0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (38)
  • R500+ (395)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Beyond Fear - Thinking Sensibly About Security in an Uncertain World (Hardcover, 1st ed. 2003. Corr. 2nd printing 2006): Bruce... Beyond Fear - Thinking Sensibly About Security in an Uncertain World (Hardcover, 1st ed. 2003. Corr. 2nd printing 2006)
Bruce Schneier
R1,213 R1,020 Discovery Miles 10 200 Save R193 (16%) Ships in 10 - 15 working days

Why must we design security systems that work and fail well? Why are national ID cards a technically unsound, even dangerous idea? Why is buying online safe? Why should we definitely NOT invest in biometrics- based scanners for airports? Surprising assessments and advice from a leading security expert.Schneier, the highly regarded author of "Applied Cryptography and Secrets and Lies", turns his iconoclastic mind on the broader issues of security, including the vast infrastructure we already have in place, and the vaster systems -- some useful, others useless or worse -- that we're being asked to submit to and pay for. Rather than heavy-handed proselytizing, Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions.

Security Manual (Paperback, 8th edition): David Brooksbank Security Manual (Paperback, 8th edition)
David Brooksbank
R1,499 Discovery Miles 14 990 Ships in 12 - 19 working days

Security Manual provides practical guidance on all aspects of security work and is a ready made source of information for all members of the security profession, including managers, supervisors and trainers. This eighth edition has been fully restructured to better reflect recent changes in the criminal law, fire protection and security practices. New chapters on powers of arrest, industrial disputes, conflict resolution, dealing with emergencies, cultural awareness and door supervising have been added, including the latest information and procedures that should be adopted in relation to an act of terrorism. The manual continues to pay attention to the law of theft, other criminal offences affecting security and the basics of security practice, and can rightly be regarded as the standard overall work on the subject and a practical reference for existing security practitioners and those who are aspiring to enter the security profession. Security Manual is also ideal for those seeking professional qualifications such as: NVQ Levels 1, 2 and 3 in Security Guarding and for Supervisors; NVQ Level 3 in Investigations; C&G, BIIAB and NCFE qualifications in Door Supervision. Security Manual is the essential guide to this subject, and has been described as 'standard issue for every security officer, along with the uniform'.

El Misterioso Candor de Los Trenes (Spanish, Hardcover): Jose Alemany El Misterioso Candor de Los Trenes (Spanish, Hardcover)
Jose Alemany
R886 Discovery Miles 8 860 Ships in 12 - 19 working days
The Cambridge Handbook of Race and Surveillance (Hardcover): Michael Kwet The Cambridge Handbook of Race and Surveillance (Hardcover)
Michael Kwet
R3,939 Discovery Miles 39 390 Ships in 12 - 19 working days

Featuring chapters authored by leading scholars in the fields of criminology, critical race studies, history, and more, The Cambridge Handbook of Race and Surveillance cuts across history and geography to provide a detailed examination of how race and surveillance intersect throughout space and time. The volume reviews surveillance technology from the days of colonial conquest to the digital era, focusing on countries such as the United States, Canada, the UK, South Africa, the Philippines, India, Brazil, and Palestine. Weaving together narratives on how technology and surveillance have developed over time to reinforce racial discrimination, the book delves into the often-overlooked origins of racial surveillance, from skin branding, cranial measurements, and fingerprinting to contemporary manifestations in big data, commercial surveillance, and predictive policing. Lucid, accessible, and expertly researched, this handbook provides a crucial investigation of issues spanning history and at the forefront of contemporary life.

