0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (37)
  • R500+ (368)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

European Security Law (Hardcover, New): Martin Trybus, Nigel White European Security Law (Hardcover, New)
Martin Trybus, Nigel White
R2,565 Discovery Miles 25 650 Ships in 10 - 15 working days

There have been a number of EU military operations in the last few years, evidence of a growing European military confidence, which in turn is a reflection of a developing competence in security matters. The creation of the European Union and its Common Foreign and Security Policy by the Maastricht Treaty of 1992 heralded this development, though the idea of a common defense can be traced to the beginnings of European integration. This book provides an analysis of the EU's evolving legal framework and powers on such matters, but it also recognizes that such a framework sits, sometimes uneasily, within the wider body of EU and International Law. The EU's security and defense policy also overlaps with those of other organizations such as the Organization for Security and Cooperation in Europe (OSCE), but more especially the North Atlantic Treaty Organization (NATO). EU relations with NATO have, in particular, caused some concern and are still evolving as both organizations seek to play a wider security role in the post-Cold War, and now post-9/11, era. With security now dominating political agendas at the domestic, regional and international levels, it is no surprise that the EU's concern for security has grown, and, following the Union's respect for the rule of law, has been shaped legally as well as politically. This book evaluates the progress of the Union in this regard in its international context and in its wider context of European integration generally. The analysis is in the main a legal one, but is placed squarely within wider historical and political perspectives.

The Right to Privacy (Hardcover): Samuel D. Warren, Louis D. Brandeis The Right to Privacy (Hardcover)
Samuel D. Warren, Louis D. Brandeis; Foreword by Steven Alan Childress
R540 Discovery Miles 5 400 Ships in 18 - 22 working days
Effective Physical Security (Paperback, 4th edition): Lawrence Fennelly Effective Physical Security (Paperback, 4th edition)
Lawrence Fennelly
R1,317 Discovery Miles 13 170 Ships in 10 - 15 working days

"Effective Physical Security, " Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors work that set the standard: "Handbook of Loss Prevention and Crime Prevention, " Fifth Edition.

Designed for easy reference, "Effective Physical Security" contains important coverage of environmental design, security surveys, locks, lighting, and CCTV as well as new chapters covering the latest in the ISO standards for Risk Assessmentand Risk Management, physical security planning, network systems infrastructure, and environmental design. This new edition continues to serve as a valuable reference for experienced security practitioners as well as students in undergraduate and graduate security programs.
Required reading for the ASIS Physical Security Professional Certification (PSP) and recommended reading for the CPP certification Provides detailed coverage of Physical Security in an easily accessible reference format with content divided into three major parts: Design, Equipment, and Operations Each chapter is written by a recognized expert security specialist "

Private Security and the Law (Hardcover, 4th edition): Charles Nemeth Private Security and the Law (Hardcover, 4th edition)
Charles Nemeth
R1,440 Discovery Miles 14 400 Ships in 10 - 15 working days

"Private Security and the Law, 4th Edition," is a unique resource that provides analysis of practices in the security industry as they relate to law, regulation, licensure, and constitutional questions of case and statutory authority.This bookdescribes the legal requirements facedin the area of private security.It emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency.The textalso examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that will set pace for future private security laws and regulations. As private security becomes more closely involved in national and international security, cases like Blackwater are examined. Charles Nemeth takesyou step by step through the analysis of case law as it applies to situations commonly faced in the private security practice, providing a solid introduction to the legal and ethical standards that shape the industry.

*Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"

Contemporary Security Management (Hardcover, 3rd edition): John Fay Contemporary Security Management (Hardcover, 3rd edition)
John Fay
R1,479 Discovery Miles 14 790 Ships in 10 - 15 working days

"Contemporary Security Management, 3rd Edition "teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management.
Comprehensive introduction to security and IT security management principlesDiscussion of both public and private sector roles, as well as the increasingly common privatizing of government functionsNew experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter

One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Hardcover): Simon... One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Hardcover)
Simon Chesterman
R1,485 Discovery Miles 14 850 Ships in 10 - 15 working days

