![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
There have been a number of EU military operations in the last few years, evidence of a growing European military confidence, which in turn is a reflection of a developing competence in security matters. The creation of the European Union and its Common Foreign and Security Policy by the Maastricht Treaty of 1992 heralded this development, though the idea of a common defense can be traced to the beginnings of European integration. This book provides an analysis of the EU's evolving legal framework and powers on such matters, but it also recognizes that such a framework sits, sometimes uneasily, within the wider body of EU and International Law. The EU's security and defense policy also overlaps with those of other organizations such as the Organization for Security and Cooperation in Europe (OSCE), but more especially the North Atlantic Treaty Organization (NATO). EU relations with NATO have, in particular, caused some concern and are still evolving as both organizations seek to play a wider security role in the post-Cold War, and now post-9/11, era. With security now dominating political agendas at the domestic, regional and international levels, it is no surprise that the EU's concern for security has grown, and, following the Union's respect for the rule of law, has been shaped legally as well as politically. This book evaluates the progress of the Union in this regard in its international context and in its wider context of European integration generally. The analysis is in the main a legal one, but is placed squarely within wider historical and political perspectives.
"Effective Physical Security, " Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors work that set the standard: "Handbook of Loss Prevention and Crime Prevention, " Fifth Edition. Designed for easy reference, "Effective Physical Security"
contains important coverage of environmental design, security
surveys, locks, lighting, and CCTV as well as new chapters covering
the latest in the ISO standards for Risk Assessmentand Risk
Management, physical security planning, network systems
infrastructure, and environmental design. This new edition
continues to serve as a valuable reference for experienced security
practitioners as well as students in undergraduate and graduate
security programs.
"Private Security and the Law, 4th Edition," is a unique
resource that provides analysis of practices in the security
industry as they relate to law, regulation, licensure, and
constitutional questions of case and statutory authority.This
bookdescribes the legal requirements facedin the area of private
security.It emphasizes the liability problems common to security
operations, including negligence and tortious liability, civil
actions frequently litigated, and strategies to avoid legal actions
that affect business efficiency.The textalso examines the
constitutional and due-process dimensions of private security both
domestically and internationally, including recent cases and trends
that will set pace for future private security laws and
regulations. As private security becomes more closely involved in
national and international security, cases like Blackwater are
examined. Charles Nemeth takesyou step by step through the analysis
of case law as it applies to situations commonly faced in the
private security practice, providing a solid introduction to the
legal and ethical standards that shape the industry. *Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"
What limits, if any, should be placed on a government's efforts to spy on its citizens in the name of national security? Spying on foreigners has long been regarded as an unseemly but necessary enterprise. Spying on one's own citizens in a democracy, by contrast, has historically been subject to various forms of legal and political restraint. For most of the twentieth century these regimes were kept distinct. That position is no longer tenable. Modern threats do not respect national borders. Changes in technology make it impractical to distinguish between 'foreign' and 'local' communications. And our culture is progressively reducing the sphere of activity that citizens can reasonably expect to be kept from government eyes. The main casualty of this transformed environment will be privacy. Recent battles over privacy have been dominated by fights over warrantless electronic surveillance and CCTV; the coming years will see debates over DNA databases, data mining, and biometric identification. There will be protests and lawsuits, editorials and elections resisting these attacks on privacy. Those battles are worthy. But the war will be lost. Modern threats increasingly require that governments collect such information, governments are increasingly able to collect it, and citizens increasingly accept that they will collect it. This book proposes a move away from questions of whether governments should collect information and onto more problematic and relevant questions concerning its use. By reframing the relationship between privacy and security in the language of a social contract, mediated by a citizenry who are active participants rather than passive targets, the book offers a framework to defend freedom without sacrificing liberty.
The September 11, 2001, attacks on the World Trade Center and the Pentagon raised numerous questions about American and international aviation security. Former Director of Security of the International Air Transport Association Rodney Wallis suggests that the failure to maximize U.S. domestic air security, which left air travelers vulnerable to attack, lay largely with the carriers themselves. He contends that future policies should parallel the standards of the International Civil Aviation Organization. Wallis considers the Aviation and Transportation Security Act adopted by the U.S. Congress in the wake of September 11 and offers a modus operandi to the FAA that would enable them to maximize the benefits this legislation provides to air travelers. This important work reviews past government reactions to the threat posed by air terrorism and questions whether these were effective responses or merely window dressing. It also includes practical advice for air travelers on how to maximize their own security when flying on international routes by monitoring airport and airline security for themselves.