Sustainable Hospitality Management - Designing Meaningful Encounters with Talent and Technology (Hardcover): Huub Ruel,... Sustainable Hospitality Management - Designing Meaningful Encounters with Talent and Technology (Hardcover)
Huub Ruel, Angelique Lombarts
R3,591 R3,398 Discovery Miles 33 980 Save R193 (5%) Ships in 12 - 19 working days

Sustainable Hospitality Management: Designing Meaningful Encounters with Talent and Technology will generate international debate in the research and practice of hospitality management. It considers how the sector can and should innovate to respond to challenges such as talent scarcity, the growing ecological footprint, and technological developments. Volume 24 of Advanced Series in Management explores topics at the very heart of hospitality, by looking at meaningful encounters: positive, welcoming, genuinely service-oriented interactions between humans, and the role of technology in creating or improving these encounters. Human talent is essential to excellent service delivery and guest experience provision. It is also essential in the design and monitoring of technology-enabled guest or customer experience. Technology may be the service facilitator or it may be an experience enhancer. In today's globalizing platform economy, hospitality services are established most dominantly via technology-enabled platforms or networks. At the human interaction level, technology can deliver, support or intensify the hospitality experience. This volume is essential for researchers and students interested in the hospitality sector and the role of technology in creating a sustainable hospitality sector.

Bioterrorism - A Guide for Hospital Preparedness (Hardcover, New): Joseph R. Masci, M.D., Elizabeth Bass Bioterrorism - A Guide for Hospital Preparedness (Hardcover, New)
Joseph R. Masci, M.D., Elizabeth Bass
R5,840 Discovery Miles 58 400 Ships in 12 - 19 working days

In the battle against bioterrorism, one of the greatest challenges is finding the ideal balance between complacency and overreaction. The goal is to be so well prepared that we can prevent catastrophic outcomes in the event of a bioterrorist attack, while strengthening our ability to prevent and treat naturally-occurring infectious diseases. Bioterrorism: A Guide for Hospital Preparedness provides critical guidelines for health providers on effectively preparing for bioterrorism. The book presents information on all aspects of dealing with bioterrorism including the likeliest biological agents to be used, means of determining that an attack is taking place, diagnosis and management of specific diseases, and mechanisms of reporting to public health authorities. The text reviews cooperative planning for private practitioners, methods for protecting hospital and office staff and other patients in the event of an attack, approaches to handling the psychological effects of terrorism, special considerations concerning the care of children, and strategies for answering questions posed by the public and the media. It also includes data from national and regional exercises in assessing preparedness, with suggestions for implementing lessons learned from these exercises. With bioterrorism on the fine line between risk and reality, it is essential for health care providers to be properly equipped for every situation. This comprehensive guide features solid strategies for establishing and maintaining an attainable level of preparation in the ever-present risk of bioterrorism.

Security and Loss Prevention - An Introduction (Paperback, 7th edition): Philip Purpura Security and Loss Prevention - An Introduction (Paperback, 7th edition)
Philip Purpura
R1,932 Discovery Miles 19 320 Ships in 12 - 19 working days

Security and Loss Prevention: An Introduction, Seventh Edition, provides introductory and advanced information on the security profession. Security expert, Phil Purpura, CPP, includes updates on security research, methods, strategies, technologies, laws, issues, statistics and career options, providing a comprehensive and interdisciplinary book that draws on many fields of study for concepts, strategies of protection and research. The book explains the real-world challenges facing security professionals and offers options for planning solutions. Linking physical security with IT security, the book covers internal and external threats to people and assets and private and public sector responses and issues. As in previous editions, the book maintains an interactive style that includes examples, illustrations, sidebar questions, boxed topics, international perspectives and web exercises. In addition, course instructors can download ancillaries, including an instructor's manual with outlines of chapters, discussion topics/special projects, essay questions, and a test bank and PowerPoint presentation for each chapter.