What limits, if any, should be placed on a government's efforts to spy on its citizens in the name of national security? Spying on foreigners has long been regarded as an unseemly but necessary enterprise. Spying on one's own citizens in a democracy, by contrast, has historically been subject to various forms of legal and political restraint. For most of the twentieth century these regimes were kept distinct. That position is no longer tenable. Modern threats do not respect national borders. Changes in technology make it impractical to distinguish between 'foreign' and 'local' communications. And our culture is progressively reducing the sphere of activity that citizens can reasonably expect to be kept from government eyes. The main casualty of this transformed environment will be privacy. Recent battles over privacy have been dominated by fights over warrantless electronic surveillance and CCTV; the coming years will see debates over DNA databases, data mining, and biometric identification. There will be protests and lawsuits, editorials and elections resisting these attacks on privacy. Those battles are worthy. But the war will be lost. Modern threats increasingly require that governments collect such information, governments are increasingly able to collect it, and citizens increasingly accept that they will collect it. This book proposes a move away from questions of whether governments should collect information and onto more problematic and relevant questions concerning its use. By reframing the relationship between privacy and security in the language of a social contract, mediated by a citizenry who are active participants rather than passive targets, the book offers a framework to defend freedom without sacrificing liberty.

How Safe Are Our Skies? - Assessing the Airlines' Response to Terrorism (Hardcover): Rodney Wallis How Safe Are Our Skies? - Assessing the Airlines' Response to Terrorism (Hardcover)
Rodney Wallis
R1,438 Discovery Miles 14 380 Ships in 10 - 15 working days

The September 11, 2001, attacks on the World Trade Center and the Pentagon raised numerous questions about American and international aviation security. Former Director of Security of the International Air Transport Association Rodney Wallis suggests that the failure to maximize U.S. domestic air security, which left air travelers vulnerable to attack, lay largely with the carriers themselves. He contends that future policies should parallel the standards of the International Civil Aviation Organization. Wallis considers the Aviation and Transportation Security Act adopted by the U.S. Congress in the wake of September 11 and offers a modus operandi to the FAA that would enable them to maximize the benefits this legislation provides to air travelers.

This important work reviews past government reactions to the threat posed by air terrorism and questions whether these were effective responses or merely window dressing. It also includes practical advice for air travelers on how to maximize their own security when flying on international routes by monitoring airport and airline security for themselves.

The Privatization of Police in America - An Analysis and Case Study (Paperback): James F. Pastor The Privatization of Police in America - An Analysis and Case Study (Paperback)
James F. Pastor
R914 R680 Discovery Miles 6 800 Save R234 (26%) Ships in 10 - 15 working days

Today the private security industry employs approximately 1.5 million people and spends over USD52 billion annually. In contrast, public police forces employ approximately 600,000 people and spend USD30 billion annually. Private policing promises to be a big part of the response to today's increased security concerns, as citizens realize that security is much more than the presence of guards and the perception of safety. This book addresses the impact and implications of private policing on public streets, and begins with a look at private policing from conceptual, historical, economic, legal and functional perspectives. These approaches provide the background for the text, which focuses on a private policing patrol program in a community on the south side of Chicago. The text also demonstrates a number of substantive legal and public policy issues which directly or indirectly relate to the provision of security services; some people see the need for a ""dual system"" of policing - one for the wealthy and one for the poor - and others see the provision of private security as the primary protective resource in contemporary America. The author also examines how private policing is different from and similar to public policing.

The Handbook of Security (Hardcover): Martin Gill The Handbook of Security (Hardcover)
Martin Gill
R4,362 Discovery Miles 43 620 Ships in 10 - 15 working days

"The Handbook of Security "is essential reading for all those engaged with the security world. This in-depth book collates the best research available for the security academic and professional. The book is divided into five parts. It begins with the study of security as a discipline, assessing the contribution made by different subject areas to the study of security. The second part looks as crime in organizations. The third part analyzes the various sub-sectors of security. A section on management issues precedes the final section looking at a mage of issues that impact on security.

Security Intelligence Services in New Democracies - The Czech Republic, Slovakia and Romania (Hardcover, New title): K.... Security Intelligence Services in New Democracies - The Czech Republic, Slovakia and Romania (Hardcover, New title)
K. Williams, D. Deletant
R1,418 Discovery Miles 14 180 Ships in 18 - 22 working days

The first account of the secret police in Eastern Europe after 1989, this book uses a wide range of sources, including archives, to identify what has and has not changed since the end of Communism. After explaining the structure and workings of two of the area's most feared services, Czechoslovakia's StB and Romania's Securitate, the authors detail the creation of new security intelligence institutions, the development of contacts with the West, and forms of democratic control.

