0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (39)
  • R500+ (368)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd edition):... The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd edition)
Douglas Landoll
R1,838 Discovery Miles 18 380 Ships in 10 - 15 working days

Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting. The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk.com) provides downloads for checklists, spreadsheets, figures, and tools.

1984 (Paperback): George Orwell 1984 (Paperback)
George Orwell
R208 R191 Discovery Miles 1 910 Save R17 (8%) Ships in 9 - 17 working days

This Scholastic Classics edition of George Orwell's classic dystopian novel is perfect for students and Orwell enthusiasts alike. Who controls the past controls the future. Who controls the present controls the past. Winston Smith has always been a dutiful citizen of Oceania, rewriting history to meet the demands of the Ministry of Truth. But with each lie that he writes, Winston starts to resent the totalitarian party that seeks power for its own sake and punishes those that desire individuality. When Winston begins a secret relationship with his colleague Julia, he soon realises it's virtually impossible to escape the watchful eye of Big Brother... Totalitarianism, identity and independence, repression, power, language, rebellion, technology and modernisation are some of the themes that run throughout this novel.

The Art of Investigation (Paperback): Chelsea A. Binns, Bruce Sackman The Art of Investigation (Paperback)
Chelsea A. Binns, Bruce Sackman
R1,483 Discovery Miles 14 830 Ships in 10 - 15 working days

The Art of Investigation examines the qualities required to be a professional, thorough, and effective investigator. As the title suggests, it delves into more than the steps and procedures involved in managing an investigation, it also covers the "soft skills" necessary to effectively direct investigations and intuit along the way. The editors and contributing authors are the best in their field, and bring a wealth of real-world knowledge and experience to the subject. There are several publications available on the nuts-and-bolts of the process and stages of an investigation. That ground has been covered. However, little has been published on the investigative skills required, the traits necessary, and the qualities endemic to an inquisitive mind that can be cultivated to improve an investigator's professional skill-set. Each chapter discusses the applicability of the traits to the contributor's own work and experience as an investigator. In doing so, the contributors provide a story-or set of stories-from their personal experience, which demonstrates a given trait and its importance in the course of their investigative work and career. This will be first-hand experience that will serve to help any investigative professional in the course of their work. The case examples included throughout are sometimes surprising, but always engaging and insightful. An investigator must keep an open mind above all else, and this book will "lift the veil" on the inner workings of an investigation, in addition to the thought processes and inner monologues of an investigator as part of that process. Key Features * Chapters highlight the qualities and traits-the "soft skills"-that are required, and which can be improved over time, to be a thorough investigator. * A veritable "Who's Who" of renowned investigative experts lend their personal expertise and experience to this how-to manual for investigators. * A unique approach is applied and provides self-help advice for both new and experienced investigative and security professionals. * The book focuses on the learned, acquired, and intuitive skills of investigation-a nuanced but essential aspect of the investigative skill-set. The Art of Investigation will be a welcome addition to any investigator's toolkit and will also be of interest to students in criminal justice, security, and Homeland Security programs, security consultants, corporate and private security professionals, and the legal community.

Intelligence Analysis Fundamentals (Paperback, 3rd Edition): Patrick McGlynn, Godfrey Garner Intelligence Analysis Fundamentals (Paperback, 3rd Edition)
Patrick McGlynn, Godfrey Garner
R1,903 Discovery Miles 19 030 Ships in 10 - 15 working days

There are a limited number of intelligence analysis books available on the market.  Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as ‘target centric’ intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject.

The book is general enough in nature that a lay student—interested in pursuing a career in intelligence, Homeland Security, or other related areas of law enforcement—will benefit from it.  No prior knowledge of intelligence analysis, functions, or operations is assumed.  Chapters illustrate methods and techniques that, over the years, have consistently demonstrate results, superior to those achieved with other means. Chapters describe such analytical methods that are most widely used in the intelligence community and serve as recognized standards and benchmarks in the practice of intelligence analysis.  All techniques have been selected for inclusion for their specific application to homeland security, criminal investigations, and intelligence operations.  