Hospitality Security - Managing Security in Today's Hotel, Nightlife, Entertainment, and Tourism Environment (Paperback,... Hospitality Security - Managing Security in Today's Hotel, Nightlife, Entertainment, and Tourism Environment (Paperback, 2nd edition)
Darrell Clifton
R2,016 Discovery Miles 20 160 Ships in 12 - 19 working days

Outlines risk assessments in which threats and vulnerabilities are calculated with probabilities to determine risk Presents how to establish a security plan, and, in this, how to determine the best deployment of various layers of control to mitigate risks Offers an overview of budgeting-determining, advocating for, and implementing the security program based on allotted funding Details how to document policies into a security manual, training manual, emergency procedures manual, and incident action plan Provides the ins and outs of staffing including scheduling, wages, deployment, and contract security Examines training best practices including physical security, emergency response and procedures, as well as specialized topics such as use of force and patrol procedures Explains prostitution and human trafficking, presenting sections with a focus on awareness and prevention

Design and Evaluation of Physical Protection Systems (Paperback, 2nd edition): Mary Lynn Garcia Design and Evaluation of Physical Protection Systems (Paperback, 2nd edition)
Mary Lynn Garcia
R1,628 Discovery Miles 16 280 Ships in 12 - 19 working days

Design and Evaluation of Physical Security Systems, 2e, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.
* New chapter on transportation systems
* Extensively updated chapter on threat definition
* Major changes to response chapter

Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Paperback):... Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Paperback)
Bruce Turner
R1,230 Discovery Miles 12 300 Ships in 12 - 19 working days

Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the 'mailroom to the boardroom' follows the story of a young banker who moved into the internal auditing profession as part of the 'new breed', then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.

Auditing Corporate Surveillance Systems - Research Methods for Greater Transparency (Hardcover, New Ed): Isabel Wagner Auditing Corporate Surveillance Systems - Research Methods for Greater Transparency (Hardcover, New Ed)
Isabel Wagner
R1,856 Discovery Miles 18 560 Ships in 12 - 19 working days

News headlines about privacy invasions, discrimination, and biases discovered in the platforms of big technology companies are commonplace today, and big tech's reluctance to disclose how they operate counteracts ideals of transparency, openness, and accountability. This book is for computer science students and researchers who want to study big tech's corporate surveillance from an experimental, empirical, or quantitative point of view and thereby contribute to holding big tech accountable. As a comprehensive technical resource, it guides readers through the corporate surveillance landscape and describes in detail how corporate surveillance works, how it can be studied experimentally, and what existing studies have found. It provides a thorough foundation in the necessary research methods and tools, and introduces the current research landscape along with a wide range of open issues and challenges. The book also explains how to consider ethical issues and how to turn research results into real-world change.

Afterlives of Data - Life and Debt under Capitalist Surveillance (Paperback): Mary F.E. Ebeling Afterlives of Data - Life and Debt under Capitalist Surveillance (Paperback)
Mary F.E. Ebeling
R831 R670 Discovery Miles 6 700 Save R161 (19%) Ships in 12 - 19 working days

What our health data tell American capitalism about our value-and how that controls our lives. Afterlives of Data follows the curious and multiple lives that our data live once they escape our control. Mary F. E. Ebeling's ethnographic investigation shows how information about our health and the debt that we carry becomes biopolitical assets owned by healthcare providers, insurers, commercial data brokers, credit reporting companies, and platforms. By delving into the oceans of data built from everyday medical and debt traumas, Ebeling reveals how data about our lives come to affect our bodies and our life chances and to wholly define us. Investigations into secretive data collection and breaches of privacy by the likes of Cambridge Analytica have piqued concerns among many Americans about exactly what is being done with their data. From credit bureaus and consumer data brokers like Equifax and Experian to the secretive military contractor Palantir, this massive industry has little regulatory oversight for health data and works to actively obscure how it profits from our data. In this book, Ebeling traces the health data-medical information extracted from patients' bodies-that are digitized and repackaged into new data commodities that have afterlives in database lakes and oceans, algorithms, and statistical models used to score patients on their creditworthiness and riskiness. Critical and disturbing, Afterlives of Data examines how Americans' data about their health and their debt are used in the service of marketing and capitalist surveillance.

