0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (38)
  • R500+ (359)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Energy Resilient Buildings & Communities: - A Practical Guide (Hardcover): Brian Levite, Alex Rakow Energy Resilient Buildings & Communities: - A Practical Guide (Hardcover)
Brian Levite, Alex Rakow
R2,946 Discovery Miles 29 460 Ships in 10 - 15 working days

This book is written as a practical guide to those interested in the pursuit of energy resilience at a local scale. Energy resilience is defined as the relative ability of an institution to carry out its mission during a shock to the energy system and approach the concept on the level of a single site occupied by a single community or institution. Examples are drawn from four key community types: military bases, healthcare campuses, educational campuses, and municipal governments. The book then describes a framework for developing an energy resilience plan that applies to each. While the focus is clearly on the United States, understanding the energy resilience threat and conducting long-range energy resilience planning will benefit communities all over the globe. Divided into three main parts, Part One describes the specific energy security threats that are facing local institutions and communities and how an energy shock can affect the mission at each of the four community types and the advantages that each will enjoy in their pursuit of energy resilience. Part Two provides concrete guidance for pursuing energy resilience at a particular institution and allows managers to assess where their institution lies on the energy resilience spectrum and plot a course toward where they would like to be. Part Three describes the three main areas of energy resilience performance: energy efficiency, on-site generation, and emergency planning. Case studies are also provided.

Introduction to Homeland Defense and Defense Support of Civil Authorities (DSCA) - The U.S. Military s Role to Support and... Introduction to Homeland Defense and Defense Support of Civil Authorities (DSCA) - The U.S. Military s Role to Support and Defend (Hardcover)
Bert B. Tussing, Robert McCreight
R3,515 Discovery Miles 35 150 Ships in 10 - 15 working days

The application of our Armed Forces within the states and territories of the United States is far from intuitive. The challenges of defending the country against assaults within the homeland are much more complex than engaging our enemies on foreign soil. Likewise, the introduction of the military's appreciable capabilities in response to disasters, be they natural or manmade, comes with authorities and restrictions reflective of an American ethos that will always hold those forces as the servants of the people, never their overseers. Introduction to Homeland Defense and Defense Support of Civil Authorities (DSCA): The U.S. Military's Role to Support and Defend examines the requirements and regulations that guide the utilization of our forces in the domestic environment. Topics include: The importance of the distinctions between homeland security, homeland defense, and Defense Support of Civil Authorities as they pertain to both authorities and responsibilities The deliberately subservient position of the military to civil authorities when engaged in response and recovery operations following a disaster The unique relationship between the United States Navy and the United States Coast Guard in a mutually supportive effort that bridges requirements between defense on the high seas and law enforcement in territorial waters The air defense mission over the United States, orchestrating manned aircraft, unmanned aircraft, and cruise missiles against threats of the same nature The exceptional challenges that would be associated with the application of land forces in a defense mission on American soil The development of the CBRN (Chemical, Biological, Radiological, Nuclear) Enterprise as a function of the nation's focus on preventing, responding to and recovering from a Weapons of Mass Destruction attack New challenges emerging in the domestic environment that will call for the application of military resources, to include the Arctic, complex catastrophes, and cybersecurity issues

Homeland Security and Private Sector Business - Corporations' Role in Critical Infrastructure Protection, Second Edition... Homeland Security and Private Sector Business - Corporations' Role in Critical Infrastructure Protection, Second Edition (Hardcover, 2nd edition)
Chi-Jen. Lee, Cheng-Hsiung Lu, Lucia H Lee
R4,493 Discovery Miles 44 930 Ships in 10 - 15 working days

Since 9/11, the U.S. government and the private sector have devised sophisticated ways of protecting people and assets. The threats have evolved, however, becoming more insidious. They no longer comprise just terrorists who target critical infrastructures. They also include insider threats, such as PFC Manning and NSA contractor Snowden who leaked classified defense information, active shooter incidents like the Sandy Hook Elementary School massacre, and the 2013 Boston Marathon terrorist bombing. These events make it imperative for the public and private sectors to engage in effective partnership to protect people, facilities, and national infrastructure assets. Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection, Second Edition identifies the role the private sector plays in securing our homeland and offers strategies to aid in the fight against national and international threats. Addressing mandates and legislation introduced since the first edition, this new edition includes: Updates to the NIPP (National Infrastructure Protection Plan) New case studies of both proper security policies and procedures in practice versus costly security breaches Greater focus on smaller business and practical "immediate use" guidance New measures for assessing and addressing vulnerabilities and threats New appendices with sample plans and practical checklists Supplying tools that can easily be adapted and applied to every business situation at all budget levels, the book helps businesses counter the total threat, from traditional terrorists to inside betrayers-providing a clear blueprint for securing people and assets.