Uses numerous hands-on activities—that can easily be modified by instructors to be more or less challenging depending on the course level—to reinforce concepts

As current and active members of the intelligence community, the authors draw on their decades of experience in intelligence to offer real-world examples to illustrate concepts

All methodologies reflect the latest trends in the intelligence communities assessment, analysis, and reporting processes with all presented being open source, non-classified information

As such, the non-sensitive information presented is appropriate—and methods applicable—for use for education and training overseas and internationally

Military-style collection and analysis methods are the primary ones presented, but all are directly correlated intelligence to current concepts, functions and practices within Homeland Security and the law communities

Covers the counterterrorism environment where joint operations and investigative efforts combine military, private sector, and law enforcement action and information sharing

The book will be a welcome addition to the body of literature available and a widely used reference for professionals and students alike.

Table of Contents

1. Defining Intelligence Analysis 2. The Intelligence Cycle 3. Thinking About Thinking 4. Perception and Deception 5. Knowing Your Audience 6. Analytical Communication 7. Defining the Problem 8. Generating the Hypothesis 9. The Collection Process 10. Analytical Tradecraft 11. Cognitive Traps for Intelligence Analysis 12. Probability Estimation 13. Creating an Analytical Plan 14. Preparing and Conducting Intelligence Briefings 15. Best Practices 16. Operations Security OPSEC

Safe City - From Law Enforcement to Neighborhood Watches (Paperback): Robert Hessel Safe City - From Law Enforcement to Neighborhood Watches (Paperback)
Robert Hessel
R298 Discovery Miles 2 980 Ships in 10 - 15 working days

It's a basic human right to feel and be safe in your community-where you live, work and play. But, few people know or understand everything it takes to make this possible. Safe City details the concerted effort and integration of new technology it takes to make communities safer for everyone. From fire departments detecting fires within seconds with thermal imaging to police departments detecting gunfire immediately through gunshot detection sensors, technology continues to evolve daily. Even surveillance cameras have taken great strides from the grainy images of years past, and just one camera can make a difference (read about how police identified the Boston Marathon bombers through a department store's video camera inside!). Safe City teaches the public how to harden targets and protect their homes, businesses, communities, themselves, and their loved ones. It takes a community effort to help reduce and prevent crime, and Safe City answers the questions people have along with pointing out many more that should be asked.

Privatising Justice - The Security Industry, War and Crime Control (Hardcover): Wendy Fitzgibbon, John Lea Privatising Justice - The Security Industry, War and Crime Control (Hardcover)
Wendy Fitzgibbon, John Lea
R2,474 Discovery Miles 24 740 Ships in 18 - 22 working days

Privatising Justice takes a broad historical view of the role of the private sector in the British state, from private policing and mercenaries in the eighteenth century to the modern rise of the private security industry in armed conflict, policing and the penal system. The development of the welfare state is seen as central to the decline of what the authors call 'old privatisation'. Its succession by neoliberalism has created the ground for the resurgence of the private sector. The growth of private military, policing and penal systems is located within the broader global changes brought about by neoliberalism and the dystopian future that it portends. The book is a powerful petition for the reversal of the increasing privatisation of the state and the neoliberalism that underlies it.

A Comprehensive Look at Fraud Identification and Prevention (Paperback): James R. Youngblood A Comprehensive Look at Fraud Identification and Prevention (Paperback)
James R. Youngblood
R1,142 Discovery Miles 11 420 Ships in 10 - 15 working days

Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention. The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include: Employee theft and fraud Organizational fraud Identity theft and fraud Fraud against the elderly Internet, computer, and e-mail fraud Ponzi and pyramid schemes The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers. Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.

Security Surveillance Centers - Design, Implementation, and Operation (Paperback): Anthony V. DiSalvatore Security Surveillance Centers - Design, Implementation, and Operation (Paperback)
Anthony V. DiSalvatore
R1,127 Discovery Miles 11 270 Ships in 10 - 15 working days

Unlike current books on the market that focus primarily on the technical aspects of surveillance and protection, Security Surveillance Centers: Design, Implementation, and Operation focuses on the operation of a security surveillance center. This text explains in detail the role of security surveillance, as well as the critical aspects of the design, implementation, and operation of security surveillance centers of all sizes. Step-by-step coverage of policy and procedures, as well as the inclusion of industry-specific operational forms, guarantee a practical, user-friendly text for all levels of readers. Intended for any individuals or organizations currently employing security surveillance systems, this book is an asset for all users, from trainees to supervisors, seeking to create a more secure environment for themselves and for others.

