0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (6)
  • R250 - R500 (40)
  • R500+ (376)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

European Security Law (Hardcover, New): Martin Trybus, Nigel White European Security Law (Hardcover, New)
Martin Trybus, Nigel White
R2,565 Discovery Miles 25 650 Ships in 10 - 15 working days

There have been a number of EU military operations in the last few years, evidence of a growing European military confidence, which in turn is a reflection of a developing competence in security matters. The creation of the European Union and its Common Foreign and Security Policy by the Maastricht Treaty of 1992 heralded this development, though the idea of a common defense can be traced to the beginnings of European integration. This book provides an analysis of the EU's evolving legal framework and powers on such matters, but it also recognizes that such a framework sits, sometimes uneasily, within the wider body of EU and International Law. The EU's security and defense policy also overlaps with those of other organizations such as the Organization for Security and Cooperation in Europe (OSCE), but more especially the North Atlantic Treaty Organization (NATO). EU relations with NATO have, in particular, caused some concern and are still evolving as both organizations seek to play a wider security role in the post-Cold War, and now post-9/11, era. With security now dominating political agendas at the domestic, regional and international levels, it is no surprise that the EU's concern for security has grown, and, following the Union's respect for the rule of law, has been shaped legally as well as politically. This book evaluates the progress of the Union in this regard in its international context and in its wider context of European integration generally. The analysis is in the main a legal one, but is placed squarely within wider historical and political perspectives.

Effective Physical Security (Paperback, 4th edition): Lawrence Fennelly Effective Physical Security (Paperback, 4th edition)
Lawrence Fennelly
R1,317 Discovery Miles 13 170 Ships in 10 - 15 working days

"Effective Physical Security, " Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors work that set the standard: "Handbook of Loss Prevention and Crime Prevention, " Fifth Edition.

Designed for easy reference, "Effective Physical Security" contains important coverage of environmental design, security surveys, locks, lighting, and CCTV as well as new chapters covering the latest in the ISO standards for Risk Assessmentand Risk Management, physical security planning, network systems infrastructure, and environmental design. This new edition continues to serve as a valuable reference for experienced security practitioners as well as students in undergraduate and graduate security programs.
Required reading for the ASIS Physical Security Professional Certification (PSP) and recommended reading for the CPP certification Provides detailed coverage of Physical Security in an easily accessible reference format with content divided into three major parts: Design, Equipment, and Operations Each chapter is written by a recognized expert security specialist "

The Right to Privacy (Hardcover): Samuel D. Warren, Louis D. Brandeis The Right to Privacy (Hardcover)
Samuel D. Warren, Louis D. Brandeis; Foreword by Steven Alan Childress
R540 Discovery Miles 5 400 Ships in 18 - 22 working days
Private Security and the Law (Hardcover, 4th edition): Charles Nemeth Private Security and the Law (Hardcover, 4th edition)
Charles Nemeth
R1,440 Discovery Miles 14 400 Ships in 10 - 15 working days

"Private Security and the Law, 4th Edition," is a unique resource that provides analysis of practices in the security industry as they relate to law, regulation, licensure, and constitutional questions of case and statutory authority.This bookdescribes the legal requirements facedin the area of private security.It emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency.The textalso examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that will set pace for future private security laws and regulations. As private security becomes more closely involved in national and international security, cases like Blackwater are examined. Charles Nemeth takesyou step by step through the analysis of case law as it applies to situations commonly faced in the private security practice, providing a solid introduction to the legal and ethical standards that shape the industry.

*Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"

The Complete Q-anon - Q-anon, Summarized, Analyzed, and With a Firsthand Account of Cabal's Ground Intelligence Operations... The Complete Q-anon - Q-anon, Summarized, Analyzed, and With a Firsthand Account of Cabal's Ground Intelligence Operations (Hardcover)
Anonymous Conservative
R815 Discovery Miles 8 150 Ships in 10 - 15 working days
One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Hardcover): Simon... One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Hardcover)
Simon Chesterman
R1,485 Discovery Miles 14 850 Ships in 10 - 15 working days

