![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
This book is written as a practical guide to those interested in the pursuit of energy resilience at a local scale. Energy resilience is defined as the relative ability of an institution to carry out its mission during a shock to the energy system and approach the concept on the level of a single site occupied by a single community or institution. Examples are drawn from four key community types: military bases, healthcare campuses, educational campuses, and municipal governments. The book then describes a framework for developing an energy resilience plan that applies to each. While the focus is clearly on the United States, understanding the energy resilience threat and conducting long-range energy resilience planning will benefit communities all over the globe. Divided into three main parts, Part One describes the specific energy security threats that are facing local institutions and communities and how an energy shock can affect the mission at each of the four community types and the advantages that each will enjoy in their pursuit of energy resilience. Part Two provides concrete guidance for pursuing energy resilience at a particular institution and allows managers to assess where their institution lies on the energy resilience spectrum and plot a course toward where they would like to be. Part Three describes the three main areas of energy resilience performance: energy efficiency, on-site generation, and emergency planning. Case studies are also provided.
Since 9/11, the U.S. government and the private sector have devised sophisticated ways of protecting people and assets. The threats have evolved, however, becoming more insidious. They no longer comprise just terrorists who target critical infrastructures. They also include insider threats, such as PFC Manning and NSA contractor Snowden who leaked classified defense information, active shooter incidents like the Sandy Hook Elementary School massacre, and the 2013 Boston Marathon terrorist bombing. These events make it imperative for the public and private sectors to engage in effective partnership to protect people, facilities, and national infrastructure assets. Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection, Second Edition identifies the role the private sector plays in securing our homeland and offers strategies to aid in the fight against national and international threats. Addressing mandates and legislation introduced since the first edition, this new edition includes: Updates to the NIPP (National Infrastructure Protection Plan) New case studies of both proper security policies and procedures in practice versus costly security breaches Greater focus on smaller business and practical "immediate use" guidance New measures for assessing and addressing vulnerabilities and threats New appendices with sample plans and practical checklists Supplying tools that can easily be adapted and applied to every business situation at all budget levels, the book helps businesses counter the total threat, from traditional terrorists to inside betrayers-providing a clear blueprint for securing people and assets.
Working at the crossroads of contemporary geographical and cultural theory, the book explores how social spaces function as sites which foreground D. H. Lawrence and Virginia Woolf's critiques of the social order and longings for change. Looking at various social spaces from homes to nations to utopian space brought into the here and now the book shows the ways in which these writers criticize and deconstruct the contemporary symbolic, physical, and discursive spatial topoi of the dominant socio-spatial order and envision a more liberating and inclusive human geography. In addition, the book calls for the need to redress the tendency of some spatial theories to underestimate the political potential of literary discourse about space, instead of simply and mechanically appropriating some theoretical concepts to literary criticism. One of the central findings in the book, therefore, is that literary texts can perform subversive interventions in the production of social space through their critical interaction with dominant spatial codes.
This book contains practical, comprehensive, and effective guidance and advice on the issue of workplace violence. It is written in plain language and in a non-theoretical, reader-friendly format for quick and easy reference. Topics include the risk factors that contribute to workplace violence, as well as the effects of violence. The book discusses procedures for assessing threat as well as strategies for preventing violence and handling the consequences when necessary. It also examines situations such as domestic violence and the workplace and racial and sexual harassment and explains the new OSHA directive on investigation workplace violence.
This new edition of a bestseller book addresses the complexities of disaster preparedness and business continuity. Updated with the latest statistics, the new edition includes an overview of natural disasters, coverage of computer and data protection expanded to include cyber-attacks on the private sector, and information on managing data privacy. It also includes the latest information on dirty bombs, chemical and biological agents and weapons, disaster planning and recovery issues, regulatory influences and emergency preparedness. This reference highlights the importance of prevention as well as controlling the effects of a disaster on a company's operations.