Computational Intelligence for Cybersecurity Management and Applications (Hardcover): Yassine Maleh, Mamoun Alazab, Soufyane... Computational Intelligence for Cybersecurity Management and Applications (Hardcover)
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
R3,430 Discovery Miles 34 300 Ships in 9 - 17 working days

1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.

Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback): Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback)
Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee
R1,064 Discovery Miles 10 640 Ships in 9 - 17 working days

* Offers context while providing a coherent, applied overview of a wide range of suspect vulnerabilities and how to address them when interviewing * Serves as a practical guide to interviewing vulnerable suspects for both uniform police and detectives. * The only book on interviewing vulnerable suspects that includes the most up-to-date legal considerations and challenges of modern society

Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition)
Nick Catrantzos
R3,852 R3,296 Discovery Miles 32 960 Save R556 (14%) Ships in 9 - 17 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

Managing Privacy through Accountability (Hardcover): D. Guagnin, L. Hempel Managing Privacy through Accountability (Hardcover)
D. Guagnin, L. Hempel; Carla Ilten, Inga Kroener, Daniel Neyland, …
R2,665 Discovery Miles 26 650 Ships in 18 - 22 working days

Draws together contributions from leading figures in the field of surveillance to engage in the discussion of the emergence of accountability as a means to manage threats to privacy. The first of its kind to enrich the debate about accountability and privacy by drawing together perspectives from experienced privacy researchers and policy makers.

Geospatial Technologies and Homeland Security - Research Frontiers and Future Challenges (Hardcover, 2008 ed.): Daniel Sui Geospatial Technologies and Homeland Security - Research Frontiers and Future Challenges (Hardcover, 2008 ed.)
Daniel Sui
R4,219 Discovery Miles 42 190 Ships in 18 - 22 working days

Homeland security and context In the Geographical Dimensions of Terrorism (GDOT) (Cutter et al. 2003), the first book after 9/11 to address homeland security and geography, we developed several thematic research agendas and explored intersections between geographic research and the importance of context, both geographical and political, in relationship to the concepts of terrorism and security. It is good to see that a great deal of new thought and research continues to flow from that initial research agenda, as illustrated by many of the papers of this new book, entitled Geospatial Technologies and Homeland Security: Research Frontiers and Future Challenges. Context is relevant not only to understanding homeland security issues broadly, but also to the conduct of research on geospatial technologies. It is impossible to understand the implications of a homeland security strategy, let alone hope to make predictions, conduct meaningful modeling and research, or assess the value and dangers of geospatial technologies, without consideration of overarching political, social, economic, and geographic contexts within which these questions are posed.

Bounty Hunters, Marshals, and Sheriffs - Forward to the Past (Hardcover, New): Jacqueline Pope Bounty Hunters, Marshals, and Sheriffs - Forward to the Past (Hardcover, New)
Jacqueline Pope
R2,218 R2,049 Discovery Miles 20 490 Save R169 (8%) Ships in 10 - 15 working days

Sheriffs, marshals, and bounty hunters are remembered as relics of our Wild West past. Pope looks at these agents of the law who operate outside police departments, particularly their roles in urban areas. She examines reasons for becoming a sheriff, marshal (usually appointed and not elected), or bounty hunter, as well as employment requirements, responsibilities, and relationships with local police and city officials. Pope argues ultimately that these law enforcers, to a much greater degree than the police, threaten low-income people. Urban sheriffs do not make arrests, but rather serve summonses, track down scofflaws, and confiscate property. Marshals carry out evictions. Bounty hunters are usually armed and work often in urban areas, hunting down wanted persons for a variety of crimes. Although they are not policemen, they are authorized to capture people and can do so without the restrictions imposed on traditional law enforcement officers. Pope focuses her attention on sheriffs, marshals, and bounty hunters in Arizona, New Jersey, New Mexico and New York. She examines their activities in the nineteenth century and today, providing interviews with sheriffs, marshals, bounty hunters, policemen, and with people who have been pursued by them. A work of interest to students, researchers, and citizens concerned with the workings of the U.S. criminal justice system.