Here and Now - The Politics of Social Space in D.H. Lawrence and Virginia Woolf (Paperback): Youngjoo Son Here and Now - The Politics of Social Space in D.H. Lawrence and Virginia Woolf (Paperback)
Youngjoo Son
R1,180 Discovery Miles 11 800 Ships in 10 - 15 working days

Working at the crossroads of contemporary geographical and cultural theory, the book explores how social spaces function as sites which foreground D. H. Lawrence and Virginia Woolf's critiques of the social order and longings for change. Looking at various social spaces from homes to nations to utopian space brought into the here and now the book shows the ways in which these writers criticize and deconstruct the contemporary symbolic, physical, and discursive spatial topoi of the dominant socio-spatial order and envision a more liberating and inclusive human geography. In addition, the book calls for the need to redress the tendency of some spatial theories to underestimate the political potential of literary discourse about space, instead of simply and mechanically appropriating some theoretical concepts to literary criticism. One of the central findings in the book, therefore, is that literary texts can perform subversive interventions in the production of social space through their critical interaction with dominant spatial codes.

Workplace Violence and the Facility Manager (Hardcover): Joseph F Gustin Workplace Violence and the Facility Manager (Hardcover)
Joseph F Gustin
R2,660 Discovery Miles 26 600 Ships in 10 - 15 working days

This book contains practical, comprehensive, and effective guidance and advice on the issue of workplace violence. It is written in plain language and in a non-theoretical, reader-friendly format for quick and easy reference. Topics include the risk factors that contribute to workplace violence, as well as the effects of violence. The book discusses procedures for assessing threat as well as strategies for preventing violence and handling the consequences when necessary. It also examines situations such as domestic violence and the workplace and racial and sexual harassment and explains the new OSHA directive on investigation workplace violence.

Disaster and Recovery Planning - A Guide for Facility Managers, Sixth Edition (Hardcover, 6th edition): Joseph F Gustin Disaster and Recovery Planning - A Guide for Facility Managers, Sixth Edition (Hardcover, 6th edition)
Joseph F Gustin
R3,530 Discovery Miles 35 300 Ships in 10 - 15 working days

This new edition of a bestseller book addresses the complexities of disaster preparedness and business continuity. Updated with the latest statistics, the new edition includes an overview of natural disasters, coverage of computer and data protection expanded to include cyber-attacks on the private sector, and information on managing data privacy. It also includes the latest information on dirty bombs, chemical and biological agents and weapons, disaster planning and recovery issues, regulatory influences and emergency preparedness. This reference highlights the importance of prevention as well as controlling the effects of a disaster on a company's operations.

Reset - Reclaiming the Internet for Civil Society (Paperback): Ronald J Deibert Reset - Reclaiming the Internet for Civil Society (Paperback)
Ronald J Deibert
R382 Discovery Miles 3 820 Ships in 18 - 22 working days

In the 2020 CBC Massey Lectures, bestselling author and renowned technology and security expert Ronald J. Deibert exposes the disturbing influence and impact of the internet on politics, the economy, the environment, and humanity. Digital technologies have given rise to a new machine-based civilization that is increasingly linked to a growing number of social and political maladies. Accountability is weak and insecurity is endemic, creating disturbing opportunities for exploitation. Drawing from the cutting-edge research of the Citizen Lab, the world-renowned digital security research group which he founded and directs, Ronald J. Deibert exposes the impacts of this communications ecosystem on civil society. He tracks a mostly unregulated surveillance industry, innovations in technologies of remote control, superpower policing practices, dark PR firms, and highly profitable hack-for-hire services feeding off rivers of poorly secured personal data. Deibert also unearths how dependence on social media and its expanding universe of consumer electronics creates immense pressure on the natural environment. In order to combat authoritarian practices, environmental degradation, and rampant electronic consumerism, he urges restraints on tech platforms and governments to reclaim the internet for civil society.