Strategic Security Management, Second Edition provides security leadership and decision-makers with a fresh perspective on threat, vulnerability, and risk assessment. The book offers a framework to look at applying security analysis and theory into practice for effective security program, implementation, management and evaluation. Chapters examine metric-based security resource allocation of countermeasures, including security procedures, utilization of personnel, and electronic measures. The new edition is fully updated to reflect the latest industry best-practices and includes contributions from security industry leaders-based on their years of professional experience-including Norman Bates, Robert Emery, Jack Follis, Steve Kaufer, Andrew Rubin, Michael Silva, and Ken Wheatley. Strategic Security Management, Second Edition will be a welcome addition to the security literature for all security professionals, security managers, and criminal justice students interested in understanding foundational security principles and their application.
The book aims to outline the progress, problems and challenges of delivering a safe and secure Olympics in the context of the contemporary serious and enduring terrorist threat. The enormous media profile and symbolic significance of the Olympic Games, the history of terrorists aiming to use such high-profile events to advance their cause, and Al Qaeda's aim to cause mass casualties, all have major implications for the security of London 2012. Drawing on contributions from leading academics and practitioners in the field the book will assess the current terrorist threat, particularly focusing on terrorist targeting and how the Olympics might feature in this, before addressing particular response themes such as transport security, the role of surveillance, resilient designing of Olympic sites, the role of private security, and the challenge of inter-agency coordination. The book will conclude by providing an assessment of the legacy of Olympic security to date and will discuss the anticipated issues and dilemmas of the future. This book will be of interest to students of terrorism studies, security studies, counter-terrorism and sports studies.
A powerful and urgent call to action: to improve our lives and our societies, we must demand open access to data for all. Information is power, and the time is now for digital liberation. Access Rules mounts a strong and hopeful argument for how informational tools at present in the hands of a few could instead become empowering machines for everyone. By forcing data-hoarding companies to open access to their data, we can reinvigorate both our economy and our society. Authors Viktor Mayer-Schoenberger and Thomas Ramge contend that if we disrupt monopoly power and create a level playing field, digital innovations can emerge to benefit us all. Over the past twenty years, Big Tech has managed to centralize the most relevant data on their servers, as data has become the most important raw material for innovation. However, dominant oligopolists like Facebook, Amazon, and Google, in contrast with their reputation as digital pioneers, are actually slowing down innovation and progress by withholding data for the benefit of their shareholders--at the expense of customers, the economy, and society. As Access Rules compellingly argues, ultimately it is up to us to force information giants, wherever they are located, to open their treasure troves of data to others. In order for us to limit global warming, contain a virus like COVID-19, or successfully fight poverty, everyone-including citizens and scientists, start-ups and established companies, as well as the public sector and NGOs-must have access to data. When everyone has access to the informational riches of the data age, the nature of digital power will change. Information technology will find its way back to its original purpose: empowering all of us to use information so we can thrive as individuals and as societies.
The book aims to outline the progress, problems and challenges of delivering a safe and secure Olympics in the context of the contemporary serious and enduring terrorist threat. The enormous media profile and symbolic significance of the Olympic Games, the history of terrorists aiming to use such high-profile events to advance their cause, and Al Qaeda's aim to cause mass casualties, all have major implications for the security of London 2012. Drawing on contributions from leading academics and practitioners in the field the book will assess the current terrorist threat, particularly focusing on terrorist targeting and how the Olympics might feature in this, before addressing particular response themes such as transport security, the role of surveillance, resilient designing of Olympic sites, the role of private security, and the challenge of inter-agency coordination. The book will conclude by providing an assessment of the legacy of Olympic security to date and will discuss the anticipated issues and dilemmas of the future. This book will be of interest to students of terrorism studies, security studies, counter-terrorism and sports studies.
As evidenced by the anthrax attacks in 2001, the SARS outbreak in 2003, and the H1N1 influenza pandemic in 2009, a pathogen does not recognize geographic or national boundaries, often leading to devastating consequences. Automated biosurveillance systems have emerged as key solutions for mitigating current and future health- related events. Focusing on this promising public health innovation, Biosurveillance: Methods and Case Studies discusses how these systems churn through vast amounts of health-related data to support epidemiologists and public health officials in the early identification, situation awareness, and response management of natural and man-made health-related events. The book follows a natural sequence from theory to application. The initial chapters build a foundation while subsequent chapters present more applied case studies from around the world, including China, the United States, Denmark, and the Asia-Pacific region. The contributors share candid, first-hand insights on lessons learned and unresolved issues that will help chart the future of biosurveillance. As this book illustrates, biosurveillance operates in a complex, multidimensional problem space that incorporates varied data. Capturing the progress of modern-day pioneers who are walking in John Snow's footsteps, this volume shows how contemporary information technology can be applied to the age-old challenge of combating the spread of disease and illness.