What limits, if any, should be placed on a government's efforts to spy on its citizens in the name of national security? Spying on foreigners has long been regarded as an unseemly but necessary enterprise. Spying on one's own citizens in a democracy, by contrast, has historically been subject to various forms of legal and political restraint. For most of the twentieth century these regimes were kept distinct. That position is no longer tenable. Modern threats do not respect national borders. Changes in technology make it impractical to distinguish between 'foreign' and 'local' communications. And our culture is progressively reducing the sphere of activity that citizens can reasonably expect to be kept from government eyes. The main casualty of this transformed environment will be privacy. Recent battles over privacy have been dominated by fights over warrantless electronic surveillance and CCTV; the coming years will see debates over DNA databases, data mining, and biometric identification. There will be protests and lawsuits, editorials and elections resisting these attacks on privacy. Those battles are worthy. But the war will be lost. Modern threats increasingly require that governments collect such information, governments are increasingly able to collect it, and citizens increasingly accept that they will collect it. This book proposes a move away from questions of whether governments should collect information and onto more problematic and relevant questions concerning its use. By reframing the relationship between privacy and security in the language of a social contract, mediated by a citizenry who are active participants rather than passive targets, the book offers a framework to defend freedom without sacrificing liberty.

How Safe Are Our Skies? - Assessing the Airlines' Response to Terrorism (Hardcover): Rodney Wallis How Safe Are Our Skies? - Assessing the Airlines' Response to Terrorism (Hardcover)
Rodney Wallis
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

The September 11, 2001, attacks on the World Trade Center and the Pentagon raised numerous questions about American and international aviation security. Former Director of Security of the International Air Transport Association Rodney Wallis suggests that the failure to maximize U.S. domestic air security, which left air travelers vulnerable to attack, lay largely with the carriers themselves. He contends that future policies should parallel the standards of the International Civil Aviation Organization. Wallis considers the Aviation and Transportation Security Act adopted by the U.S. Congress in the wake of September 11 and offers a modus operandi to the FAA that would enable them to maximize the benefits this legislation provides to air travelers.

This important work reviews past government reactions to the threat posed by air terrorism and questions whether these were effective responses or merely window dressing. It also includes practical advice for air travelers on how to maximize their own security when flying on international routes by monitoring airport and airline security for themselves.

The Privatization of Police in America - An Analysis and Case Study (Paperback): James F. Pastor The Privatization of Police in America - An Analysis and Case Study (Paperback)
James F. Pastor
R914 R680 Discovery Miles 6 800 Save R234 (26%) Ships in 10 - 15 working days

Today the private security industry employs approximately 1.5 million people and spends over USD52 billion annually. In contrast, public police forces employ approximately 600,000 people and spend USD30 billion annually. Private policing promises to be a big part of the response to today's increased security concerns, as citizens realize that security is much more than the presence of guards and the perception of safety. This book addresses the impact and implications of private policing on public streets, and begins with a look at private policing from conceptual, historical, economic, legal and functional perspectives. These approaches provide the background for the text, which focuses on a private policing patrol program in a community on the south side of Chicago. The text also demonstrates a number of substantive legal and public policy issues which directly or indirectly relate to the provision of security services; some people see the need for a ""dual system"" of policing - one for the wealthy and one for the poor - and others see the provision of private security as the primary protective resource in contemporary America. The author also examines how private policing is different from and similar to public policing.

The Stasi - Myth and Reality (Paperback): Mike Dennis, Norman Laporte The Stasi - Myth and Reality (Paperback)
Mike Dennis, Norman Laporte
R1,844 Discovery Miles 18 440 Ships in 10 - 15 working days

A study of the powerful and much-feared East German Ministry of State Security from its establishment in 1950 to its fall in 1990.

The Stasi was a central institution of the GDR, and this book illuminates the nature and operation of the entire East German regime, addressing one of the most important topics in modern German history. The emphasis is primarily on the key years under Erich Honecker, who was Head of State from 1976 and ousted in 1989. The book looks at all aspects of the control, operation and impact of the security police, their methods, targets, structure, accountability, and in particular the crucial question of how far they were an arm of the ruling communist party or were themselves a virtually autonomous political actor.

The Handbook of Security (Hardcover): Martin Gill The Handbook of Security (Hardcover)
Martin Gill
R4,362 Discovery Miles 43 620 Ships in 10 - 15 working days

"The Handbook of Security "is essential reading for all those engaged with the security world. This in-depth book collates the best research available for the security academic and professional. The book is divided into five parts. It begins with the study of security as a discipline, assessing the contribution made by different subject areas to the study of security. The second part looks as crime in organizations. The third part analyzes the various sub-sectors of security. A section on management issues precedes the final section looking at a mage of issues that impact on security.

Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback): Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback)
Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee
R1,009 Discovery Miles 10 090 Ships in 9 - 17 working days

* Offers context while providing a coherent, applied overview of a wide range of suspect vulnerabilities and how to address them when interviewing * Serves as a practical guide to interviewing vulnerable suspects for both uniform police and detectives. * The only book on interviewing vulnerable suspects that includes the most up-to-date legal considerations and challenges of modern society

Security Intelligence Services in New Democracies - The Czech Republic, Slovakia and Romania (Hardcover, New title): K.... Security Intelligence Services in New Democracies - The Czech Republic, Slovakia and Romania (Hardcover, New title)
K. Williams, D. Deletant
R1,418 Discovery Miles 14 180 Ships in 18 - 22 working days

The first account of the secret police in Eastern Europe after 1989, this book uses a wide range of sources, including archives, to identify what has and has not changed since the end of Communism. After explaining the structure and workings of two of the area's most feared services, Czechoslovakia's StB and Romania's Securitate, the authors detail the creation of new security intelligence institutions, the development of contacts with the West, and forms of democratic control.

Computational Intelligence for Cybersecurity Management and Applications (Hardcover): Yassine Maleh, Mamoun Alazab, Soufyane... Computational Intelligence for Cybersecurity Management and Applications (Hardcover)
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
R3,153 Discovery Miles 31 530 Ships in 9 - 17 working days

1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.

Managing Privacy through Accountability (Hardcover): D. Guagnin, L. Hempel Managing Privacy through Accountability (Hardcover)
D. Guagnin, L. Hempel; Carla Ilten, Inga Kroener, Daniel Neyland, …
R2,665 Discovery Miles 26 650 Ships in 18 - 22 working days

Draws together contributions from leading figures in the field of surveillance to engage in the discussion of the emergence of accountability as a means to manage threats to privacy. The first of its kind to enrich the debate about accountability and privacy by drawing together perspectives from experienced privacy researchers and policy makers.

Geospatial Technologies and Homeland Security - Research Frontiers and Future Challenges (Hardcover, 2008 ed.): Daniel Sui Geospatial Technologies and Homeland Security - Research Frontiers and Future Challenges (Hardcover, 2008 ed.)
Daniel Sui
R4,219 Discovery Miles 42 190 Ships in 18 - 22 working days

Homeland security and context In the Geographical Dimensions of Terrorism (GDOT) (Cutter et al. 2003), the first book after 9/11 to address homeland security and geography, we developed several thematic research agendas and explored intersections between geographic research and the importance of context, both geographical and political, in relationship to the concepts of terrorism and security. It is good to see that a great deal of new thought and research continues to flow from that initial research agenda, as illustrated by many of the papers of this new book, entitled Geospatial Technologies and Homeland Security: Research Frontiers and Future Challenges. Context is relevant not only to understanding homeland security issues broadly, but also to the conduct of research on geospatial technologies. It is impossible to understand the implications of a homeland security strategy, let alone hope to make predictions, conduct meaningful modeling and research, or assess the value and dangers of geospatial technologies, without consideration of overarching political, social, economic, and geographic contexts within which these questions are posed.

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback)
Alan Tang
R1,329 Discovery Miles 13 290 Ships in 10 - 15 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Cognitive Risk (Paperback): James Bone, Jessie H Lee Cognitive Risk (Paperback)
James Bone, Jessie H Lee
R1,074 Discovery Miles 10 740 Ships in 10 - 15 working days

Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.

Bounty Hunters, Marshals, and Sheriffs - Forward to the Past (Hardcover, New): Jacqueline Pope Bounty Hunters, Marshals, and Sheriffs - Forward to the Past (Hardcover, New)
Jacqueline Pope
R2,049 Discovery Miles 20 490 Ships in 18 - 22 working days

Sheriffs, marshals, and bounty hunters are remembered as relics of our Wild West past. Pope looks at these agents of the law who operate outside police departments, particularly their roles in urban areas. She examines reasons for becoming a sheriff, marshal (usually appointed and not elected), or bounty hunter, as well as employment requirements, responsibilities, and relationships with local police and city officials. Pope argues ultimately that these law enforcers, to a much greater degree than the police, threaten low-income people. Urban sheriffs do not make arrests, but rather serve summonses, track down scofflaws, and confiscate property. Marshals carry out evictions. Bounty hunters are usually armed and work often in urban areas, hunting down wanted persons for a variety of crimes. Although they are not policemen, they are authorized to capture people and can do so without the restrictions imposed on traditional law enforcement officers. Pope focuses her attention on sheriffs, marshals, and bounty hunters in Arizona, New Jersey, New Mexico and New York. She examines their activities in the nineteenth century and today, providing interviews with sheriffs, marshals, bounty hunters, policemen, and with people who have been pursued by them. A work of interest to students, researchers, and citizens concerned with the workings of the U.S. criminal justice system.

