0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (38)
  • R500+ (395)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Dying for an iPhone - Apple, Foxconn and the Lives of China's Workers (Hardcover): Jenny Chan, Mark Selden, Pun Ngai Dying for an iPhone - Apple, Foxconn and the Lives of China's Workers (Hardcover)
Jenny Chan, Mark Selden, Pun Ngai
R2,698 Discovery Miles 26 980 Ships in 10 - 15 working days

Suicides, excessive overtime, hostility and violence on the factory floor in China. Drawing on vivid testimonies from rural migrant workers, student interns, managers and trade union staff, Dying for an iPhone is a devastating expose of two of the world's most powerful companies: Foxconn and Apple. As the leading manufacturer of iPhones, iPads and Kindles, and employing one million workers in China alone, Taiwanese-invested Foxconn's drive to dominate global electronics manufacturing has aligned perfectly with China's goal of becoming the world leader in technology. This book reveals the human cost of that ambition and what our demands for the newest and best technology mean for workers. Foxconn workers have repeatedly demonstrated their power to strike at key nodes of transnational production, challenge management and the Chinese state, and confront global tech behemoths. Dying for an iPhone allows us to assess the impact of global capitalism's deepening crisis on workers.

Censorship, Surveillance, and Privacy - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Censorship, Surveillance, and Privacy - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,702 Discovery Miles 97 020 Ships in 10 - 15 working days
The Right to Privacy (Hardcover): Samuel D. Warren, Louis D. Brandeis The Right to Privacy (Hardcover)
Samuel D. Warren, Louis D. Brandeis; Foreword by Steven Alan Childress
R580 Discovery Miles 5 800 Ships in 10 - 15 working days
Effective Physical Security (Paperback, 4th edition): Lawrence Fennelly Effective Physical Security (Paperback, 4th edition)
Lawrence Fennelly
R1,396 Discovery Miles 13 960 Ships in 12 - 19 working days

"Effective Physical Security, " Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors work that set the standard: "Handbook of Loss Prevention and Crime Prevention, " Fifth Edition.

Designed for easy reference, "Effective Physical Security" contains important coverage of environmental design, security surveys, locks, lighting, and CCTV as well as new chapters covering the latest in the ISO standards for Risk Assessmentand Risk Management, physical security planning, network systems infrastructure, and environmental design. This new edition continues to serve as a valuable reference for experienced security practitioners as well as students in undergraduate and graduate security programs.
Required reading for the ASIS Physical Security Professional Certification (PSP) and recommended reading for the CPP certification Provides detailed coverage of Physical Security in an easily accessible reference format with content divided into three major parts: Design, Equipment, and Operations Each chapter is written by a recognized expert security specialist "

Private Security and the Law (Hardcover, 4th edition): Charles Nemeth Private Security and the Law (Hardcover, 4th edition)
Charles Nemeth
R1,527 Discovery Miles 15 270 Ships in 12 - 19 working days

"Private Security and the Law, 4th Edition," is a unique resource that provides analysis of practices in the security industry as they relate to law, regulation, licensure, and constitutional questions of case and statutory authority.This bookdescribes the legal requirements facedin the area of private security.It emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency.The textalso examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that will set pace for future private security laws and regulations. As private security becomes more closely involved in national and international security, cases like Blackwater are examined. Charles Nemeth takesyou step by step through the analysis of case law as it applies to situations commonly faced in the private security practice, providing a solid introduction to the legal and ethical standards that shape the industry.

*Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"

The Complete Q-anon - Q-anon, Summarized, Analyzed, and With a Firsthand Account of Cabal's Ground Intelligence Operations... The Complete Q-anon - Q-anon, Summarized, Analyzed, and With a Firsthand Account of Cabal's Ground Intelligence Operations (Hardcover)
Anonymous Conservative
R861 Discovery Miles 8 610 Ships in 12 - 19 working days
Contemporary Security Management (Hardcover, 3rd edition): John Fay Contemporary Security Management (Hardcover, 3rd edition)
John Fay
R1,568 Discovery Miles 15 680 Ships in 12 - 19 working days

"Contemporary Security Management, 3rd Edition "teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management.
Comprehensive introduction to security and IT security management principlesDiscussion of both public and private sector roles, as well as the increasingly common privatizing of government functionsNew experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter

One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Hardcover): Simon... One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Hardcover)
Simon Chesterman
R1,575 Discovery Miles 15 750 Ships in 12 - 19 working days