Strategic Security Management - A Risk Assessment Guide for Decision Makers, Second Edition (Hardcover, 2nd edition): Karim... Strategic Security Management - A Risk Assessment Guide for Decision Makers, Second Edition (Hardcover, 2nd edition)
Karim Vellani
R3,801 Discovery Miles 38 010 Ships in 10 - 15 working days

Strategic Security Management, Second Edition provides security leadership and decision-makers with a fresh perspective on threat, vulnerability, and risk assessment. The book offers a framework to look at applying security analysis and theory into practice for effective security program, implementation, management and evaluation. Chapters examine metric-based security resource allocation of countermeasures, including security procedures, utilization of personnel, and electronic measures. The new edition is fully updated to reflect the latest industry best-practices and includes contributions from security industry leaders-based on their years of professional experience-including Norman Bates, Robert Emery, Jack Follis, Steve Kaufer, Andrew Rubin, Michael Silva, and Ken Wheatley. Strategic Security Management, Second Edition will be a welcome addition to the security literature for all security professionals, security managers, and criminal justice students interested in understanding foundational security principles and their application.

Terrorism and the Olympics - Major Event Security and Lessons for the Future (Paperback): Anthony Richards, Pete Fussey, Andrew... Terrorism and the Olympics - Major Event Security and Lessons for the Future (Paperback)
Anthony Richards, Pete Fussey, Andrew Silke
R1,782 Discovery Miles 17 820 Ships in 10 - 15 working days

The book aims to outline the progress, problems and challenges of delivering a safe and secure Olympics in the context of the contemporary serious and enduring terrorist threat. The enormous media profile and symbolic significance of the Olympic Games, the history of terrorists aiming to use such high-profile events to advance their cause, and Al Qaeda's aim to cause mass casualties, all have major implications for the security of London 2012. Drawing on contributions from leading academics and practitioners in the field the book will assess the current terrorist threat, particularly focusing on terrorist targeting and how the Olympics might feature in this, before addressing particular response themes such as transport security, the role of surveillance, resilient designing of Olympic sites, the role of private security, and the challenge of inter-agency coordination. The book will conclude by providing an assessment of the legacy of Olympic security to date and will discuss the anticipated issues and dilemmas of the future. This book will be of interest to students of terrorism studies, security studies, counter-terrorism and sports studies.

Terrorism and the Olympics - Major Event Security and Lessons for the Future (Hardcover): Anthony Richards, Pete Fussey, Andrew... Terrorism and the Olympics - Major Event Security and Lessons for the Future (Hardcover)
Anthony Richards, Pete Fussey, Andrew Silke
R4,644 Discovery Miles 46 440 Ships in 10 - 15 working days

The book aims to outline the progress, problems and challenges of delivering a safe and secure Olympics in the context of the contemporary serious and enduring terrorist threat. The enormous media profile and symbolic significance of the Olympic Games, the history of terrorists aiming to use such high-profile events to advance their cause, and Al Qaeda's aim to cause mass casualties, all have major implications for the security of London 2012. Drawing on contributions from leading academics and practitioners in the field the book will assess the current terrorist threat, particularly focusing on terrorist targeting and how the Olympics might feature in this, before addressing particular response themes such as transport security, the role of surveillance, resilient designing of Olympic sites, the role of private security, and the challenge of inter-agency coordination. The book will conclude by providing an assessment of the legacy of Olympic security to date and will discuss the anticipated issues and dilemmas of the future. This book will be of interest to students of terrorism studies, security studies, counter-terrorism and sports studies.

