civil Society (Hardcover): Karen Lund Petersen, Kira Ronn Intelligence on the Frontier Between State and Civil Society (Hardcover)
Karen Lund Petersen, Kira Ronn
R4,133 Discovery Miles 41 330 Ships in 12 - 17 working days

Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security.

A Comprehensive Look at Fraud Identification and Prevention (Hardcover): James R. Youngblood A Comprehensive Look at Fraud Identification and Prevention (Hardcover)
James R. Youngblood
R3,263 Discovery Miles 32 630 Ships in 12 - 17 working days

Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention. The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include: Employee theft and fraud Organizational fraud Identity theft and fraud Fraud against the elderly Internet, computer, and e-mail fraud Ponzi and pyramid schemes The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers. Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.

New Dark Age - Technology and the End of the Future (Paperback): James Bridle New Dark Age - Technology and the End of the Future (Paperback)
James Bridle 1
R331 R259 Discovery Miles 2 590 Save R72 (22%) Ships in 10 - 15 working days

We live in times of increasing inscrutability. Our news feeds are filled with unverified, unverifiable speculation, much of it automatically generated by anonymous software. As a result, we no longer understand what is happening around us. Underlying all of these trends is a single idea: the belief that quantitative data can provide a coherent model of the world, and the efficacy of computable information to provide us with ways of acting within it. Yet the sheer volume of information available to us today reveals less than we hope. Rather, it heralds a new Dark Age: a world of ever-increasing incomprehension. In his brilliant new work, leading artist and writer James Bridle offers us a warning against the future in which the contemporary promise of a new technologically assisted Enlightenment may just deliver its opposite: an age of complex uncertainty, predictive algorithms, surveillance, and the hollowing out of empathy. Surveying the history of art, technology and information systems he reveals the dark clouds that gather over discussions of the digital sublime.

Cultural Property Security - Protecting Museums, Historic Sites, Archives, and Libraries (Hardcover): Daniel J Benny Cultural Property Security - Protecting Museums, Historic Sites, Archives, and Libraries (Hardcover)
Daniel J Benny
R4,144 Discovery Miles 41 440 Ships in 12 - 17 working days

The protection and security of cultural properties is of primary concern to the thousands of federal, state, county, city, and private institutions entrusted with housing and displaying our national heritage and history of our society. Cultural property security is of global importance as well, with tens of thousands of institutions internationally tasked with protecting and maintaining relics and artifacts of social, cultural, and historical significance. Cultural Property Security offers powerful protection guidelines to security departments tasked with safeguarding popular historical sites, museums, and libraries and the historical artifacts they house. Presenting practical, ready-to-implement solutions in a clear writing style, the book: Provides a working definition of cultural properties Identifies the threats against cultural properties from crime and terrorism, particularly in regions with political or civil unrest Offers guidance in threat assessment Identifies the physical security measures and technology that can be used to protect such institutions Presents guidelines for establishing a protective service department for cultural properties Describes proper arrest and post-arrest protocols Includes a list of online resources for further information related to the protection of cultural properties Complete with dozens of photos, the book establishes leading industry best practices to identify the various threats to cultural properties and protect them. Dr. Daniel J. Benny has more than 35 years of security management experience and has served as a Director of Protective Services for the state of Pennsylvania's Historic and Museum Commission. His insight is invaluable to those responsible for securing these institutions from internal and external threats.

Crime Prevention - Approaches, Practices, and Evaluations (Paperback, 11th edition): Steven P Lab Crime Prevention - Approaches, Practices, and Evaluations (Paperback, 11th edition)
Steven P Lab
R2,094 Discovery Miles 20 940 Ships in 12 - 17 working days

Clear, comprehensive approach to crime prevention introduces undergraduates to the breadth of this field, showing students how to assess tactics and their impact in reducing crime or fear of victimization The market leader in a course taught in Criminal Justice, Criminology, and Sociology programs world-wide Foundational principles of crime prevention with global examples plus a curated collection of online resources for instructors and students makes this book the best choice for Crime Prevention and Crime Control courses