Making Public Places Safer - Surveillance and Crime Prevention (Hardcover): Brandon C. Welsh, David P. Farrington Making Public Places Safer - Surveillance and Crime Prevention (Hardcover)
Brandon C. Welsh, David P. Farrington
R1,181 Discovery Miles 11 810 Ships in 10 - 15 working days

The United Kingdom has more than 4.2 million public closed-circuit television (CCTV) cameras-one for every fourteen citizens. Across the United States, hundreds of video surveillance systems are being installed in town centers, public transportation facilities, and schools at a cost exceeding $100 million annually. And now other Western countries have begun to experiment with CCTV to prevent crime in public places. In light of this expansion and the associated public expenditure, as well as pressing concerns about privacy rights, there is an acute need for an evidence-based approach to inform policy and practice.
Drawing on the highest-quality research, criminologists Brandon C. Welsh and David P. Farrington assess the effectiveness and social costs of not only CCTV, but also of other important surveillance methods to prevent crime in public space, such as improved street lighting, security guards, place managers, and defensible space. Importantly, the book goes beyond the question of "Does it work?" and examines the specific conditions and contexts under which these surveillance methods may have an effect on crime as well as the mechanisms that bring about a reduction in crime.
At a time when cities need cost-effective methods to fight crime and the public gradually awakens to the burdens of sacrificing their privacy and civil rights for security, Welsh and Farrington provide this timely and reliable guide to the most effective and non-invasive uses of surveillance to make public places safer from crime.

Introduction to Terrorism (Hardcover): David H. McElreath, Carl J. Jensen, Michael Wigginton, Chester L. Quarles, Stephen... Introduction to Terrorism (Hardcover)
David H. McElreath, Carl J. Jensen, Michael Wigginton, Chester L. Quarles, Stephen Mallory
R2,293 Discovery Miles 22 930 Ships in 10 - 15 working days

It can take the form of a Molotov Cocktail or a Suicide Bomber detonating within a crowd. It can be a sophisticated electronic explosive device or a bomb in a shoe. Today's terrorism threats, and their constant assault on global security continues to be a menace of great concern.

Providing a hands-on look inside the ugly, blood-stained world of global terrorism, Introduction to Terrorism covers the evolution of terrorism, its growing sophistication, and its cynical indifference to human life. It begins by covering the history of terrorism and showing how the threats have changed since the September 11, 2001 attacks. It examines the methods America has chosen to guard against and deal with these threats using its military, government, and civilian agencies.

Illustrating and examining current and future challenges, this state-of-the-art text follows a flow model developed and successfully taught in the classroom at several colleges and universities. Designed to follow the standard academic semester (one chapter per week), the book's content, style, presentation, and organization have been class-tested and validated.

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback)
Alan Tang
R1,329 Discovery Miles 13 290 Ships in 10 - 15 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Cognitive Risk (Paperback): James Bone, Jessie H Lee Cognitive Risk (Paperback)
James Bone, Jessie H Lee
R1,110 Discovery Miles 11 100 Ships in 9 - 17 working days

Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.

Theorizing Surveillance (Paperback): David Lyon Theorizing Surveillance (Paperback)
David Lyon
R1,402 Discovery Miles 14 020 Ships in 10 - 15 working days

This book is about explaining surveillance processes and practices in contemporary society. Surveillance studies is a relatively new multi-disciplinary enterprise that aims to understand who watches who, how the watched participate in and sometimes question their surveillance, why surveillance occurs, and with what effects. This book brings together some of the world's leading surveillance scholars to discuss the "why" question. The field has been dominated, since the groundbreaking work of Michel Foucault, by the idea of the panopticon and this book explores why this metaphor has been central to discussions of surveillance, what is fruitful in the panoptic approach, and what other possible approaches can throw better light on the phenomena in question. Since the advent of networked computer databases, and especially since 9/11, questions of surveillance have come increasingly to the forefront of democratic, political, and policy debates in the global north (and to an extent in the glo