Biosurveillance - Methods and Case Studies (Hardcover): Taha Kass-Hout, Xiaohui Zhang Biosurveillance - Methods and Case Studies (Hardcover)
Taha Kass-Hout, Xiaohui Zhang
R4,518 Discovery Miles 45 180 Ships in 10 - 15 working days

As evidenced by the anthrax attacks in 2001, the SARS outbreak in 2003, and the H1N1 influenza pandemic in 2009, a pathogen does not recognize geographic or national boundaries, often leading to devastating consequences. Automated biosurveillance systems have emerged as key solutions for mitigating current and future health- related events. Focusing on this promising public health innovation, Biosurveillance: Methods and Case Studies discusses how these systems churn through vast amounts of health-related data to support epidemiologists and public health officials in the early identification, situation awareness, and response management of natural and man-made health-related events. The book follows a natural sequence from theory to application. The initial chapters build a foundation while subsequent chapters present more applied case studies from around the world, including China, the United States, Denmark, and the Asia-Pacific region. The contributors share candid, first-hand insights on lessons learned and unresolved issues that will help chart the future of biosurveillance. As this book illustrates, biosurveillance operates in a complex, multidimensional problem space that incorporates varied data. Capturing the progress of modern-day pioneers who are walking in John Snow's footsteps, this volume shows how contemporary information technology can be applied to the age-old challenge of combating the spread of disease and illness.

Access Rules - Freeing Data from Big Tech for a Better Future (Hardcover): Viktor Mayer-Schoenberger, Thomas Ramge Access Rules - Freeing Data from Big Tech for a Better Future (Hardcover)
Viktor Mayer-Schoenberger, Thomas Ramge
R601 Discovery Miles 6 010 Ships in 9 - 17 working days

A powerful and urgent call to action: to improve our lives and our societies, we must demand open access to data for all. Information is power, and the time is now for digital liberation. Access Rules mounts a strong and hopeful argument for how informational tools at present in the hands of a few could instead become empowering machines for everyone. By forcing data-hoarding companies to open access to their data, we can reinvigorate both our economy and our society. Authors Viktor Mayer-Schoenberger and Thomas Ramge contend that if we disrupt monopoly power and create a level playing field, digital innovations can emerge to benefit us all. Over the past twenty years, Big Tech has managed to centralize the most relevant data on their servers, as data has become the most important raw material for innovation. However, dominant oligopolists like Facebook, Amazon, and Google, in contrast with their reputation as digital pioneers, are actually slowing down innovation and progress by withholding data for the benefit of their shareholders--at the expense of customers, the economy, and society. As Access Rules compellingly argues, ultimately it is up to us to force information giants, wherever they are located, to open their treasure troves of data to others. In order for us to limit global warming, contain a virus like COVID-19, or successfully fight poverty, everyone-including citizens and scientists, start-ups and established companies, as well as the public sector and NGOs-must have access to data. When everyone has access to the informational riches of the data age, the nature of digital power will change. Information technology will find its way back to its original purpose: empowering all of us to use information so we can thrive as individuals and as societies.

Snowden's Box - Trust in the Age of Surveillance (Hardcover): Jessica Bruder, Dale Maharidge Snowden's Box - Trust in the Age of Surveillance (Hardcover)
Jessica Bruder, Dale Maharidge
R295 R272 Discovery Miles 2 720 Save R23 (8%) Ships in 5 - 10 working days

One day in the spring of 2013, a box appeared outside a fourth-floor apartment door in Brooklyn, New York. The recipient, who didn't know the sender, only knew she was supposed to bring this box to a friend, who would ferry it to another friend. This was Edward Snowden's box-printouts of documents proving that the US government had built a massive surveillance apparatus and used it to spy on its own people-and the friend on the end of this chain was filmmaker Laura Poitras. Thus the biggest national security leak of the digital era was launched via a remarkably analog network, the US Postal Service. This is just one of the odd, ironic details that emerges from the story of how Jessica Bruder and Dale Maharidge, two experienced journalists but security novices (and the friends who received and ferried the box) got drawn into the Snowden story as behind-the-scenes players. Their initially stumbling, increasingly paranoid, and sometimes comic efforts to help bring Snowden's leaks to light, and ultimately, to understand their significance, unfold in an engrossing narrative that includes emails and diary entries from Poitras. This is an illuminating essay on the status of transparency, privacy, and trust in the age of surveillance.