The Myth of International Order - Why Weak States Persist and Alternatives to the State Fade Away (Hardcover): Arjun Chowdhury The Myth of International Order - Why Weak States Persist and Alternatives to the State Fade Away (Hardcover)
Arjun Chowdhury
R3,479 Discovery Miles 34 790 Ships in 12 - 19 working days

In February of 2011, Libyan citizens rebelled against Muammar Qaddafi and quickly unseated him. The speed of the regime's collapse confounded many observers, and the ensuing civil war showed Foreign Policy's index of failed states to be deeply flawed-FP had, in 2010, identified 110 states as being more likely than Libya to descend into chaos. They were spectacularly wrong, but this points to a larger error in conventional foreign policy wisdom: failed, or weak and unstable, states are not anomalies but are instead in the majority. More states resemble Libya than Sweden. Why are most states weak and unstable? Taking as his launching point Charles Tilly's famous dictum that 'war made the state, and the state made war,' Arjun Chowdhury argues that the problem lies in our mistaken equation of democracy and economic power with stability. But major wars are the true source of stability: only the existential crisis that such wars produced could lead citizens to willingly sacrifice the resources that allowed the state to build the capacity it needed for survival. Developing states in the postcolonial era never experienced the demands major interstate war placed on European states, and hence citizens in those nations have been unwilling to sacrifice the resources that would build state capacity. For example, India and Mexico are established democracies with large economies. Despite their indices of stability, both countries are far from stable: there is an active Maoist insurgency in almost a quarter of India's districts, and Mexico is plagued by violence, drug trafficking, and high levels of corruption in local government. Nor are either effective at collecting revenue. As a consequence, they do not have the tax base necessary to perform the most fundamental tasks of modern states: controlling organized violence in a given territory and providing basic services to citizens. By this standard, the majority of states in the world-about two thirds-are weak states. Chowdury maintains that an accurate evaluation of international security requires a normative shift : the language of weakness and failure belies the fact that strong states are exceptions. Chowdhury believes that dismantling this norm is crucial, as it encourages developing states to pursue state-building via war, which is an extremely costly approach-in terms of human lives and capital. Moreover, in our era, such an approach is destined to fail because the total wars of the past are highly unlikely to occur today. Just as importantly, the non-state alternatives on offer are not viable alternatives. For better or worse, we will continue to live in a state-dominated world where most states are weak. Counterintuitive and sweeping in its coverage, The Myth of International Order demands that we fundamentally rethink foundational concepts of international politics like political stability and state failure.

The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd edition):... The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd edition)
Douglas Landoll
R1,950 Discovery Miles 19 500 Ships in 12 - 19 working days

Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting. The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk.com) provides downloads for checklists, spreadsheets, figures, and tools.

Auditing Information and Cyber Security Governance - A Controls-Based Approach (Hardcover): Robert E Davis Auditing Information and Cyber Security Governance - A Controls-Based Approach (Hardcover)
Robert E Davis
R2,086 Discovery Miles 20 860 Ships in 12 - 19 working days

"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." - Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.

The Art of Investigation (Paperback): Chelsea A. Binns, Bruce Sackman The Art of Investigation (Paperback)
Chelsea A. Binns, Bruce Sackman
R1,483 Discovery Miles 14 830 Ships in 12 - 19 working days

The Art of Investigation examines the qualities required to be a professional, thorough, and effective investigator. As the title suggests, it delves into more than the steps and procedures involved in managing an investigation, it also covers the "soft skills" necessary to effectively direct investigations and intuit along the way. The editors and contributing authors are the best in their field, and bring a wealth of real-world knowledge and experience to the subject. There are several publications available on the nuts-and-bolts of the process and stages of an investigation. That ground has been covered. However, little has been published on the investigative skills required, the traits necessary, and the qualities endemic to an inquisitive mind that can be cultivated to improve an investigator's professional skill-set. Each chapter discusses the applicability of the traits to the contributor's own work and experience as an investigator. In doing so, the contributors provide a story-or set of stories-from their personal experience, which demonstrates a given trait and its importance in the course of their investigative work and career. This will be first-hand experience that will serve to help any investigative professional in the course of their work. The case examples included throughout are sometimes surprising, but always engaging and insightful. An investigator must keep an open mind above all else, and this book will "lift the veil" on the inner workings of an investigation, in addition to the thought processes and inner monologues of an investigator as part of that process. Key Features * Chapters highlight the qualities and traits-the "soft skills"-that are required, and which can be improved over time, to be a thorough investigator. * A veritable "Who's Who" of renowned investigative experts lend their personal expertise and experience to this how-to manual for investigators. * A unique approach is applied and provides self-help advice for both new and experienced investigative and security professionals. * The book focuses on the learned, acquired, and intuitive skills of investigation-a nuanced but essential aspect of the investigative skill-set. The Art of Investigation will be a welcome addition to any investigator's toolkit and will also be of interest to students in criminal justice, security, and Homeland Security programs, security consultants, corporate and private security professionals, and the legal community.