Boko Haram - Security Considerations and the Rise of an Insurgency (Hardcover): Ona Ekhomu Boko Haram - Security Considerations and the Rise of an Insurgency (Hardcover)
Ona Ekhomu
R3,550 Discovery Miles 35 500 Ships in 12 - 17 working days

Boko Haram analyzes the activities and atrocities of Nigeria's Jihadi terrorist group, Boko Haram, in the context of global religious fundamentalism and extremism. The book traces the early beginnings of the religious sect, the conversion of its leader to radical Islam in 2002, and the group's campaign of violence beginning in 2009 and continuing to the present. The group's attacks against a variety of targets are examined in detail as are their general tactics and strategies. The Nigerian government response is also examined in order to provide critical lessons to counterterrorism planners, policy and government officials, and scholars. The initial military response was hampered by capability and legislative constraints including a lack of arms and ammunition, a lack of modern counterterrorism equipment, training gaps, leadership issues, intelligence gaps, politicization of the conflict, and limited support to the Nigerian military by the international community. Boko Haram looks at the work that has been done thus far, and what work needs to continue, to make gains to combat, marginalize, and ultimately defeat Boko Haram and resolve the conflict facing Nigeria. Key features: Outlines the history of Boko Haram and its emergence in Nigeria Provides the latest developments on fundamentalism in Nigeria, the growth of Boko Haram and the government response Focuses on the attacks, attack methodology and targeting of Boko Haram, addressing best-practice countermeasures Examines Boko Haram's ties to other Islamist groups including ISIL/ISIS and others Details the importance for international cooperation in responding to Boko Haram's activities and threats. About the Author: Dr. Ona Ekhomu, CFE, CPP, CSP, PCI, CPOI was born in Irrua, Nigeria. He holds the PhD from University of Pittsburgh. A policy analyst and security expert, Ekhomu is Chairman Trans-World Security Systems Ltd. and Chairman School of Management and Security (Lagos, Nigeria). President of Trans-World Security Systems Inc. of Chicago, Illinois, USA, Ekhomu is also a lecturer in the Sociology Department of the University of Lagos, Nigeria. He is President of the Association of Industrial Security and Safety Operators of Nigeria; Africa Representative of the International Foundation for Protection Officers; and former Regional Vice-President (West and Central Africa) of ASIS International. Ekhomu is author of Kidnap: Face to Face with Death (2014) and Effective Personal & Corporate Security (2009).

The Complete Guide for CPP Examination Preparation (Hardcover, 2nd edition): Anthony V. DiSalvatore (CPP, PSP & PCI) The Complete Guide for CPP Examination Preparation (Hardcover, 2nd edition)
Anthony V. DiSalvatore (CPP, PSP & PCI)
R3,880 Discovery Miles 38 800 Ships in 12 - 17 working days

Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.

The Privatization of Israeli Security (Hardcover): Shir Hever The Privatization of Israeli Security (Hardcover)
Shir Hever
R2,233 R2,092 Discovery Miles 20 920 Save R141 (6%) Ships in 12 - 17 working days

Between 1994-2014, Israel's security service was transformed, becoming one of the most extreme examples of privatised security in the world. This book is an investigation into this period and the conditions that created 'Occupation Inc.': the institution of a private military-security-industrial complex. State sponsored violence is increasing as a result of this securitisation, but why is it necessary, and what are its implications? In this book, Shir Hever considers the impact of the ongoing Palestinian resistance to Israeli occupation, the influence of U.S. military aid and the rise of neoliberalism in Israel, to make sense of this dramatic change in security policy. Through the lens of political economy, this book shows how the Israeli security elites turn violence into a commodity in order to preserve their status and wealth, providing a fresh new perspective on the Israeli occupation.