The Politics of Police Reform - Society against the State in Post-Soviet Countries (Hardcover): Erica Marat The Politics of Police Reform - Society against the State in Post-Soviet Countries (Hardcover)
Erica Marat
R2,475 Discovery Miles 24 750 Ships in 10 - 15 working days

There is a Russian saying that "police mirror society." The gist of this is that every society is policed to the extent that it allows itself to be policed. Centralized in control but decentralized in their reach, the police are remarkably similar in structure, chain of command, and their relationships with the political elite across post-Soviet nations-they also remain one of the least reformed post-communist institutions. As a powerful state organ, the Soviet-style militarized police have resisted change despite democratic transformations in the overall political context, including rounds of competitive elections and growing civil society. While consensus between citizens and the state about reform may be possible in democratic nations, it is considerably more difficult to achieve in authoritarian states. Across post-Soviet countries, such discussions most often occur between political elites and powerful non-state actors, such as criminal syndicates and nationalistic ethnic groups, rather than the wider citizenry. Even in countries where one or more rounds of democratic elections have taken place since 1991, empowered citizens and politicians have not renegotiated the way states police and coerce society. On the contrary, in many post-Soviet countries, police functions have expanded to serve the interests of the ruling political elites. What does it take to reform a post-Soviet police force? This book explores the conditions in which a meaningful transformation of the police is likely to succeed and when it will fail. Departing from the conventional interpretation of the police as merely an institution of coercion, this book defines it as a medium for state-society consensus on the limits of the state's legitimate use of violence. It thus considers policing not as a way to measure the state's capacity to coerce society, but rather as a reflection of a complex society bound together by a web of casual interactions and political structures. The book compares reform efforts in Ukraine, Georgia, Kyrgyzstan, Kazakhstan, and Tajikistan, finding that bottom-up public mobilization is likely to emerge in the aftermath of transformative violence-an incident when the usual patterns of policing are interrupted with unprecedented brutality against vulnerable individuals. Ultimately, The Politics of Police Reform examines the various pathways to transforming how the state relates to society through policing.

Strategic Security - Forward Thinking for Successful Executives (Hardcover): Jean Perois Strategic Security - Forward Thinking for Successful Executives (Hardcover)
Jean Perois
R3,500 Discovery Miles 35 000 Ships in 10 - 15 working days

Strategic Security will help security managers, and those aspiring to the position, to think strategically about their job, the culture of their workplace, and the nature of security planning and implementation. Security professionals tend to focus on the immediate (the urgent) rather than the important and essential-too often serving as "firefighters" rather than strategists. This book will help professionals consider their roles, and structure their tasks through a strategic approach without neglecting their career objectives. Few security management books for professionals in the field focus on corporate or industrial security from a strategic perspective. Books on the market normally provide "recipes," methods or guidelines to develop, plans, policies or procedures. However, many do so without taking into account the personal element that is supposed to apply these methods. In this book, the authors helps readers to consider their own career development in parallel with establishing their organisation security programme. This is fundamental to becoming, and serving as, a quality, effective manager. The element of considering career objectives as part-and-parcel to this is both unique to only this book and vital for long-term career success. The author delineates what makes strategic thinking different in a corporate and security environment. While strategy is crucial in the running of a company, the traditional attitude towards security is that it has to fix issues quickly and at low cost. This is an attitude that no other department would tolerate, but because of its image, security departments sometimes have major issues with buy-in and from top-management. The book covers the necessary level of strategic thinking to put their ideas into practice. Once this is achieved, the strategic process is explained, including the need to build the different steps into this process-and into the overarching business goals of the organisation-will be demonstrated. The book provides numerous hand-on examples of how to formulate and execute the strategic master plan for the organization. The authors draws on his extensive experience and successes to serve as a valuable resource to all security professionals looking to advance their careers in the field.

Private Security and the Investigative Process, Fourth Edition (Hardcover, 4th edition): Charles P Nemeth Private Security and the Investigative Process, Fourth Edition (Hardcover, 4th edition)
Charles P Nemeth
R4,243 Discovery Miles 42 430 Ships in 10 - 15 working days

Private Security and the Investigative Process, Fourth Edition is fully updated and continues to provide complete coverage of the investigative process for private investigations by both individuals and in corporate security environments. This edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new information on case evaluation. Written by a recognized expert in security, criminal justice, ethics, and the law-with over three decades of experience-the updated edition of this popular text covers concepts and techniques that can be applied to a variety of investigations including fraud, insurance, private, and criminal. It details the collection and preservation of evidence, the handling of witnesses, surveillance techniques, background investigations, and report writing. The book reflects best practices and includes tips for ensuring accurate and reliable private sector security investigations. This new edition includes: A new section on career opportunities in paths in the investigative field A rundown of the leading security Industry associations and professional standards being published Added discussion of observational interviews include current protocols analyzing data Details of the current legal implications for security surveillance and practices Advances in technology to thwart crime and fraud in retail and other business settings An entirely new section on e-records from criminal and civil judgments Authoritative, yet accessible, this book is one of the only textbooks dedicated to the subject. It also serves as an important reference for private investigators and security professionals. Complete with numerous forms, checklists, and web exercises, it provides the tools and understanding required to conduct investigations that are professional, ethical, and effective.