The Elements of Private Investigation - An Introduction to the Law, Techniques, and Procedures (Hardcover): Anthony Manley The Elements of Private Investigation - An Introduction to the Law, Techniques, and Procedures (Hardcover)
Anthony Manley
R4,526 Discovery Miles 45 260 Ships in 10 - 15 working days

In today s increasingly litigious society, the threat of a private investigator (PI) being hit with a civil lawsuit or even criminal charges is very real. Keeping up with the multitude of laws that impact what investigators can and can t do can be daunting but could prove very costly if ignored.

Emphasizing legal and liability issues, The Elements of Private Investigation: An Introduction to the Law, Techniques, and Procedures provides a comprehensive introduction to the professional requirements, investigative techniques, and legal responsibilities of the modern investigator. It supplies private and corporate security professionals with best-practice investigative techniques, highlights the risks that investigators are likely to encounter, and details what PIs can and can t do in the eyes of the law. In addition, the book:

  • Details the restrictions placed on PIs as private citizens
  • Reviews the qualifications, licensing requirements, and code of ethics
  • Includes procedural checklists, sample forms, and a list of popular online resources

Providing quick and easy reference to the latest laws and regulations that affect the profession, the time-tested logic offered in this book will help ensure that the evidence you collect will be admissible in court and that the methods you use won t land you on the wrong side of a civil or criminal case.

The Threat on the Horizon - An Inside Account of America's Search for Security after the Cold War (Hardcover): Loch K.... The Threat on the Horizon - An Inside Account of America's Search for Security after the Cold War (Hardcover)
Loch K. Johnson
R1,159 Discovery Miles 11 590 Ships in 10 - 15 working days

The Aspin-Brown Commission of 1995-1996, led by former U.S. Defense Secretaries Les Aspin and Harold Brown, was a landmark inquiry into the activities of America's secret agencies. The purpose of the commission was to help the Central Intelligence Agency and other organizations in the U.S. intelligence community adapt to the quite different world that had emerged after the end of the Cold War in 1991.
In The Threat on the Horizon, eminent national security scholar Loch K. Johnson, who served as Aspin's assistant, offers a comprehensive insider's account of this inquiry. Based on a close sifting of government documents and media reports, interviews with participants, and, above all, his own eyewitness impressions, Johnson's thorough history offers a unique window onto why the terrorist attacks of 2001 caught the United States by surprise and why the intelligence community failed again in 2002 when it predicted that Iraq possessed weapons of mass destruction. It will be the first published account by an insider of a presidential commission on intelligence--a companion volume to Johnson's acclaimed study of the Church Committee investigation into intelligence in 1975 (A Season of Inquiry). This examination of the Aspin-Brown Commission is an invaluable source for anyone interested in the how the intelligence agencies of the world's most powerful nation struggled to confront new global threats that followed the collapse of the Soviet empire, and why Washington, D.C. was unprepared for the calamities that would soon arise.

Beyond Fear - Thinking Sensibly About Security in an Uncertain World (Hardcover, 1st ed. 2003. Corr. 2nd printing 2006): Bruce... Beyond Fear - Thinking Sensibly About Security in an Uncertain World (Hardcover, 1st ed. 2003. Corr. 2nd printing 2006)
Bruce Schneier
R1,117 R946 Discovery Miles 9 460 Save R171 (15%) Ships in 18 - 22 working days

Why must we design security systems that work and fail well? Why are national ID cards a technically unsound, even dangerous idea? Why is buying online safe? Why should we definitely NOT invest in biometrics- based scanners for airports? Surprising assessments and advice from a leading security expert.Schneier, the highly regarded author of "Applied Cryptography and Secrets and Lies", turns his iconoclastic mind on the broader issues of security, including the vast infrastructure we already have in place, and the vaster systems -- some useful, others useless or worse -- that we're being asked to submit to and pay for. Rather than heavy-handed proselytizing, Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions.

