![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
This Scholastic Classics edition of George Orwell's classic dystopian novel is perfect for students and Orwell enthusiasts alike. Who controls the past controls the future. Who controls the present controls the past. Winston Smith has always been a dutiful citizen of Oceania, rewriting history to meet the demands of the Ministry of Truth. But with each lie that he writes, Winston starts to resent the totalitarian party that seeks power for its own sake and punishes those that desire individuality. When Winston begins a secret relationship with his colleague Julia, he soon realises it's virtually impossible to escape the watchful eye of Big Brother... Totalitarianism, identity and independence, repression, power, language, rebellion, technology and modernisation are some of the themes that run throughout this novel.
* Offers context while providing a coherent, applied overview of a wide range of suspect vulnerabilities and how to address them when interviewing * Serves as a practical guide to interviewing vulnerable suspects for both uniform police and detectives. * The only book on interviewing vulnerable suspects that includes the most up-to-date legal considerations and challenges of modern society
The first account of the secret police in Eastern Europe after 1989, this book uses a wide range of sources, including archives, to identify what has and has not changed since the end of Communism. After explaining the structure and workings of two of the area's most feared services, Czechoslovakia's StB and Romania's Securitate, the authors detail the creation of new security intelligence institutions, the development of contacts with the West, and forms of democratic control.
Draws together contributions from leading figures in the field of surveillance to engage in the discussion of the emergence of accountability as a means to manage threats to privacy. The first of its kind to enrich the debate about accountability and privacy by drawing together perspectives from experienced privacy researchers and policy makers.
1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.
Private Security Law: Case Studies is uniquely designed for the
special needs of private security practitioners, students, and
instructors. Part One of the book encompasses negligence,
intentional torts, agency contracts, alarms, and damages. Part Two
covers authority of the private citizen, deprivation of rights, and
entrapment.
Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.
Homeland security and context In the Geographical Dimensions of Terrorism (GDOT) (Cutter et al. 2003), the first book after 9/11 to address homeland security and geography, we developed several thematic research agendas and explored intersections between geographic research and the importance of context, both geographical and political, in relationship to the concepts of terrorism and security. It is good to see that a great deal of new thought and research continues to flow from that initial research agenda, as illustrated by many of the papers of this new book, entitled Geospatial Technologies and Homeland Security: Research Frontiers and Future Challenges. Context is relevant not only to understanding homeland security issues broadly, but also to the conduct of research on geospatial technologies. It is impossible to understand the implications of a homeland security strategy, let alone hope to make predictions, conduct meaningful modeling and research, or assess the value and dangers of geospatial technologies, without consideration of overarching political, social, economic, and geographic contexts within which these questions are posed.
1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.
1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.
- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.
Sheriffs, marshals, and bounty hunters are remembered as relics of our Wild West past. Pope looks at these agents of the law who operate outside police departments, particularly their roles in urban areas. She examines reasons for becoming a sheriff, marshal (usually appointed and not elected), or bounty hunter, as well as employment requirements, responsibilities, and relationships with local police and city officials. Pope argues ultimately that these law enforcers, to a much greater degree than the police, threaten low-income people. Urban sheriffs do not make arrests, but rather serve summonses, track down scofflaws, and confiscate property. Marshals carry out evictions. Bounty hunters are usually armed and work often in urban areas, hunting down wanted persons for a variety of crimes. Although they are not policemen, they are authorized to capture people and can do so without the restrictions imposed on traditional law enforcement officers. Pope focuses her attention on sheriffs, marshals, and bounty hunters in Arizona, New Jersey, New Mexico and New York. She examines their activities in the nineteenth century and today, providing interviews with sheriffs, marshals, bounty hunters, policemen, and with people who have been pursued by them. A work of interest to students, researchers, and citizens concerned with the workings of the U.S. criminal justice system.
* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats
A powerful and urgent call to action: to improve our lives and our societies, we must demand open access to data for all. Information is power, and the time is now for digital liberation. Access Rules mounts a strong and hopeful argument for how informational tools at present in the hands of a few could instead become empowering machines for everyone. By forcing data-hoarding companies to open access to their data, we can reinvigorate both our economy and our society. Authors Viktor Mayer-Schoenberger and Thomas Ramge contend that if we disrupt monopoly power and create a level playing field, digital innovations can emerge to benefit us all. Over the past twenty years, Big Tech has managed to centralize the most relevant data on their servers, as data has become the most important raw material for innovation. However, dominant oligopolists like Facebook, Amazon, and Google, in contrast with their reputation as digital pioneers, are actually slowing down innovation and progress by withholding data for the benefit of their shareholders--at the expense of customers, the economy, and society. As Access Rules compellingly argues, ultimately it is up to us to force information giants, wherever they are located, to open their treasure troves of data to others. In order for us to limit global warming, contain a virus like COVID-19, or successfully fight poverty, everyone-including citizens and scientists, start-ups and established companies, as well as the public sector and NGOs-must have access to data. When everyone has access to the informational riches of the data age, the nature of digital power will change. Information technology will find its way back to its original purpose: empowering all of us to use information so we can thrive as individuals and as societies.
It can take the form of a Molotov Cocktail or a Suicide Bomber detonating within a crowd. It can be a sophisticated electronic explosive device or a bomb in a shoe. Today's terrorism threats, and their constant assault on global security continues to be a menace of great concern. Providing a hands-on look inside the ugly, blood-stained world of global terrorism, Introduction to Terrorism covers the evolution of terrorism, its growing sophistication, and its cynical indifference to human life. It begins by covering the history of terrorism and showing how the threats have changed since the September 11, 2001 attacks. It examines the methods America has chosen to guard against and deal with these threats using its military, government, and civilian agencies. Illustrating and examining current and future challenges, this state-of-the-art text follows a flow model developed and successfully taught in the classroom at several colleges and universities. Designed to follow the standard academic semester (one chapter per week), the book's content, style, presentation, and organization have been class-tested and validated.
This book is about explaining surveillance processes and practices in contemporary society. Surveillance studies is a relatively new multi-disciplinary enterprise that aims to understand who watches who, how the watched participate in and sometimes question their surveillance, why surveillance occurs, and with what effects. This book brings together some of the world's leading surveillance scholars to discuss the "why" question. The field has been dominated, since the groundbreaking work of Michel Foucault, by the idea of the panopticon and this book explores why this metaphor has been central to discussions of surveillance, what is fruitful in the panoptic approach, and what other possible approaches can throw better light on the phenomena in question. Since the advent of networked computer databases, and especially since 9/11, questions of surveillance have come increasingly to the forefront of democratic, political, and policy debates in the global north (and to an extent in the glo
Since the 9.11 attacks in North America and the accession of the Schengen Accord in Europe there has been widespread concern with international borders, the passage of people and the flow of information across borders. States have fundamentally changed the ways in which they police and monitor this mobile population and its personal data. This book brings together leading authorities in the field who have been working on the common problem of policing and surveillance at physical and virtual borders at a time of increased perceived threat. It is concerned with both theoretical and empirical aspects of the ways in which the modern state attempts to control its borders and mobile population. It will be essential reading for students, practitioners, policy makers.
The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises' advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today's age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.
Nonproliferation Issues for Weapons of Mass Destruction provides an
understanding of WMD proliferation risks by bridging complex
technical and political issues. The text begins by defining the
world conditions that foster proliferation, followed by an analysis
of characteristics of various classes of WMDs, including nuclear,
biological, and chemical weapons. It then explores the
effectiveness of arms control, discussing current nonproliferation
problems, nonproliferation prior to the fall of the USSR, and
weapons safeguards.
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.