One day in the spring of 2013, a box appeared outside a fourth-floor apartment door in Brooklyn, New York. The recipient, who didn't know the sender, only knew she was supposed to bring this box to a friend, who would ferry it to another friend. This was Edward Snowden's box-printouts of documents proving that the US government had built a massive surveillance apparatus and used it to spy on its own people-and the friend on the end of this chain was filmmaker Laura Poitras. Thus the biggest national security leak of the digital era was launched via a remarkably analog network, the US Postal Service. This is just one of the odd, ironic details that emerges from the story of how Jessica Bruder and Dale Maharidge, two experienced journalists but security novices (and the friends who received and ferried the box) got drawn into the Snowden story as behind-the-scenes players. Their initially stumbling, increasingly paranoid, and sometimes comic efforts to help bring Snowden's leaks to light, and ultimately, to understand their significance, unfold in an engrossing narrative that includes emails and diary entries from Poitras. This is an illuminating essay on the status of transparency, privacy, and trust in the age of surveillance.
The Aspin-Brown Commission of 1995-1996, led by former U.S. Defense
Secretaries Les Aspin and Harold Brown, was a landmark inquiry into
the activities of America's secret agencies. The purpose of the
commission was to help the Central Intelligence Agency and other
organizations in the U.S. intelligence community adapt to the quite
different world that had emerged after the end of the Cold War in
1991.
Why must we design security systems that work and fail well? Why are national ID cards a technically unsound, even dangerous idea? Why is buying online safe? Why should we definitely NOT invest in biometrics- based scanners for airports? Surprising assessments and advice from a leading security expert.Schneier, the highly regarded author of "Applied Cryptography and Secrets and Lies", turns his iconoclastic mind on the broader issues of security, including the vast infrastructure we already have in place, and the vaster systems -- some useful, others useless or worse -- that we're being asked to submit to and pay for. Rather than heavy-handed proselytizing, Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions.
Sustainable Hospitality Management: Designing Meaningful Encounters with Talent and Technology will generate international debate in the research and practice of hospitality management. It considers how the sector can and should innovate to respond to challenges such as talent scarcity, the growing ecological footprint, and technological developments. Volume 24 of Advanced Series in Management explores topics at the very heart of hospitality, by looking at meaningful encounters: positive, welcoming, genuinely service-oriented interactions between humans, and the role of technology in creating or improving these encounters. Human talent is essential to excellent service delivery and guest experience provision. It is also essential in the design and monitoring of technology-enabled guest or customer experience. Technology may be the service facilitator or it may be an experience enhancer. In today's globalizing platform economy, hospitality services are established most dominantly via technology-enabled platforms or networks. At the human interaction level, technology can deliver, support or intensify the hospitality experience. This volume is essential for researchers and students interested in the hospitality sector and the role of technology in creating a sustainable hospitality sector.
Featuring chapters authored by leading scholars in the fields of criminology, critical race studies, history, and more, The Cambridge Handbook of Race and Surveillance cuts across history and geography to provide a detailed examination of how race and surveillance intersect throughout space and time. The volume reviews surveillance technology from the days of colonial conquest to the digital era, focusing on countries such as the United States, Canada, the UK, South Africa, the Philippines, India, Brazil, and Palestine. Weaving together narratives on how technology and surveillance have developed over time to reinforce racial discrimination, the book delves into the often-overlooked origins of racial surveillance, from skin branding, cranial measurements, and fingerprinting to contemporary manifestations in big data, commercial surveillance, and predictive policing. Lucid, accessible, and expertly researched, this handbook provides a crucial investigation of issues spanning history and at the forefront of contemporary life.
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." - Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.