Global Surveillance and Policing - Borders, security, identity (Paperback, Illustrated Ed): Elia Zureik, Mark Salter Global Surveillance and Policing - Borders, security, identity (Paperback, Illustrated Ed)
Elia Zureik, Mark Salter
R1,297 Discovery Miles 12 970 Ships in 10 - 15 working days

Since the 9.11 attacks in North America and the accession of the Schengen Accord in Europe there has been widespread concern with international borders, the passage of people and the flow of information across borders. States have fundamentally changed the ways in which they police and monitor this mobile population and its personal data. This book brings together leading authorities in the field who have been working on the common problem of policing and surveillance at physical and virtual borders at a time of increased perceived threat. It is concerned with both theoretical and empirical aspects of the ways in which the modern state attempts to control its borders and mobile population. It will be essential reading for students, practitioners, policy makers.

Nonproliferation Issues For Weapons of Mass Destruction (Hardcover): Mark A. Prelas, Michael Peck Nonproliferation Issues For Weapons of Mass Destruction (Hardcover)
Mark A. Prelas, Michael Peck
R5,623 Discovery Miles 56 230 Ships in 10 - 15 working days

Nonproliferation Issues for Weapons of Mass Destruction provides an understanding of WMD proliferation risks by bridging complex technical and political issues. The text begins by defining the world conditions that foster proliferation, followed by an analysis of characteristics of various classes of WMDs, including nuclear, biological, and chemical weapons. It then explores the effectiveness of arms control, discussing current nonproliferation problems, nonproliferation prior to the fall of the USSR, and weapons safeguards.
The book analyzes the future of these weapons, discussing delivery systems and potential use by states, terrorist groups, and individuals. The text concludes with a discussion of what can be done to limit the impact of WMDs. This volume enables a realistic understanding of the relative risks that WMDs present to our way of life.

Managing A Network Vulnerability Assessment (Paperback, illustrated edition): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Paperback, illustrated edition)
Thomas R. Peltier, Justin Peltier, John A Blackley
R2,607 Discovery Miles 26 070 Ships in 10 - 15 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.

Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Auditing Corporate Surveillance Systems - Research Methods for Greater Transparency (Hardcover, New Ed): Isabel Wagner Auditing Corporate Surveillance Systems - Research Methods for Greater Transparency (Hardcover, New Ed)
Isabel Wagner
R2,064 R1,749 Discovery Miles 17 490 Save R315 (15%) Ships in 10 - 15 working days

News headlines about privacy invasions, discrimination, and biases discovered in the platforms of big technology companies are commonplace today, and big tech's reluctance to disclose how they operate counteracts ideals of transparency, openness, and accountability. This book is for computer science students and researchers who want to study big tech's corporate surveillance from an experimental, empirical, or quantitative point of view and thereby contribute to holding big tech accountable. As a comprehensive technical resource, it guides readers through the corporate surveillance landscape and describes in detail how corporate surveillance works, how it can be studied experimentally, and what existing studies have found. It provides a thorough foundation in the necessary research methods and tools, and introduces the current research landscape along with a wide range of open issues and challenges. The book also explains how to consider ethical issues and how to turn research results into real-world change.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Silent Weapons for Quiet Wars - An…
Anonymous Hardcover R592 R536 Discovery Miles 5 360
Tell Me Everything - The Story of a…
Erika Krouse Paperback R443 Discovery Miles 4 430
Model Security Policies, Plans and…
John Fay Paperback R1,675 Discovery Miles 16 750
Journalism and the Nsa Revelations…
Adrienne Russell, Risto Kunelius, … Hardcover R3,655 Discovery Miles 36 550
Risk Management for Security…
Carl Roper Hardcover R1,849 Discovery Miles 18 490
Security Consulting
Charles A. Sennewald Paperback R1,107 Discovery Miles 11 070
Gender and Private Security in Global…
Maya Eichler Hardcover R3,575 Discovery Miles 35 750
The Complete Guide for CPP Examination…
Anthony V. DiSalvatore (CPP, PSP & PCI) Paperback R1,160 Discovery Miles 11 600
The Enforcers - Inside Cape Town's…
Caryn Dolley Paperback  (1)
R295 R264 Discovery Miles 2 640
The Security Leader's Communication…
Jeffrey W. Brown Hardcover R2,054 Discovery Miles 20 540

 

Partners