"Suzanne Simons is a masterful storyteller. But make no mistake-Master of War is not a work of fiction...A powerful and true account." -Wolf Blitzer, anchor, CNN's The Situation Room Master of War is the riveting true story of Eric Prince, the ex-Navy SEAL who founded Blackwater and built the world's largest military contractor, privatizing war for client nations around the world. A CNN producer and anchor, Suzanne Simons is the first journalist to get deep inside Blackwater-and, as a result of her unprecedented access, Master of War provides the most complete and revelatory account of the rise of this powerful corporate army and the remarkable entrepreneur who brought it into being, while offering an eye-opening, behind-the-scenes look at the wars in Iraq and Afghanistan.
Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.
This book analyses the collective security system as it now stands, focusing on strategic and normative frameworks. The old system of international collective security is based on assumptions that are inadequate in relation to current challenges. Against the backdrop of changed geopolitical constellations, democracies under siege and the challenges posed by new types of warfare, critical analysts hold that not a single multilateral institution today is fully up to the task it was created for. The UN, from its founding to the Sustained Peace Approach, represents a fascinating global process of vision-building and adaptation to reality. Based on this understanding, the dynamics of the UN peace and security architecture are examined along with major agendas, from peacebuilding to development. In turn, reform proposals in the post-COVID-19 era are discussed. The book examines whether a regionalization of security structures within the UN framework may offer a way out of global fragility and growing instability factors, a question of utmost importance for conflict prevention and crisis management in the next few decades. In turn, the author discusses a normative positioning of a new intervention logic as the lowest common denominator between collaborative regional orders. Reinvented multilateralism will return as a "must." Given its scope, the book will appeal to students and scholars of international relations and international security studies, as well as to policymakers in governments and international organizations.
Contemporary supply chains operate under the pressure of customer requirements, increasing price competition, sudden increases or decreases in demand, unforeseen obstacles and new threats. The right way to improve the functioning of the flow of material and accompanying information is not only the continuous collection of data but also their collection, analysis, inference and decision-making with the use of decision support systems, expert systems and artificial intelligence. Such procedures make it easier for logisticians not only to forecast processes but also to predict (forecast) and identify potential problems and facilitate the implementation of optimal modern solutions, paying attention to current trends in the supply chain market. An important issue that affects the quality, efficiency and availability (continuity) of the processes implemented within the supply chain is security. This is an area that is not clearly defined. This book uses theoretical and practical knowledge to define security in the supply chain as a state that gives a sense of certainty and guarantees the flow of material goods and services (in accordance with the 7w rule) as well as a smooth flow of information for the planning and management of logistics processes. Tools and instruments used to ensure the security of the supply chain contribute to the protection and survival in times of dangerous situations (threats) and adaptation to new conditions (susceptibility to unplanned situations). When analyzing the needs and structure of the 21st century supply chains, in the context of their security, it is impossible to ignore the problem of their digitization, which enables the determination of optimal routes and the anticipation of possible threats (crisis situations). Automatic data exchange between various departments of the company along the upper and lower part of the supply chain improves the functioning of the warehouse management through, among others, automation, robotization and pro-activity. It also contributes to efficient, good communication and market globalization. Automation also brings new, extremely attractive business models with regard to occupational safety, ergonomics and environmental protection. To meet the needs of creating modern supply chains, the book analyzes and presents current and future solutions that affect security and the continuity of supply chains. |
![]() ![]() You may like...
Artificial Intelligence Applications and…
Ilias Maglogiannis, John MacIntyre, …
Hardcover
R3,637
Discovery Miles 36 370
Recent Advances in Electrical…
Mohammed Chadli, Sofiane Bououden, …
Hardcover
R6,984
Discovery Miles 69 840
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,664
Discovery Miles 16 640
Economy, Business and Uncertainty: New…
Jaime Gil-Lafuente, Domenico Marino, …
Hardcover
R5,923
Discovery Miles 59 230
Conflict Resolution Using the Graph…
Haiyan Xu, Keith W. Hipel, …
Hardcover
R6,335
Discovery Miles 63 350
Stability and Control Processes…
Nikolay Smirnov, Anna Golovkina
Hardcover
R8,945
Discovery Miles 89 450
|