Today the private security industry employs approximately 1.5 million people and spends over USD52 billion annually. In contrast, public police forces employ approximately 600,000 people and spend USD30 billion annually. Private policing promises to be a big part of the response to today's increased security concerns, as citizens realize that security is much more than the presence of guards and the perception of safety. This book addresses the impact and implications of private policing on public streets, and begins with a look at private policing from conceptual, historical, economic, legal and functional perspectives. These approaches provide the background for the text, which focuses on a private policing patrol program in a community on the south side of Chicago. The text also demonstrates a number of substantive legal and public policy issues which directly or indirectly relate to the provision of security services; some people see the need for a ""dual system"" of policing - one for the wealthy and one for the poor - and others see the provision of private security as the primary protective resource in contemporary America. The author also examines how private policing is different from and similar to public policing.
A study of the powerful and much-feared East German Ministry of State Security from its establishment in 1950 to its fall in 1990. The Stasi was a central institution of the GDR, and this book illuminates the nature and operation of the entire East German regime, addressing one of the most important topics in modern German history. The emphasis is primarily on the key years under Erich Honecker, who was Head of State from 1976 and ousted in 1989. The book looks at all aspects of the control, operation and impact of the security police, their methods, targets, structure, accountability, and in particular the crucial question of how far they were an arm of the ruling communist party or were themselves a virtually autonomous political actor.
"The Handbook of Security "is essential reading for all those
engaged with the security world. This in-depth book collates the
best research available for the security academic and professional.
The book is divided into five parts. It begins with the study of
security as a discipline, assessing the contribution made by
different subject areas to the study of security. The second part
looks as crime in organizations. The third part analyzes the
various sub-sectors of security. A section on management issues
precedes the final section looking at a mage of issues that impact
on security.
* Offers context while providing a coherent, applied overview of a wide range of suspect vulnerabilities and how to address them when interviewing * Serves as a practical guide to interviewing vulnerable suspects for both uniform police and detectives. * The only book on interviewing vulnerable suspects that includes the most up-to-date legal considerations and challenges of modern society
The first account of the secret police in Eastern Europe after 1989, this book uses a wide range of sources, including archives, to identify what has and has not changed since the end of Communism. After explaining the structure and workings of two of the area's most feared services, Czechoslovakia's StB and Romania's Securitate, the authors detail the creation of new security intelligence institutions, the development of contacts with the West, and forms of democratic control.
1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.
Draws together contributions from leading figures in the field of surveillance to engage in the discussion of the emergence of accountability as a means to manage threats to privacy. The first of its kind to enrich the debate about accountability and privacy by drawing together perspectives from experienced privacy researchers and policy makers.
Homeland security and context In the Geographical Dimensions of Terrorism (GDOT) (Cutter et al. 2003), the first book after 9/11 to address homeland security and geography, we developed several thematic research agendas and explored intersections between geographic research and the importance of context, both geographical and political, in relationship to the concepts of terrorism and security. It is good to see that a great deal of new thought and research continues to flow from that initial research agenda, as illustrated by many of the papers of this new book, entitled Geospatial Technologies and Homeland Security: Research Frontiers and Future Challenges. Context is relevant not only to understanding homeland security issues broadly, but also to the conduct of research on geospatial technologies. It is impossible to understand the implications of a homeland security strategy, let alone hope to make predictions, conduct meaningful modeling and research, or assess the value and dangers of geospatial technologies, without consideration of overarching political, social, economic, and geographic contexts within which these questions are posed.
1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.
Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.
Sheriffs, marshals, and bounty hunters are remembered as relics of our Wild West past. Pope looks at these agents of the law who operate outside police departments, particularly their roles in urban areas. She examines reasons for becoming a sheriff, marshal (usually appointed and not elected), or bounty hunter, as well as employment requirements, responsibilities, and relationships with local police and city officials. Pope argues ultimately that these law enforcers, to a much greater degree than the police, threaten low-income people. Urban sheriffs do not make arrests, but rather serve summonses, track down scofflaws, and confiscate property. Marshals carry out evictions. Bounty hunters are usually armed and work often in urban areas, hunting down wanted persons for a variety of crimes. Although they are not policemen, they are authorized to capture people and can do so without the restrictions imposed on traditional law enforcement officers. Pope focuses her attention on sheriffs, marshals, and bounty hunters in Arizona, New Jersey, New Mexico and New York. She examines their activities in the nineteenth century and today, providing interviews with sheriffs, marshals, bounty hunters, policemen, and with people who have been pursued by them. A work of interest to students, researchers, and citizens concerned with the workings of the U.S. criminal justice system.