The Art of Investigation (Hardcover): Chelsea A. Binns, Bruce Sackman The Art of Investigation (Hardcover)
Chelsea A. Binns, Bruce Sackman
R1,749 Discovery Miles 17 490 Ships in 10 - 15 working days

The Art of Investigation examines the qualities required to be a professional, thorough, and effective investigator. As the title suggests, it delves into more than the steps and procedures involved in managing an investigation, it also covers the "soft skills" necessary to effectively direct investigations and intuit along the way. The editors and contributing authors are the best in their field, and bring a wealth of real-world knowledge and experience to the subject. There are several publications available on the nuts-and-bolts of the process and stages of an investigation. That ground has been covered. However, little has been published on the investigative skills required, the traits necessary, and the qualities endemic to an inquisitive mind that can be cultivated to improve an investigator's professional skill-set. Each chapter discusses the applicability of the traits to the contributor's own work and experience as an investigator. In doing so, the contributors provide a story-or set of stories-from their personal experience, which demonstrates a given trait and its importance in the course of their investigative work and career. This will be first-hand experience that will serve to help any investigative professional in the course of their work. The case examples included throughout are sometimes surprising, but always engaging and insightful. An investigator must keep an open mind above all else, and this book will "lift the veil" on the inner workings of an investigation, in addition to the thought processes and inner monologues of an investigator as part of that process. Key Features * Chapters highlight the qualities and traits-the "soft skills"-that are required, and which can be improved over time, to be a thorough investigator. * A veritable "Who's Who" of renowned investigative experts lend their personal expertise and experience to this how-to manual for investigators. * A unique approach is applied and provides self-help advice for both new and experienced investigative and security professionals. * The book focuses on the learned, acquired, and intuitive skills of investigation-a nuanced but essential aspect of the investigative skill-set. The Art of Investigation will be a welcome addition to any investigator's toolkit and will also be of interest to students in criminal justice, security, and Homeland Security programs, security consultants, corporate and private security professionals, and the legal community.

The Terror Factory: The Isis Edition (Paperback): Trevor Aaronson The Terror Factory: The Isis Edition (Paperback)
Trevor Aaronson
R481 R435 Discovery Miles 4 350 Save R46 (10%) Ships in 9 - 17 working days
Surveillance, Privacy and Security - Citizens' Perspectives (Hardcover): Michael Friedewald, J.Peter Burgess, Johann Cas,... Surveillance, Privacy and Security - Citizens' Perspectives (Hardcover)
Michael Friedewald, J.Peter Burgess, Johann Cas, Rocco Bellanova, Walter Peissl
R4,932 Discovery Miles 49 320 Ships in 10 - 15 working days

This volume examines the relationship between privacy, surveillance and security, and the alleged privacy-security trade-off, focusing on the citizen's perspective. Recent revelations of mass surveillance programmes clearly demonstrate the ever-increasing capabilities of surveillance technologies. The lack of serious reactions to these activities shows that the political will to implement them appears to be an unbroken trend. The resulting move into a surveillance society is, however, contested for many reasons. Are the resulting infringements of privacy and other human rights compatible with democratic societies? Is security necessarily depending on surveillance? Are there alternative ways to frame security? Is it possible to gain in security by giving up civil liberties, or is it even necessary to do so, and do citizens adopt this trade-off? This volume contributes to a better and deeper understanding of the relation between privacy, surveillance and security, comprising in-depth investigations and studies of the common narrative that more security can only come at the expense of sacrifice of privacy. The book combines theoretical research with a wide range of empirical studies focusing on the citizen's perspective. It presents empirical research exploring factors and criteria relevant for the assessment of surveillance technologies. The book also deals with the governance of surveillance technologies. New approaches and instruments for the regulation of security technologies and measures are presented, and recommendations for security policies in line with ethics and fundamental rights are discussed. This book will be of much interest to students of surveillance studies, critical security studies, intelligence studies, EU politics and IR in general. A PDF version of this book is available for free in open access via www.tandfebooks.com. It has been made available under a Creative Commons Attribution-Non Commercial 3.0 license.