Surveillance and Space (Paperback): Francisco Klauser Surveillance and Space (Paperback)
Francisco Klauser
R955 Discovery Miles 9 550 Ships in 12 - 17 working days

The digital age is also a surveillance age. Today, computerized systems protect and manage our everyday life; the increasing number of surveillance cameras in public places, the computerized loyalty systems of the retail sector, geo-localized smart-phone applications, or smart traffic and navigation systems. Surveillance is nothing fundamentally new, and yet more and more questions are being asked: Who monitors whom, and how and why? How do surveillance techniques affect socio-spatial practices and relationships? How do they shape the fabrics of our cities, our mobilities, the spaces of the everyday? And what are the implications in terms of border control and the exercise of political power? Surveillance and Space responds to these modern questions by exploring the complex and varied interactions between surveillance and space. In doing so, the book also advances a programmatic reflection on the very possibility of a 'political geography of surveillance'.

The Grey Men - Pursuing the Stasi into the Present (Paperback): Ralph Hope The Grey Men - Pursuing the Stasi into the Present (Paperback)
Ralph Hope
R295 Discovery Miles 2 950 Ships in 12 - 17 working days

'Fascinating and powerful.' Sunday Times What do you do with a hundred thousand idle spies? By 1990 the Berlin Wall had fallen and the East German state security service folded. For forty years, they had amassed more than a billion pages in manila files detailing the lives of their citizens. Almost a hundred thousand Stasi employees, many of them experienced officers with access to highly personal information, found themselves unemployed overnight. This is the story of what they did next. Former FBI agent Ralph Hope uses present-day sources and access to Stasi records to track and expose ex-officers working everywhere from the Russian energy sector to the police and even the government department tasked with prosecuting Stasi crimes. He examines why the key players have never been called to account and, in doing so, asks if we have really learned from the past at all. He highlights a man who continued to fight the Stasi for thirty years after the Wall fell, and reveals a truth that many today don't want spoken. The Grey Men comes as an urgent warning from the past at a time when governments the world over are building an unprecedented network of surveillance over their citizens. Ultimately, this is a book about the present.

Silent Weapons for Quiet Wars - An Introductory Programming Manual (Hardcover): Anonymous Silent Weapons for Quiet Wars - An Introductory Programming Manual (Hardcover)
Anonymous
R694 R567 Discovery Miles 5 670 Save R127 (18%) Ships in 10 - 15 working days
Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed): Amy Zegart Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed)
Amy Zegart
R751 Discovery Miles 7 510 Ships in 12 - 17 working days

In this provocative and thoughtful book, Amy Zegart challenges the conventional belief that national security agencies work reasonably well to serve the national interest as they were designed to do. Using a new institutionalist approach, Zegart asks what forces shaped the initial design of the Central Intelligence Agency, the Joint Chiefs of Staff, and the National Security Council in ways that meant they were handicapped from birth.
Ironically, she finds that much of the blame can be ascribed to cherished features of American democracy--frequent elections, the separation of powers, majority rule, political compromise--all of which constrain presidential power and give Congress little incentive to create an effective foreign policy system. At the same time, bureaucrats in rival departments had the expertise, the staying power, and the incentives to sabotage the creation of effective competitors, and this is exactly what they did.
Historical evidence suggests that most political players did not consider broad national concerns when they forged the CIA, JCS, and NSC in the late 1940s. Although President Truman aimed to establish a functional foreign policy system, he was stymied by self-interested bureaucrats, legislators, and military leaders. The NSC was established by accident, as a byproduct of political compromise; Navy opposition crippled the JCS from the outset; and the CIA emerged without the statutory authority to fulfill its assigned role thanks to the Navy, War, State, and Justice departments, which fought to protect their own intelligence apparatus.
Not surprisingly, the new security agencies performed poorly as they struggled to overcome their crippled evolution. Only the NSC overcame its initial handicaps as several presidents exploited loopholes in the National Security Act of 1947 to reinvent the NSC staff. The JCS, by contrast, remained mired in its ineffective design for nearly forty years--i.e., throughout the Cold War--and the CIA's pivotal analysis branch has never recovered from its origins. In sum, the author paints an astonishing picture: the agencies Americans count on most to protect them from enemies abroad are, by design, largely incapable of doing so.