The United Kingdom has more than 4.2 million public closed-circuit
television (CCTV) cameras-one for every fourteen citizens. Across
the United States, hundreds of video surveillance systems are being
installed in town centers, public transportation facilities, and
schools at a cost exceeding $100 million annually. And now other
Western countries have begun to experiment with CCTV to prevent
crime in public places. In light of this expansion and the
associated public expenditure, as well as pressing concerns about
privacy rights, there is an acute need for an evidence-based
approach to inform policy and practice.
It can take the form of a Molotov Cocktail or a Suicide Bomber detonating within a crowd. It can be a sophisticated electronic explosive device or a bomb in a shoe. Today's terrorism threats, and their constant assault on global security continues to be a menace of great concern. Providing a hands-on look inside the ugly, blood-stained world of global terrorism, Introduction to Terrorism covers the evolution of terrorism, its growing sophistication, and its cynical indifference to human life. It begins by covering the history of terrorism and showing how the threats have changed since the September 11, 2001 attacks. It examines the methods America has chosen to guard against and deal with these threats using its military, government, and civilian agencies. Illustrating and examining current and future challenges, this state-of-the-art text follows a flow model developed and successfully taught in the classroom at several colleges and universities. Designed to follow the standard academic semester (one chapter per week), the book's content, style, presentation, and organization have been class-tested and validated.
* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats
A powerful and urgent call to action: to improve our lives and our societies, we must demand open access to data for all. Information is power, and the time is now for digital liberation. Access Rules mounts a strong and hopeful argument for how informational tools at present in the hands of a few could instead become empowering machines for everyone. By forcing data-hoarding companies to open access to their data, we can reinvigorate both our economy and our society. Authors Viktor Mayer-Schoenberger and Thomas Ramge contend that if we disrupt monopoly power and create a level playing field, digital innovations can emerge to benefit us all. Over the past twenty years, Big Tech has managed to centralize the most relevant data on their servers, as data has become the most important raw material for innovation. However, dominant oligopolists like Facebook, Amazon, and Google, in contrast with their reputation as digital pioneers, are actually slowing down innovation and progress by withholding data for the benefit of their shareholders--at the expense of customers, the economy, and society. As Access Rules compellingly argues, ultimately it is up to us to force information giants, wherever they are located, to open their treasure troves of data to others. In order for us to limit global warming, contain a virus like COVID-19, or successfully fight poverty, everyone-including citizens and scientists, start-ups and established companies, as well as the public sector and NGOs-must have access to data. When everyone has access to the informational riches of the data age, the nature of digital power will change. Information technology will find its way back to its original purpose: empowering all of us to use information so we can thrive as individuals and as societies.
This book is about explaining surveillance processes and practices in contemporary society. Surveillance studies is a relatively new multi-disciplinary enterprise that aims to understand who watches who, how the watched participate in and sometimes question their surveillance, why surveillance occurs, and with what effects. This book brings together some of the world's leading surveillance scholars to discuss the "why" question. The field has been dominated, since the groundbreaking work of Michel Foucault, by the idea of the panopticon and this book explores why this metaphor has been central to discussions of surveillance, what is fruitful in the panoptic approach, and what other possible approaches can throw better light on the phenomena in question. Since the advent of networked computer databases, and especially since 9/11, questions of surveillance have come increasingly to the forefront of democratic, political, and policy debates in the global north (and to an extent in the glo
Since the 9.11 attacks in North America and the accession of the Schengen Accord in Europe there has been widespread concern with international borders, the passage of people and the flow of information across borders. States have fundamentally changed the ways in which they police and monitor this mobile population and its personal data. This book brings together leading authorities in the field who have been working on the common problem of policing and surveillance at physical and virtual borders at a time of increased perceived threat. It is concerned with both theoretical and empirical aspects of the ways in which the modern state attempts to control its borders and mobile population. It will be essential reading for students, practitioners, policy makers.
Nonproliferation Issues for Weapons of Mass Destruction provides an
understanding of WMD proliferation risks by bridging complex
technical and political issues. The text begins by defining the
world conditions that foster proliferation, followed by an analysis
of characteristics of various classes of WMDs, including nuclear,
biological, and chemical weapons. It then explores the
effectiveness of arms control, discussing current nonproliferation
problems, nonproliferation prior to the fall of the USSR, and
weapons safeguards. |
You may like...
Journalism and the Nsa Revelations…
Adrienne Russell, Risto Kunelius, …
Hardcover
R3,332
Discovery Miles 33 320
Managing A Network Vulnerability…
Thomas R. Peltier, Justin Peltier, …
Paperback
R2,465
Discovery Miles 24 650
|