Strategic Security Management - A Risk Assessment Guide for Decision Makers, Second Edition (Paperback, 2nd edition): Karim... Strategic Security Management - A Risk Assessment Guide for Decision Makers, Second Edition (Paperback, 2nd edition)
Karim Vellani
R1,907 Discovery Miles 19 070 Ships in 12 - 19 working days

Strategic Security Management, Second Edition provides security leadership and decision-makers with a fresh perspective on threat, vulnerability, and risk assessment. The book offers a framework to look at applying security analysis and theory into practice for effective security program, implementation, management and evaluation. Chapters examine metric-based security resource allocation of countermeasures, including security procedures, utilization of personnel, and electronic measures. The new edition is fully updated to reflect the latest industry best-practices and includes contributions from security industry leaders-based on their years of professional experience-including Norman Bates, Robert Emery, Jack Follis, Steve Kaufer, Andrew Rubin, Michael Silva, and Ken Wheatley. Strategic Security Management, Second Edition will be a welcome addition to the security literature for all security professionals, security managers, and criminal justice students interested in understanding foundational security principles and their application.

Ethics for the Public Service Professional (Paperback, 2nd edition): Aric W. Dutelle, Randy S. Taylor Ethics for the Public Service Professional (Paperback, 2nd edition)
Aric W. Dutelle, Randy S. Taylor
R1,592 Discovery Miles 15 920 Ships in 12 - 19 working days

Headlines of public service corruption scandals are painful reminders of the need for continuing education in the subjects of ethics and integrity. Public service professionals employed as government officials, forensic scientists, investigators, first responders, and those within the legal and justice systems, face daily decisions that can mean the difference between life or death and freedom or imprisonment. Sometimes, such decisions can present ethical dilemmas even to the most seasoned of professionals. Building on the success of the first edition, Ethics for the Public Service Professional, Second Edition serves as a single-source resource for the topic of ethics and ethical decision making as it relates to government service. While incorporating an examination of the history of ethics, codes and legislation, the book exposes the reader to the challenges faced by today's public service professionals and administrators in incorporating ethics within daily decisions, procedures, and duties. Key features include: Current controversies in police, forensic, and other public service sectors including: racial profiling, evidence tampering, disaster response, and audits Important new mechanisms of accountability, including use-of-force reporting, citizen complaint procedures, and open government Contemporary news stories throughout the book introduce the reader to a broad range of ethical issues facing leaders within the public service workplace Chapter pedagogy including key terms, learning objectives, end-of-chapter questions, a variety of boxed ethical case examples, and references Ripped from the Headlines current event examples demonstrate actual scenarios involving the issues discussed within each chapter This in-depth text will be essential for the foundational development and explanation of protocols used within a successful organization. As such, Ethics for the Public Service Professional, Second Edition will help introduce ethics and ethical decision-making to both those new to the realm of forensic science, criminal justice, and emergency services and those already working in the field.

Preventing and Managing Violence in Organizations - Workplace Violence, Targeted Violence, and Active Shooters (Paperback):... Preventing and Managing Violence in Organizations - Workplace Violence, Targeted Violence, and Active Shooters (Paperback)
Marc H. Siegel
R1,970 Discovery Miles 19 700 Ships in 12 - 19 working days

Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue. As such, the book's objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach. The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager. While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization's system of management and all its activities and functions. The "Introduction" section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization's overall business management strategy. The "Framework" section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The "Tactics and Control Measures" section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events. For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach. Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization's day-to-day activities-as an integral part of these activities-rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.