What limits, if any, should be placed on a government's efforts to spy on its citizens in the name of national security? Spying on foreigners has long been regarded as an unseemly but necessary enterprise. Spying on one's own citizens in a democracy, by contrast, has historically been subject to various forms of legal and political restraint. For most of the twentieth century these regimes were kept distinct. That position is no longer tenable. Modern threats do not respect national borders. Changes in technology make it impractical to distinguish between 'foreign' and 'local' communications. And our culture is progressively reducing the sphere of activity that citizens can reasonably expect to be kept from government eyes. The main casualty of this transformed environment will be privacy. Recent battles over privacy have been dominated by fights over warrantless electronic surveillance and CCTV; the coming years will see debates over DNA databases, data mining, and biometric identification. There will be protests and lawsuits, editorials and elections resisting these attacks on privacy. Those battles are worthy. But the war will be lost. Modern threats increasingly require that governments collect such information, governments are increasingly able to collect it, and citizens increasingly accept that they will collect it. This book proposes a move away from questions of whether governments should collect information and onto more problematic and relevant questions concerning its use. By reframing the relationship between privacy and security in the language of a social contract, mediated by a citizenry who are active participants rather than passive targets, the book offers a framework to defend freedom without sacrificing liberty.

How Safe Are Our Skies? - Assessing the Airlines' Response to Terrorism (Hardcover): Rodney Wallis How Safe Are Our Skies? - Assessing the Airlines' Response to Terrorism (Hardcover)
Rodney Wallis
R1,567 Discovery Miles 15 670 Ships in 10 - 15 working days

The September 11, 2001, attacks on the World Trade Center and the Pentagon raised numerous questions about American and international aviation security. Former Director of Security of the International Air Transport Association Rodney Wallis suggests that the failure to maximize U.S. domestic air security, which left air travelers vulnerable to attack, lay largely with the carriers themselves. He contends that future policies should parallel the standards of the International Civil Aviation Organization. Wallis considers the Aviation and Transportation Security Act adopted by the U.S. Congress in the wake of September 11 and offers a modus operandi to the FAA that would enable them to maximize the benefits this legislation provides to air travelers.

This important work reviews past government reactions to the threat posed by air terrorism and questions whether these were effective responses or merely window dressing. It also includes practical advice for air travelers on how to maximize their own security when flying on international routes by monitoring airport and airline security for themselves.

The Stasi - Myth and Reality (Paperback): Mike Dennis, Norman Laporte The Stasi - Myth and Reality (Paperback)
Mike Dennis, Norman Laporte
R1,957 Discovery Miles 19 570 Ships in 12 - 19 working days

A study of the powerful and much-feared East German Ministry of State Security from its establishment in 1950 to its fall in 1990.

The Stasi was a central institution of the GDR, and this book illuminates the nature and operation of the entire East German regime, addressing one of the most important topics in modern German history. The emphasis is primarily on the key years under Erich Honecker, who was Head of State from 1976 and ousted in 1989. The book looks at all aspects of the control, operation and impact of the security police, their methods, targets, structure, accountability, and in particular the crucial question of how far they were an arm of the ruling communist party or were themselves a virtually autonomous political actor.

The Handbook of Security (Hardcover): Martin Gill The Handbook of Security (Hardcover)
Martin Gill
R4,635 Discovery Miles 46 350 Ships in 12 - 19 working days

"The Handbook of Security "is essential reading for all those engaged with the security world. This in-depth book collates the best research available for the security academic and professional. The book is divided into five parts. It begins with the study of security as a discipline, assessing the contribution made by different subject areas to the study of security. The second part looks as crime in organizations. The third part analyzes the various sub-sectors of security. A section on management issues precedes the final section looking at a mage of issues that impact on security.

Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition): Philip Walker Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition)
Philip Walker
R2,114 Discovery Miles 21 140 Ships in 12 - 19 working days

In the latest edition, Philip Walker not only tackles the electronic aspect of the design of a security system, but also examines the human factor in such systems. In his own words: 'Electronic aids are added to enable security officers to do their jobs better, but not to do their jobs for them'.
Today, with the escalation of crime and growing concerns for security, there has been a great increase in the number of electronic security systems. Unfortunately, despite improvements in reliability in terms of equipment manufacture, false alarms do still occur, and they waste a large amount of police time; approximately ninety out of one hundred alarms investigated by the police are false. In the light of this, the new edition of Electronic Security Systems couldn't come at a better time, as it deals extensively with methods of reducing false alarms, allowing the police to concentrate on real breeches of security, and thus ultimately to reduce crime.
The extensive and unusual combination of experience that Philip Walker has in the world of electronics, communications and as a security consulting engineer makes him eminently qualified to tackle such subjects.
At only 30, this hardback book is an essential addition to your security collection. It has 320 pages packed with advice and technical knowledge, 40 photographs and 25 line diagrams and a good index.