"Suzanne Simons is a masterful storyteller. But make no mistake-Master of War is not a work of fiction...A powerful and true account." -Wolf Blitzer, anchor, CNN's The Situation Room Master of War is the riveting true story of Eric Prince, the ex-Navy SEAL who founded Blackwater and built the world's largest military contractor, privatizing war for client nations around the world. A CNN producer and anchor, Suzanne Simons is the first journalist to get deep inside Blackwater-and, as a result of her unprecedented access, Master of War provides the most complete and revelatory account of the rise of this powerful corporate army and the remarkable entrepreneur who brought it into being, while offering an eye-opening, behind-the-scenes look at the wars in Iraq and Afghanistan.
Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the author's work that set the standard. This book contains important coverage of environmental design, security surveys, locks, lighting, and CCTV, the latest ISO standards for risk assessment and risk management, physical security planning, network systems infrastructure, and environmental design.
When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, Floyd's innovative approach enables scholars to normatively evaluate past and present securitizations, equips practitioners to make informed judgements on what they ought to do in relevant situations, and empowers the public to hold relevant actors accountable for how they view security.
A powerful personal testimony and an urgent call for Israel to change direction, from an unexpected source: the former director of the internal security service, Shin Bet. Raised on a kibbutz by parents who had fled the Holocaust, Ami Ayalon’s life exemplified the Zionist dream. His commitment to his country propelled a meteoric career, culminating in being named commander of the navy and receiving the Medal of Valour, Israel’s highest military decoration. All the time, he remained a staunch supporter of his country’s policies. Then he was appointed director of the Shin Bet, Israel’s internal security service, and the unexpected happened. Forced to try and understand the lives and motivations of Palestinians for the first time, he gained empathy for ‘the enemy’ and learned that when Israel carries out anti-terrorist operations in a political context of hopelessness, the Palestinian public will support violence, because they have nothing to lose. He came to understand that his patriotic life had blinded him to the self-defeating nature of policies that have undermined Israel’s civil society while heaping humiliation upon its neighbours. In this deeply personal journey of discovery, Ami Ayalon seeks input and perspectives from Palestinians and Israelis whose experiences differ from his own, and draws radical conclusions about what Israel must do to achieve relative peace and security.
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting. The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk.com) provides downloads for checklists, spreadsheets, figures, and tools.
The Art of Investigation examines the qualities required to be a professional, thorough, and effective investigator. As the title suggests, it delves into more than the steps and procedures involved in managing an investigation, it also covers the "soft skills" necessary to effectively direct investigations and intuit along the way. The editors and contributing authors are the best in their field, and bring a wealth of real-world knowledge and experience to the subject. There are several publications available on the nuts-and-bolts of the process and stages of an investigation. That ground has been covered. However, little has been published on the investigative skills required, the traits necessary, and the qualities endemic to an inquisitive mind that can be cultivated to improve an investigator's professional skill-set. Each chapter discusses the applicability of the traits to the contributor's own work and experience as an investigator. In doing so, the contributors provide a story-or set of stories-from their personal experience, which demonstrates a given trait and its importance in the course of their investigative work and career. This will be first-hand experience that will serve to help any investigative professional in the course of their work. The case examples included throughout are sometimes surprising, but always engaging and insightful. An investigator must keep an open mind above all else, and this book will "lift the veil" on the inner workings of an investigation, in addition to the thought processes and inner monologues of an investigator as part of that process. Key Features * Chapters highlight the qualities and traits-the "soft skills"-that are required, and which can be improved over time, to be a thorough investigator. * A veritable "Who's Who" of renowned investigative experts lend their personal expertise and experience to this how-to manual for investigators. * A unique approach is applied and provides self-help advice for both new and experienced investigative and security professionals. * The book focuses on the learned, acquired, and intuitive skills of investigation-a nuanced but essential aspect of the investigative skill-set. The Art of Investigation will be a welcome addition to any investigator's toolkit and will also be of interest to students in criminal justice, security, and Homeland Security programs, security consultants, corporate and private security professionals, and the legal community.
There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as ‘target centric’ intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject.
|
You may like...
Journalism and the Nsa Revelations…
Adrienne Russell, Risto Kunelius, …
Hardcover
R3,655
Discovery Miles 36 550
|