On Killing Remotely - The Psychology of Killing with Drones (Standard format, CD): Wayne Phelps On Killing Remotely - The Psychology of Killing with Drones (Standard format, CD)
Wayne Phelps; Read by Matt Kugler
R1,103 R724 Discovery Miles 7 240 Save R379 (34%) Ships in 9 - 17 working days
Surveillance and Security - Technological Politics and Power in Everyday Life (Paperback, New edition): Torin Monahan Surveillance and Security - Technological Politics and Power in Everyday Life (Paperback, New edition)
Torin Monahan
R1,682 Discovery Miles 16 820 Ships in 10 - 15 working days

This is a volume of original contributions from scholars in eight different humanities and social science disciplines. The aim of the book is to present a range of surveillance technologies used in everyday life and investigate the politics of their use. It is truly an interdisciplinary project that will find purchase in courses on security studies and the sociology of culture and the sociology of science. Courses on security studies and its impact on culture can be found in a variety of academic departments including STS, criminology, sociology, women's studies, anthropology, political science and justice studies.

Stopping The Spies - Constructing And Resisting The Surveillance State In South Africa (Paperback): Jane Duncan Stopping The Spies - Constructing And Resisting The Surveillance State In South Africa (Paperback)
Jane Duncan
R420 R388 Discovery Miles 3 880 Save R32 (8%) Ships in 5 - 10 working days

In 2013, former U.S. National Security Agency (NSA) contractor Edward Snowden leaked secret documents revealing that state agencies like the NSA had spied on the communications of millions of innocent citizens. International outrage resulted, but the Snowden documents revealed only the tip of the surveillance iceberg. Apart from insisting on their rights to tap into communications, more and more states are placing citizens under surveillance, tracking their movements and transactions with public and private institutions. The state is becoming like a one-way mirror, where it can see more of what its citizens do and say, while citizens see less and less of what the state does, owing to high levels of secrecy around surveillance.

In this book, Jane Duncan assesses the relevance of Snowden’s revelations for South Africa. In doing so she questions the extent to which South Africa is becoming a surveillance society governed by a surveillance state. Duncan challenges members of civil society to be concerned about and to act on the ever-expanding surveillance capacities of the South African state. Is surveillance used for the democratic purpose of making people safer, or is it being used for the repressive purpose of social control, especially of those considered to be politically threatening to ruling interests? She explores the forms of collective action needed to ensure that unaccountable surveillance does not take place and examines what does and does not work when it comes to developing organised responses.

This book is aimed at South African citizens, academics as well as the general reader, who care about our democracy and the direction it is taking.

Gender and Private Security in Global Politics (Paperback): Maya Eichler Gender and Private Security in Global Politics (Paperback)
Maya Eichler
R1,068 Discovery Miles 10 680 Ships in 10 - 15 working days

For two hundred years the provision of military security has been a central and defining function of the modern nation-state. The increasing reliance on private military and security companies in contemporary conflict marks a fundamental transformation in the organization of military violence, and it raises issues of accountability and ethics that are of particular concern to feminists. This privatization of force not only enables states to circumvent citizens' democratic control over questions of war and peace, but also undermines women's and minority groups' claims for greater inclusion in the military sphere. Gender and Private Security in Global Politics brings together key scholars from the fields of international relations, security studies, and gender studies to argue that privatization of military security is a deeply gendered process. The chapters employ a variety of feminist perspectives, including critical, postcolonial, poststructuralist, and queer feminist perspectives, as well as a wide range of methodological approaches including ethnography, participant-observation, genealogy, and discourse analysis. This is the first book to develop an extended feminist analysis of private militaries and to draw on feminist concerns regarding power, justice and equality to consider how to reform and regulate private forces.

Casino Security and Gaming Surveillance (Hardcover, 3rd Edition): Derk J. Boss, Alan W. Zajic Casino Security and Gaming Surveillance (Hardcover, 3rd Edition)
Derk J. Boss, Alan W. Zajic
R133 Discovery Miles 1 330 Ships in 4 - 6 working days

Almost all incidences of cheating, theft, fraud, or loss can be detected through the surveillance of critical transactions, audit observations, and reviews of key metrics. Providing proven-techniques for detecting and mitigating the ever-evolving threats to casino security, this book covers the core skills, knowledge, and techniques needed to protect casino assets, guests, and employees.