Security Surveillance Centers - Design, Implementation, and Operation (Hardcover): Anthony V. DiSalvatore Security Surveillance Centers - Design, Implementation, and Operation (Hardcover)
Anthony V. DiSalvatore
R3,986 Discovery Miles 39 860 Ships in 12 - 17 working days

Unlike current books on the market that focus primarily on the technical aspects of surveillance and protection, Security Surveillance Centers: Design, Implementation, and Operation focuses on the operation of a security surveillance center. This text explains in detail the role of security surveillance, as well as the critical aspects of the design, implementation, and operation of security surveillance centers of all sizes. Step-by-step coverage of policy and procedures, as well as the inclusion of industry-specific operational forms, guarantee a practical, user-friendly text for all levels of readers. Intended for any individuals or organizations currently employing security surveillance systems, this book is an asset for all users, from trainees to supervisors, seeking to create a more secure environment for themselves and for others.

Casino Security and Gaming Surveillance (Hardcover): Derk J. Boss, Alan W. Zajic Casino Security and Gaming Surveillance (Hardcover)
Derk J. Boss, Alan W. Zajic
R4,159 Discovery Miles 41 590 Ships in 12 - 17 working days

Almost all incidences of cheating, theft, fraud, or loss can be detected through the surveillance of critical transactions, audit observations, and reviews of key metrics. Providing proven-techniques for detecting and mitigating the ever-evolving threats to casino security, this book covers the core skills, knowledge, and techniques needed to protect casino assets, guests, and employees.

Drawing on the authors? six decades of combined experience in the industry, Casino Security and Gaming Surveillance identifies the most common threats to casino security and provides specific solutions for addressing these threats. From physical security and security management to table and gaming surveillance, it details numerous best practice techniques, strategies, and tactics, in addition to the metrics required to effectively monitor operations.

The authors highlight valuable investigation tools, including interview techniques and evidence gathering. They also cover IOU patrol, tri-shot coverage, surveillance audits, threat analysis, card counting, game protection techniques, players? club theft and fraud, surveillance standard operating procedures, nightclub and bar security, as well as surveillance training.

Complete with a glossary of gaming terms and a resource-rich appendix that includes helpful forms, this book covers everything surveillance and security professionals need to know to avoid high-profile incidents, costly compliance violations and damage to property and revenue.

It's professionals like Al and Derk who personify the professionalism that is crucial when establishing and operating modern casino security and surveillance departments. This book will quickly become the Bible for any security and surveillance officer.
?Roger Gros, Publisher, Global Gaming Business Magazine

Effective Physical Security (Paperback, 4th edition): Lawrence Fennelly Effective Physical Security (Paperback, 4th edition)
Lawrence Fennelly
R1,372 Discovery Miles 13 720 Ships in 12 - 17 working days

"Effective Physical Security, " Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors work that set the standard: "Handbook of Loss Prevention and Crime Prevention, " Fifth Edition.

Designed for easy reference, "Effective Physical Security" contains important coverage of environmental design, security surveys, locks, lighting, and CCTV as well as new chapters covering the latest in the ISO standards for Risk Assessmentand Risk Management, physical security planning, network systems infrastructure, and environmental design. This new edition continues to serve as a valuable reference for experienced security practitioners as well as students in undergraduate and graduate security programs.
Required reading for the ASIS Physical Security Professional Certification (PSP) and recommended reading for the CPP certification Provides detailed coverage of Physical Security in an easily accessible reference format with content divided into three major parts: Design, Equipment, and Operations Each chapter is written by a recognized expert security specialist "

Private Security and the Law (Hardcover, 4th edition): Charles Nemeth Private Security and the Law (Hardcover, 4th edition)
Charles Nemeth
R1,595 R1,504 Discovery Miles 15 040 Save R91 (6%) Ships in 12 - 17 working days

"Private Security and the Law, 4th Edition," is a unique resource that provides analysis of practices in the security industry as they relate to law, regulation, licensure, and constitutional questions of case and statutory authority.This bookdescribes the legal requirements facedin the area of private security.It emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency.The textalso examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that will set pace for future private security laws and regulations. As private security becomes more closely involved in national and international security, cases like Blackwater are examined. Charles Nemeth takesyou step by step through the analysis of case law as it applies to situations commonly faced in the private security practice, providing a solid introduction to the legal and ethical standards that shape the industry.

*Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"

Contemporary Security Management (Hardcover, 3rd edition): John Fay Contemporary Security Management (Hardcover, 3rd edition)
John Fay
R1,544 Discovery Miles 15 440 Ships in 12 - 17 working days

"Contemporary Security Management, 3rd Edition "teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management.
Comprehensive introduction to security and IT security management principlesDiscussion of both public and private sector roles, as well as the increasingly common privatizing of government functionsNew experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter

Data Borders - How Silicon Valley Is Building an Industry around Immigrants (Paperback): Melissa Villa-Nicholas Data Borders - How Silicon Valley Is Building an Industry around Immigrants (Paperback)
Melissa Villa-Nicholas
R651 Discovery Miles 6 510 Ships in 12 - 17 working days

Data Borders investigates entrenched and emerging borderland technology that ensnares all people in an intimate web of surveillance where data resides and defines citizenship. Detailing the new trend of biologically mapping undocumented people through biotechnologies, Melissa Villa-Nicholas shows how surreptitious monitoring of Latinx immigrants is the focus of and driving force behind Silicon Valley's growing industry within defense technology manufacturing. Villa-Nicholas reveals a murky network that gathers data on marginalized communities for purposes of exploitation and control that implicates law enforcement, border patrol, and ICE, but that also pulls in public workers and the general public, often without their knowledge or consent. Enriched by interviews of Latinx immigrants living in the borderlands who describe their daily use of technology and their caution around surveillance, this book argues that in order to move beyond a heavily surveilled state that dehumanizes both immigrants and citizens, we must first understand how our data is being collected, aggregated, correlated, and weaponized with artificial intelligence and then push for immigrant and citizen information privacy rights along the border and throughout the United States.

Local Ownership and Security Sector Reform (Paperback, Aufl ed.): Timothy Donais Local Ownership and Security Sector Reform (Paperback, Aufl ed.)
Timothy Donais
R899 Discovery Miles 8 990 Ships in 12 - 17 working days

The notion of "local ownership" has emerged in recent years as part of the contemporary common sense of security sector reform (SSR). While the argument that externally driven reform processes are unsustainable is now widely accepted, the principle of local ownership has proven difficult to both define and operate. With contributions by leading practitioners, "Local Ownership and Security Sector Reform" subjects the broader issue of local ownership to critical scrutiny, furthers the debate on what local ownership is and why it matters, and explores how ownership issues have played out in the context of specific SSR case studies.

The Political Economy of Defence (Paperback): Ron Matthews The Political Economy of Defence (Paperback)
Ron Matthews
R1,194 Discovery Miles 11 940 Ships in 12 - 17 working days

Defence is the ultimate public good, and it thus falls to government to determine the appropriate amount of public revenue to commit to the defence of the realm. This will depend on history, strategic threat, international security obligations, entreaties from allies and, of course, the threat faced. The Political Economy of Defence is structured to identify, explain and analyse the policy, process and problems that government faces from the starting point of national security through to the ultimate objective of securing a peaceful world. Accordingly, it provides insights into how defence budgets are determined and managed, offering relevant and refreshingly practical policy perspectives on defence finance, defence and development trade-offs, sovereignty vs globalisation debates, and many other pertinent issues. It will appeal to policymakers, analysts, graduate students and academics interested in defence economics, political economy, public economics and public policy.