Making Public Places Safer - Surveillance and Crime Prevention (Hardcover): Brandon C. Welsh, David P. Farrington Making Public Places Safer - Surveillance and Crime Prevention (Hardcover)
Brandon C. Welsh, David P. Farrington
R1,181 Discovery Miles 11 810 Ships in 10 - 15 working days

The United Kingdom has more than 4.2 million public closed-circuit television (CCTV) cameras-one for every fourteen citizens. Across the United States, hundreds of video surveillance systems are being installed in town centers, public transportation facilities, and schools at a cost exceeding $100 million annually. And now other Western countries have begun to experiment with CCTV to prevent crime in public places. In light of this expansion and the associated public expenditure, as well as pressing concerns about privacy rights, there is an acute need for an evidence-based approach to inform policy and practice.
Drawing on the highest-quality research, criminologists Brandon C. Welsh and David P. Farrington assess the effectiveness and social costs of not only CCTV, but also of other important surveillance methods to prevent crime in public space, such as improved street lighting, security guards, place managers, and defensible space. Importantly, the book goes beyond the question of "Does it work?" and examines the specific conditions and contexts under which these surveillance methods may have an effect on crime as well as the mechanisms that bring about a reduction in crime.
At a time when cities need cost-effective methods to fight crime and the public gradually awakens to the burdens of sacrificing their privacy and civil rights for security, Welsh and Farrington provide this timely and reliable guide to the most effective and non-invasive uses of surveillance to make public places safer from crime.

Introduction to Terrorism (Hardcover): David H. McElreath, Carl J. Jensen, Michael Wigginton, Chester L. Quarles, Stephen... Introduction to Terrorism (Hardcover)
David H. McElreath, Carl J. Jensen, Michael Wigginton, Chester L. Quarles, Stephen Mallory
R2,311 R2,180 Discovery Miles 21 800 Save R131 (6%) Ships in 10 - 15 working days

It can take the form of a Molotov Cocktail or a Suicide Bomber detonating within a crowd. It can be a sophisticated electronic explosive device or a bomb in a shoe. Today's terrorism threats, and their constant assault on global security continues to be a menace of great concern.

Providing a hands-on look inside the ugly, blood-stained world of global terrorism, Introduction to Terrorism covers the evolution of terrorism, its growing sophistication, and its cynical indifference to human life. It begins by covering the history of terrorism and showing how the threats have changed since the September 11, 2001 attacks. It examines the methods America has chosen to guard against and deal with these threats using its military, government, and civilian agencies.

Illustrating and examining current and future challenges, this state-of-the-art text follows a flow model developed and successfully taught in the classroom at several colleges and universities. Designed to follow the standard academic semester (one chapter per week), the book's content, style, presentation, and organization have been class-tested and validated.

Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition)
Nick Catrantzos
R3,582 R3,071 Discovery Miles 30 710 Save R511 (14%) Ships in 9 - 17 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

Access Rules - Freeing Data from Big Tech for a Better Future (Hardcover): Viktor Mayer-Schoenberger, Thomas Ramge Access Rules - Freeing Data from Big Tech for a Better Future (Hardcover)
Viktor Mayer-Schoenberger, Thomas Ramge
R556 Discovery Miles 5 560 Ships in 10 - 15 working days

A powerful and urgent call to action: to improve our lives and our societies, we must demand open access to data for all. Information is power, and the time is now for digital liberation. Access Rules mounts a strong and hopeful argument for how informational tools at present in the hands of a few could instead become empowering machines for everyone. By forcing data-hoarding companies to open access to their data, we can reinvigorate both our economy and our society. Authors Viktor Mayer-Schoenberger and Thomas Ramge contend that if we disrupt monopoly power and create a level playing field, digital innovations can emerge to benefit us all. Over the past twenty years, Big Tech has managed to centralize the most relevant data on their servers, as data has become the most important raw material for innovation. However, dominant oligopolists like Facebook, Amazon, and Google, in contrast with their reputation as digital pioneers, are actually slowing down innovation and progress by withholding data for the benefit of their shareholders--at the expense of customers, the economy, and society. As Access Rules compellingly argues, ultimately it is up to us to force information giants, wherever they are located, to open their treasure troves of data to others. In order for us to limit global warming, contain a virus like COVID-19, or successfully fight poverty, everyone-including citizens and scientists, start-ups and established companies, as well as the public sector and NGOs-must have access to data. When everyone has access to the informational riches of the data age, the nature of digital power will change. Information technology will find its way back to its original purpose: empowering all of us to use information so we can thrive as individuals and as societies.