Drawing on the authors’ six decades of combined experience in the industry, Casino Security and Gaming Surveillance identifies the most common threats to casino security and provides specific solutions for addressing these threats. From physical security and security management to table and gaming surveillance, it details numerous best practice techniques, strategies, and tactics, in addition to the metrics required to effectively monitor operations. The authors highlight valuable investigation tools, including interview techniques and evidence gathering. They also cover IOU patrol, tri-shot coverage, surveillance audits, threat analysis, card counting, game protection techniques, players’ club theft and fraud, surveillance standard operating procedures, nightclub and bar security, as well as surveillance training.

Complete with a glossary of gaming terms and a resource-rich appendix that includes helpful forms, this book covers everything surveillance and security professionals need to know to avoid high-profile incidents, costly compliance violations and damage to property and revenue.

Table of Contents

Section I: Surveillance in Gaming Operations

Chapter 1: Camera Operational Techniques

Chapter 2: Game Protection

Chapter 3: Internal Theft and Fraud

Chapter 4: Security Surveillance

Chapter 5: Standard Operating Procedures

Chapter 6: Investigations

Chapter 7: Surveillance Training and Education

Chapter 8: Statistical Information and Analysis

Chapter 9: Surveillance in the Future

Section II: Physical Security in Gaming Operations

Chapter 10: The Gaming Security Officer’s Role

Chapter 11: Security Patrols and Assignments in the Gaming Environment

Chapter 12: Alcohol and the Gaming Environment

Chapter 13: Table Game Fills, Credits, Drops, and Money

Chapter 14: Managing and Controlling Incidents

Chapter 15: Removing Undesirables

Chapter 16: Arrests and Detainments

Chapter 17: Theft, Larceny, and Other Property Crimes

Chapter 18: The Major Security Incident

Chapter 19: Training Gaming Security Officers

Chapter 20: Common Casino Scams and Crimes

Chapter 21: Managing Casino Security

A Comprehensive Look at Fraud Identification and Prevention (Hardcover): James R. Youngblood A Comprehensive Look at Fraud Identification and Prevention (Hardcover)
James R. Youngblood
R3,524 Discovery Miles 35 240 Ships in 10 - 15 working days

Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention. The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include: Employee theft and fraud Organizational fraud Identity theft and fraud Fraud against the elderly Internet, computer, and e-mail fraud Ponzi and pyramid schemes The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers. Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.

Web Security - A WhiteHat Perspective (Paperback): Hanqing Wu, Liz Zhao Web Security - A WhiteHat Perspective (Paperback)
Hanqing Wu, Liz Zhao
R2,833 Discovery Miles 28 330 Ships in 10 - 15 working days

In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.

One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Paperback): Simon... One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Paperback)
Simon Chesterman
R1,055 Discovery Miles 10 550 Ships in 10 - 15 working days

What limits, if any, should be placed on a government's efforts to spy on its citizens in the interests of national security? Spying on foreigners has long been regarded as an unseemly but necessary enterprise. Spying on one's own citizens in a democracy, by contrast, has historically been subject to various forms of legal and political restraint. For most of the twentieth century these regimes were kept distinct. That position is no longer tenable. Modern threats do not respect national borders. Changes in technology make it impractical to distinguish between 'foreign' and 'local' communications. And our culture is progressively reducing the sphere of activity that citizens can reasonably expect to be kept from government eyes. The main casualty of this transformed environment will be privacy. Recent battles over privacy have been dominated by fights over warrantless electronic surveillance or CCTV; the coming years will see debates over data-mining and biometric identification. There will be protests and lawsuits, editorials and elections resisting these attacks on privacy. Those battles are worthy. But they will all be lost. Modern threats increasingly require that governments collect such information, governments are increasingly able to collect it, and citizens increasingly accept that they will collect it. The point of this book is to shift focus away from questions of whether governments should collect information and onto more problematic and relevant questions concerning its use. By reframing the relationship between privacy and security in the language of a social contract, mediated by a citizenry who are active participants rather than passive targets, the book offers a framework to defend freedom without sacrificing liberty.