States of Emergency - Keeping the Global Population in Check (Paperback): Kees van der Pijl States of Emergency - Keeping the Global Population in Check (Paperback)
Kees van der Pijl
R730 Discovery Miles 7 300 Ships in 12 - 17 working days
Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Hardcover): Douglas J Landoll Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Hardcover)
Douglas J Landoll
R3,841 Discovery Miles 38 410 Ships in 12 - 17 working days

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.

International Relations Theory and the Consequences of Unipolarity (Paperback, New): G.John Ikenberry, Michael Mastanduno,... International Relations Theory and the Consequences of Unipolarity (Paperback, New)
G.John Ikenberry, Michael Mastanduno, William C. Wohlforth
R1,010 Discovery Miles 10 100 Ships in 12 - 17 working days

The end of the Cold War and subsequent dissolution of the Soviet Union resulted in a new unipolar international system that presented fresh challenges to international relations theory. Since the Enlightenment, scholars have speculated that patterns of cooperation and conflict might be systematically related to the manner in which power is distributed among states. Most of what we know about this relationship, however, is based on European experiences between the seventeenth and twentieth centuries, when five or more powerful states dominated international relations, and the latter twentieth century, when two superpowers did so. Building on a highly successful special issue of the leading journal World Politics, this book seeks to determine whether what we think we know about power and patterns of state behaviour applies to the current 'unipolar' setting and, if not, how core theoretical propositions about interstate interactions need to be revised.

Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition): Philip Walker Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition)
Philip Walker
R2,088 Discovery Miles 20 880 Ships in 12 - 17 working days

In the latest edition, Philip Walker not only tackles the electronic aspect of the design of a security system, but also examines the human factor in such systems. In his own words: 'Electronic aids are added to enable security officers to do their jobs better, but not to do their jobs for them'.
Today, with the escalation of crime and growing concerns for security, there has been a great increase in the number of electronic security systems. Unfortunately, despite improvements in reliability in terms of equipment manufacture, false alarms do still occur, and they waste a large amount of police time; approximately ninety out of one hundred alarms investigated by the police are false. In the light of this, the new edition of Electronic Security Systems couldn't come at a better time, as it deals extensively with methods of reducing false alarms, allowing the police to concentrate on real breeches of security, and thus ultimately to reduce crime.
The extensive and unusual combination of experience that Philip Walker has in the world of electronics, communications and as a security consulting engineer makes him eminently qualified to tackle such subjects.
At only 30, this hardback book is an essential addition to your security collection. It has 320 pages packed with advice and technical knowledge, 40 photographs and 25 line diagrams and a good index.

Comprehensive coverage of electronic security systems
Written by an experienced security professional
Fully updated to examine new equipment with extensive help on avoiding false alarms"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Security Hippie
Barak Engel Paperback R1,110 Discovery Miles 11 100
Next-Generation Enterprise Security and…
Mohiuddin Ahmed, Nour Moustafa, … Hardcover R2,535 Discovery Miles 25 350
Managing the Insider Threat - No Dark…
Nick Catrantzos Hardcover R3,800 Discovery Miles 38 000
Tell Me Everything - The Story of a…
Erika Krouse Paperback R545 R461 Discovery Miles 4 610
Computational Intelligence for…
Yassine Maleh, Mamoun Alazab, … Hardcover R3,083 Discovery Miles 30 830
Multllinguallsm, the Judicial Authority…
Kas Deprez, Theo du Plessis, … Paperback R590 R546 Discovery Miles 5 460
Managing A Network Vulnerability…
Thomas R. Peltier, Justin Peltier, … Paperback R2,499 Discovery Miles 24 990
Cognitive Risk
James Bone, Jessie H Lee Paperback R1,123 Discovery Miles 11 230
Family Tree Workbook - 30+ Step-By-Step…
Brian Sheffey Paperback R384 R328 Discovery Miles 3 280
PKI Implementation and Infrastructures
Julian Ashbourn Paperback R1,110 Discovery Miles 11 100

 

Partners