Theorizing Surveillance (Paperback): David Lyon Theorizing Surveillance (Paperback)
David Lyon
R1,318 Discovery Miles 13 180 Ships in 10 - 15 working days

This book is about explaining surveillance processes and practices in contemporary society. Surveillance studies is a relatively new multi-disciplinary enterprise that aims to understand who watches who, how the watched participate in and sometimes question their surveillance, why surveillance occurs, and with what effects. This book brings together some of the world's leading surveillance scholars to discuss the "why" question. The field has been dominated, since the groundbreaking work of Michel Foucault, by the idea of the panopticon and this book explores why this metaphor has been central to discussions of surveillance, what is fruitful in the panoptic approach, and what other possible approaches can throw better light on the phenomena in question. Since the advent of networked computer databases, and especially since 9/11, questions of surveillance have come increasingly to the forefront of democratic, political, and policy debates in the global north (and to an extent in the glo

Global Surveillance and Policing - Borders, security, identity (Paperback, Illustrated Ed): Elia Zureik, Mark Salter Global Surveillance and Policing - Borders, security, identity (Paperback, Illustrated Ed)
Elia Zureik, Mark Salter
R1,241 Discovery Miles 12 410 Ships in 10 - 15 working days

Since the 9.11 attacks in North America and the accession of the Schengen Accord in Europe there has been widespread concern with international borders, the passage of people and the flow of information across borders. States have fundamentally changed the ways in which they police and monitor this mobile population and its personal data. This book brings together leading authorities in the field who have been working on the common problem of policing and surveillance at physical and virtual borders at a time of increased perceived threat. It is concerned with both theoretical and empirical aspects of the ways in which the modern state attempts to control its borders and mobile population. It will be essential reading for students, practitioners, policy makers.

Nonproliferation Issues For Weapons of Mass Destruction (Hardcover): Mark A. Prelas, Michael Peck Nonproliferation Issues For Weapons of Mass Destruction (Hardcover)
Mark A. Prelas, Michael Peck
R5,340 Discovery Miles 53 400 Ships in 10 - 15 working days

Nonproliferation Issues for Weapons of Mass Destruction provides an understanding of WMD proliferation risks by bridging complex technical and political issues. The text begins by defining the world conditions that foster proliferation, followed by an analysis of characteristics of various classes of WMDs, including nuclear, biological, and chemical weapons. It then explores the effectiveness of arms control, discussing current nonproliferation problems, nonproliferation prior to the fall of the USSR, and weapons safeguards.
The book analyzes the future of these weapons, discussing delivery systems and potential use by states, terrorist groups, and individuals. The text concludes with a discussion of what can be done to limit the impact of WMDs. This volume enables a realistic understanding of the relative risks that WMDs present to our way of life.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Silent Weapons for Quiet Wars - An…
Anonymous Hardcover R592 R536 Discovery Miles 5 360
Tell Me Everything - The Story of a…
Erika Krouse Paperback R443 Discovery Miles 4 430
Public Safety and Security…
P J. Ortmeier Paperback R1,435 Discovery Miles 14 350
Security Consulting
Charles A. Sennewald Paperback R1,107 Discovery Miles 11 070
Model Security Policies, Plans and…
John Fay Paperback R1,675 Discovery Miles 16 750
Journalism and the Nsa Revelations…
Adrienne Russell, Risto Kunelius, … Hardcover R3,332 Discovery Miles 33 320
Gender and Private Security in Global…
Maya Eichler Hardcover R3,575 Discovery Miles 35 750
Managing A Network Vulnerability…
Thomas R. Peltier, Justin Peltier, … Paperback R2,465 Discovery Miles 24 650
The Enforcers - Inside Cape Town's…
Caryn Dolley Paperback  (1)
R295 R264 Discovery Miles 2 640
Paranormal Investigation Log - 100 Pages…
Rwg Hardcover R471 Discovery Miles 4 710

 

Partners