Professional Security Management - A Strategic Guide (Hardcover, 3rd Edition): Charles Swanson Professional Security Management - A Strategic Guide (Hardcover, 3rd Edition)
Charles Swanson
R1,586 Discovery Miles 15 860 Ships in 9 - 17 working days

Historically, security managers have tended to be sourced from either the armed forces or law enforcement. But the increasing complexity of the organisations employing them, along with the technologies employed by them, is forcing an evolution and expansion of the role, and security managers must meet this challenge in order to succeed in their field and protect the assets of their employers. Risk management, crisis management, continuity management, strategic business operations, data security, IT, and business communications all fall under the purview of the security manager.

This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses. It covers the basics of strategy, risk, and technology from the perspective of the security manager, focussing only on the 'need to know'. The reader will benefit from an understanding of how risk management aligns its functional aims with the strategic goals and operations of the organisation.

This essential book supports professional vocational accreditation and qualifications, such as the Chartered Security Professional (CSyP) or Certified Protection Professional (CPP), and advises on pathways to higher education qualifications in the fields of security and risk management. It is ideal for any risk manager looking to further their training and development, as well as being complementary for risk and security management programs with a focus on practice.

Table of Contents

1 Private security and the development of the Security Manager

2 Security risk management and strategic business awareness

3 Critical Security Areas

3.1 Security Risk Management

3.2 Crime Prevention through Environmental Design and Situational Crime Prevention

3.3 Physical and Electronic Security Systems

3.4 The Security Survey and Security Audit

3.5 Business Resilience

Risk Management

Crisis Management

Disaster Management

Business Continuity Management

3.6 The Chief Security Officer (CSO) and the Chief Information Security Officer(CISO)

3.7 Cyber Crime

3.8 Critical National Infrastructure

3.9 Terrorism and Counter Terrorism

3.10 Aviation and Maritime Security Management

3.11 Supply Chain Security Management

3.12 Hostile Environment Awareness

3.13 Strategic Business Awareness

3.14 Fraud Investigations

3.15 Retail Loss Prevention

3.16 Workplace Investigations

3.17 Academic and vocational qualifications

3.18 Conclusion

Bibliography

Index

Bleeding Out - The Devastating Consequences of Urban Violence--And a Bold New Plan for Peace in the Streets (Hardcover): Thomas... Bleeding Out - The Devastating Consequences of Urban Violence--And a Bold New Plan for Peace in the Streets (Hardcover)
Thomas Abt 1
R690 R619 Discovery Miles 6 190 Save R71 (10%) Ships in 18 - 22 working days
Privacy in Peril - How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience (Paperback): James B.... Privacy in Peril - How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience (Paperback)
James B. Rule
R723 Discovery Miles 7 230 Ships in 10 - 15 working days

This provocative book offers a probing account of the erosion of privacy in American society, that shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience. The author reveals that in today's "information society," the personal data that we make available to virtually any organization for virtually any purpose is apt to surface elsewhere, applied to utterly different purposes. The mass collection and processing of personal information produces such tremendous efficiencies that both the public and private sector feel justified in pushing as far as they can into our private lives. And there is no easy cure. Indeed, there are many cases where privacy invasion is both hurtful to the individual and indispensable to an organization's quest for efficiency. And as long as we willingly accept the pursuit of profit, or the reduction of crime, or cutting government costs as sufficient reason for intensified scrutiny over our lives, then privacy will remain endangered.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Tell Me Everything - The Story of a…
Erika Krouse Paperback R443 Discovery Miles 4 430
Gender and Private Security in Global…
Maya Eichler Hardcover R3,575 Discovery Miles 35 750
Machine See, Machine Do - How Technology…
Patrick K Lin Hardcover R683 R612 Discovery Miles 6 120
The Enforcers - Inside Cape Town's…
Caryn Dolley Paperback  (1)
R295 R264 Discovery Miles 2 640
Security Consulting
Charles A. Sennewald Paperback R1,107 Discovery Miles 11 070
Silent Weapons for Quiet Wars - An…
Anonymous Hardcover R592 R536 Discovery Miles 5 360
Journalism and the Nsa Revelations…
Adrienne Russell, Risto Kunelius, … Hardcover R3,655 Discovery Miles 36 550
The Professional Protection Officer…
Sandi J. Davies, Lawrence Fennelly Paperback R1,374 Discovery Miles 13 740
European Security Law
Martin Trybus, Nigel White Hardcover R2,565 Discovery Miles 25 650
Public Safety and Security…
P J. Ortmeier Paperback R1,435 Discovery Miles 14 350

 

Partners