Magico-Religious Groups and Ritualistic Activities - A Guide for First Responders (Hardcover, New): Tony M Kail Magico-Religious Groups and Ritualistic Activities - A Guide for First Responders (Hardcover, New)
Tony M Kail
R4,489 Discovery Miles 44 890 Ships in 10 - 15 working days

A woman lays unconscious on the floor surrounded by charcoaled symbols, burning candles, a bowl of viscous red liquid, and an array of dried herbs. Was this a healing ritual gone wrong or just straightforward foul play? Increasingly, first responders must deal with foreign practices and cultures that are often disturbing in their unfamiliarity. Understanding cultural variations and nuances can make the difference between much-needed emergency treatment and the aggravation of an already sensitive situation.
The first book of its kind, Magico-Religious Groups and Ritualistic Activities: A Guide for First Responders provides a cultural bridge for emergency personnel when interacting with various magico-religious cultures. More than just a litany of artifacts, rituals, and symbols, this valuable book draws from cultural anthropology and religious studies to unearth hidden meanings and place the information in a context relevant for the first responder. It offers crucial keys for improving communication, assessment, and treatment in culturally sensitive situations.
Beginning with an introduction to the importance of trans-cultural communication, the book devotes subsequent chapters to the common and contrasting elements of several magico-religious groups. It considers the practices of Neo-Paganism, Santeria, Bantu religion (Palo Mayombe), Voodoo, and Curanderismo. The book separates fact from fantasy regarding sacred spaces and dates, ceremonies, group structure, sacred objects, cultural taboos, and beliefs about sickness and healing. It also includes a detailed review of the common herbs used in healing and ritual, as well as a glossary of cultural terms and an index ofsymbols.
Promoting functional cultural competency, this book gives public service agencies and emergency responders the tools to properly assess situations, open lines of communication, protect cultural diversity and beliefs and, above all, provide effective emergency treatment.

Security Manual (Paperback, 8th edition): David Brooksbank Security Manual (Paperback, 8th edition)
David Brooksbank
R1,499 Discovery Miles 14 990 Ships in 10 - 15 working days

Security Manual provides practical guidance on all aspects of security work and is a ready made source of information for all members of the security profession, including managers, supervisors and trainers. This eighth edition has been fully restructured to better reflect recent changes in the criminal law, fire protection and security practices. New chapters on powers of arrest, industrial disputes, conflict resolution, dealing with emergencies, cultural awareness and door supervising have been added, including the latest information and procedures that should be adopted in relation to an act of terrorism. The manual continues to pay attention to the law of theft, other criminal offences affecting security and the basics of security practice, and can rightly be regarded as the standard overall work on the subject and a practical reference for existing security practitioners and those who are aspiring to enter the security profession. Security Manual is also ideal for those seeking professional qualifications such as: NVQ Levels 1, 2 and 3 in Security Guarding and for Supervisors; NVQ Level 3 in Investigations; C&G, BIIAB and NCFE qualifications in Door Supervision. Security Manual is the essential guide to this subject, and has been described as 'standard issue for every security officer, along with the uniform'.

The Cambridge Handbook of Race and Surveillance (Hardcover): Michael Kwet The Cambridge Handbook of Race and Surveillance (Hardcover)
Michael Kwet
R4,162 R3,708 Discovery Miles 37 080 Save R454 (11%) Ships in 10 - 15 working days

Featuring chapters authored by leading scholars in the fields of criminology, critical race studies, history, and more, The Cambridge Handbook of Race and Surveillance cuts across history and geography to provide a detailed examination of how race and surveillance intersect throughout space and time. The volume reviews surveillance technology from the days of colonial conquest to the digital era, focusing on countries such as the United States, Canada, the UK, South Africa, the Philippines, India, Brazil, and Palestine. Weaving together narratives on how technology and surveillance have developed over time to reinforce racial discrimination, the book delves into the often-overlooked origins of racial surveillance, from skin branding, cranial measurements, and fingerprinting to contemporary manifestations in big data, commercial surveillance, and predictive policing. Lucid, accessible, and expertly researched, this handbook provides a crucial investigation of issues spanning history and at the forefront of contemporary life.