Intelligence Analysis Fundamentals (Paperback): Patrick McGlynn, Godfrey Garner Intelligence Analysis Fundamentals (Paperback)
Patrick McGlynn, Godfrey Garner
R2,020 Discovery Miles 20 200 Ships in 12 - 19 working days

There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as 'target centric' intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject. The book is general enough in nature that a lay student-interested in pursuing a career in intelligence, Homeland Security, or other related areas of law enforcement-will benefit from it. No prior knowledge of intelligence analysis, functions, or operations is assumed. Chapters illustrate methods and techniques that, over the years, have consistently demonstrate results, superior to those achieved with other means. Chapters describe such analytical methods that are most widely used in the intelligence community and serve as recognized standards and benchmarks in the practice of intelligence analysis. All techniques have been selected for inclusion for their specific application to homeland security, criminal investigations, and intelligence operations. Uses numerous hands-on activities-that can easily be modified by instructors to be more or less challenging depending on the course level-to reinforce concepts As current and active members of the intelligence community, the authors draw on their decades of experience in intelligence to offer real-world examples to illustrate concepts All methodologies reflect the latest trends in the intelligence communities assessment, analysis, and reporting processes with all presented being open source, non-classified information As such, the non-sensitive information presented is appropriate-and methods applicable-for use for education and training overseas and internationally Military-style collection and analysis methods are the primary ones presented, but all are directly correlated intelligence to current concepts, functions and practices within Homeland Security and the law communities Covers the counterterrorism environment where joint operations and investigative efforts combine military, private sector, and law enforcement action and information sharing The book will be a welcome addition to the body of literature available and a widely used reference for professionals and students alike.

Global Intelligence Oversight - Governing Security in the Twenty-First Century (Hardcover): Zachary K. Goldman, Samuel J.... Global Intelligence Oversight - Governing Security in the Twenty-First Century (Hardcover)
Zachary K. Goldman, Samuel J. Rascoff; Jane Harman
R2,451 Discovery Miles 24 510 Ships in 12 - 19 working days

In a world that is increasingly unstable, intelligence services like the American CIA and the United Kingdom's MI6 exist to deliver security. Whether the challenge involves terrorism, cyber-security, or the renewed specter of great power conflict, intelligence agencies mitigate threats and provide decisional advantage to national leaders. But empowered intelligence services require adequate supervision and oversight, which must be about more than the narrow (if still precarious) task of ensuring the legality of covert operations and surveillance activities. Global Intelligence Oversight is a comparative investigation of how democratic countries can govern their intelligence services so that they are effective, but operate within frameworks that are acceptable to their people in an interconnected world. The book demonstrates how the institutions that oversee intelligence agencies participate in the protection of national security while safeguarding civil liberties, balancing among competing national interests, and building public trust in inherently secret activities. It does so by analyzing the role of courts and independent oversight bodies as they operate in countries with robust constitutional frameworks and powerful intelligence services. The book also illuminates a new transnational oversight dynamic that is shaping and constraining security services in new ways. It describes how global technology companies and litigation in transnational forums constitute a new form of oversight whose contours are still undefined. As rapid changes in technology bring the world closer together, these forces will complement their more traditional counterparts in ensuring that intelligence activities remain effective, legitimate, and sustainable.

The Age of Surveillance Capitalism - The Fight for a Human Future at the New Frontier of Power (Hardcover): Shoshana Zuboff The Age of Surveillance Capitalism - The Fight for a Human Future at the New Frontier of Power (Hardcover)
Shoshana Zuboff 1
R1,106 R902 Discovery Miles 9 020 Save R204 (18%) Ships in 18 - 22 working days

The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it.