Bioterrorism - A Guide for Hospital Preparedness (Hardcover, New): Joseph R. Masci, M.D., Elizabeth Bass Bioterrorism - A Guide for Hospital Preparedness (Hardcover, New)
Joseph R. Masci, M.D., Elizabeth Bass
R5,777 Discovery Miles 57 770 Ships in 10 - 15 working days

In the battle against bioterrorism, one of the greatest challenges is finding the ideal balance between complacency and overreaction. The goal is to be so well prepared that we can prevent catastrophic outcomes in the event of a bioterrorist attack, while strengthening our ability to prevent and treat naturally-occurring infectious diseases. Bioterrorism: A Guide for Hospital Preparedness provides critical guidelines for health providers on effectively preparing for bioterrorism. The book presents information on all aspects of dealing with bioterrorism including the likeliest biological agents to be used, means of determining that an attack is taking place, diagnosis and management of specific diseases, and mechanisms of reporting to public health authorities. The text reviews cooperative planning for private practitioners, methods for protecting hospital and office staff and other patients in the event of an attack, approaches to handling the psychological effects of terrorism, special considerations concerning the care of children, and strategies for answering questions posed by the public and the media. It also includes data from national and regional exercises in assessing preparedness, with suggestions for implementing lessons learned from these exercises. With bioterrorism on the fine line between risk and reality, it is essential for health care providers to be properly equipped for every situation. This comprehensive guide features solid strategies for establishing and maintaining an attainable level of preparation in the ever-present risk of bioterrorism.

El Misterioso Candor de Los Trenes (Spanish, Hardcover): Jose Alemany El Misterioso Candor de Los Trenes (Spanish, Hardcover)
Jose Alemany
R875 Discovery Miles 8 750 Ships in 10 - 15 working days
Effective Physical Security (Paperback, 5th edition): Lawrence Fennelly Effective Physical Security (Paperback, 5th edition)
Lawrence Fennelly
R1,884 R1,720 Discovery Miles 17 200 Save R164 (9%) Ships in 10 - 15 working days

Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the author's work that set the standard. This book contains important coverage of environmental design, security surveys, locks, lighting, and CCTV, the latest ISO standards for risk assessment and risk management, physical security planning, network systems infrastructure, and environmental design.

Family Tree Workbook - 30+ Step-By-Step Worksheets to Build Your Family History (Paperback): Brian Sheffey Family Tree Workbook - 30+ Step-By-Step Worksheets to Build Your Family History (Paperback)
Brian Sheffey
R315 Discovery Miles 3 150 Ships in 18 - 22 working days
The Morality of Security - A Theory of Just Securitization (Paperback): Rita Floyd The Morality of Security - A Theory of Just Securitization (Paperback)
Rita Floyd
R971 Discovery Miles 9 710 Ships in 10 - 15 working days

When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, Floyd's innovative approach enables scholars to normatively evaluate past and present securitizations, equips practitioners to make informed judgements on what they ought to do in relevant situations, and empowers the public to hold relevant actors accountable for how they view security.

The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd edition):... The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd edition)
Douglas Landoll
R1,923 Discovery Miles 19 230 Ships in 10 - 15 working days

Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting. The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk.com) provides downloads for checklists, spreadsheets, figures, and tools.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Surface Analysis - The Principal…
J.C. Vickerman Hardcover R5,799 Discovery Miles 57 990
Combined and Hybrid Adsorbents…
Jose M. Loureiro, Mykola T. Kartel Hardcover R7,838 Discovery Miles 78 380
Process Analytical Chemistry
F. McLennan, B.D. Kowalski Hardcover R5,353 Discovery Miles 53 530
Diseases and the Physical Examination…
Paul Aronowitz Hardcover R1,831 Discovery Miles 18 310
Inductively Coupled Plasma Emission…
P. W. J. Boumans Hardcover R10,130 Discovery Miles 101 300
Fourteen Days to Amazing Health…
Dona Cooper-Dockery Hardcover R652 R596 Discovery Miles 5 960
Topics in Fluorescence Spectroscopy…
Joseph R. Lakowicz Hardcover R5,423 Discovery Miles 54 230
Bookends - A Family Doctor Explores…
Susan Boron Hardcover R571 R525 Discovery Miles 5 250
Public Health and Primary Care…
Alison Hill, Sian Griffiths, … Paperback R2,462 Discovery Miles 24 620
Surgery, An Issue of Physician Assistant…
Courtney Fankhanel Paperback R1,007 Discovery Miles 10 070

 

Partners