Will China's Rise Be Peaceful? - Security, Stability, and Legitimacy (Hardcover): Asle Toje Will China's Rise Be Peaceful? - Security, Stability, and Legitimacy (Hardcover)
Asle Toje
R3,500 Discovery Miles 35 000 Ships in 12 - 19 working days

The rise of China will undoubtedly be one of the great spectacles of the twenty-first century. More than a dramatic symbol of the redistribution of global wealth, the event has marked the end of the unipolar international system and the arrival of a new era in world politics. How the security, stability and legitimacy built upon foundations that were suddenly shifting, adapting to this new reality is the subject of Will China's Rise be Peaceful? Bringing together the work of seasoned experts and younger scholars, this volume offers an inclusive examination of the effects of historical patterns-whether interrupted or intact-by the rise of China. The contributors show how strategies among the major powers are guided by existing international rules and expectations as well as by the realities created by an increasingly powerful China. While China has sought to signal its non-revisionist intent its extraordinary economic growth and active diplomacy has in a short time span transformed global and East Asian politics. This has caused constant readjustments as the other key actors have responded to the changing incentives provided by Chinese policies. Will China's Rise be Peaceful? explores these continuities and discontinuities in five areas: theory, history, domestic politics, regional politics, and great power politics. Equally grounded in theory and extensive empirical research, this timely volume offers a remarkably lucid description and interpretation of our changing international relations. In both its approach and its conclusions, it will serve as a model for the study of China in a new era.

A Comprehensive Look at Fraud Identification and Prevention (Paperback): James R. Youngblood A Comprehensive Look at Fraud Identification and Prevention (Paperback)
James R. Youngblood
R1,150 Discovery Miles 11 500 Ships in 12 - 19 working days

Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention. The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include: Employee theft and fraud Organizational fraud Identity theft and fraud Fraud against the elderly Internet, computer, and e-mail fraud Ponzi and pyramid schemes The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers. Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.

Security Surveillance Centers - Design, Implementation, and Operation (Paperback): Anthony V. DiSalvatore Security Surveillance Centers - Design, Implementation, and Operation (Paperback)
Anthony V. DiSalvatore
R1,133 Discovery Miles 11 330 Ships in 12 - 19 working days

Unlike current books on the market that focus primarily on the technical aspects of surveillance and protection, Security Surveillance Centers: Design, Implementation, and Operation focuses on the operation of a security surveillance center. This text explains in detail the role of security surveillance, as well as the critical aspects of the design, implementation, and operation of security surveillance centers of all sizes. Step-by-step coverage of policy and procedures, as well as the inclusion of industry-specific operational forms, guarantee a practical, user-friendly text for all levels of readers. Intended for any individuals or organizations currently employing security surveillance systems, this book is an asset for all users, from trainees to supervisors, seeking to create a more secure environment for themselves and for others.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Deep Learning For Beginners - 2…
Steven Cooper Hardcover R791 R707 Discovery Miles 7 070
Advanced Introduction to Artificial…
Tom Davenport, John Glaser, … Hardcover R2,894 Discovery Miles 28 940
Consumer Behavior Change and Data…
Pantea Keikhosrokiani Hardcover R8,378 Discovery Miles 83 780
Heat Transport and Energetics of the…
Anne Hofmeister Paperback R2,493 Discovery Miles 24 930
Targeting the Computer - Government…
Kenneth Flamm Paperback R619 Discovery Miles 6 190
Volcano-Tectonic Processes
Valerio Acocella Hardcover R4,640 Discovery Miles 46 400
Introduction to Operating Systems
Philip Avery Johnson Hardcover R587 R536 Discovery Miles 5 360
Research Handbook on Intellectual…
Ryan Abbott Hardcover R6,914 Discovery Miles 69 140
Public Library User Fees - The Use and…
Nancy Van House Hardcover R1,653 Discovery Miles 16 530
Quality Assurance in the Era of…
Anastasius S. Moumtzoglou Hardcover R8,377 Discovery Miles 83 770

 

Partners