Comprehensive coverage of electronic security systems
Written by an experienced security professional
Fully updated to examine new equipment with extensive help on avoiding false alarms"

Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback): Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee Interviewing Vulnerable Suspects - Safeguarding the Process (Paperback)
Jane Tudor-Owen, Celine van Golde, Ray Bull, David Gee
R1,068 Discovery Miles 10 680 Ships in 9 - 17 working days

* Offers context while providing a coherent, applied overview of a wide range of suspect vulnerabilities and how to address them when interviewing * Serves as a practical guide to interviewing vulnerable suspects for both uniform police and detectives. * The only book on interviewing vulnerable suspects that includes the most up-to-date legal considerations and challenges of modern society

Security Intelligence Services in New Democracies - The Czech Republic, Slovakia and Romania (Hardcover, New title): K.... Security Intelligence Services in New Democracies - The Czech Republic, Slovakia and Romania (Hardcover, New title)
K. Williams, D. Deletant
R1,532 Discovery Miles 15 320 Ships in 10 - 15 working days

The first account of the secret police in Eastern Europe after 1989, this book uses a wide range of sources, including archives, to identify what has and has not changed since the end of Communism. After explaining the structure and workings of two of the area's most feared services, Czechoslovakia's StB and Romania's Securitate, the authors detail the creation of new security intelligence institutions, the development of contacts with the West, and forms of democratic control.

Managing Privacy through Accountability (Hardcover): D. Guagnin, L. Hempel Managing Privacy through Accountability (Hardcover)
D. Guagnin, L. Hempel; Carla Ilten, Inga Kroener, Daniel Neyland, …
R2,886 Discovery Miles 28 860 Ships in 10 - 15 working days

Draws together contributions from leading figures in the field of surveillance to engage in the discussion of the emergence of accountability as a means to manage threats to privacy. The first of its kind to enrich the debate about accountability and privacy by drawing together perspectives from experienced privacy researchers and policy makers.

Computational Intelligence for Cybersecurity Management and Applications (Hardcover): Yassine Maleh, Mamoun Alazab, Soufyane... Computational Intelligence for Cybersecurity Management and Applications (Hardcover)
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
R3,349 Discovery Miles 33 490 Ships in 9 - 17 working days

1. Propose the latest discoveries in terms of machine intelligence techniques and methods for cybersecurity and privacy; 2. Propose many case studies and applications of machine intelligence in various cybersecurity fields (Smart City, IoT, Cyber Physical System, etc) 3. Combine theory and practice so that readers of the few books (beginners or experts) can find both a description of the concepts and context related to machine intelligence for cybersecurity.

Cognitive Risk (Paperback): James Bone, Jessie H Lee Cognitive Risk (Paperback)
James Bone, Jessie H Lee
R1,137 Discovery Miles 11 370 Ships in 12 - 19 working days

Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.

Geospatial Technologies and Homeland Security - Research Frontiers and Future Challenges (Hardcover, 2008 ed.): Daniel Sui Geospatial Technologies and Homeland Security - Research Frontiers and Future Challenges (Hardcover, 2008 ed.)
Daniel Sui
R4,574 Discovery Miles 45 740 Ships in 10 - 15 working days

Homeland security and context In the Geographical Dimensions of Terrorism (GDOT) (Cutter et al. 2003), the first book after 9/11 to address homeland security and geography, we developed several thematic research agendas and explored intersections between geographic research and the importance of context, both geographical and political, in relationship to the concepts of terrorism and security. It is good to see that a great deal of new thought and research continues to flow from that initial research agenda, as illustrated by many of the papers of this new book, entitled Geospatial Technologies and Homeland Security: Research Frontiers and Future Challenges. Context is relevant not only to understanding homeland security issues broadly, but also to the conduct of research on geospatial technologies. It is impossible to understand the implications of a homeland security strategy, let alone hope to make predictions, conduct meaningful modeling and research, or assess the value and dangers of geospatial technologies, without consideration of overarching political, social, economic, and geographic contexts within which these questions are posed.

Master of War - Blackwater USA's Erik Prince and the Business of War (Paperback): Suzanne Simons Master of War - Blackwater USA's Erik Prince and the Business of War (Paperback)
Suzanne Simons
R468 R437 Discovery Miles 4 370 Save R31 (7%) Ships in 10 - 15 working days

"Suzanne Simons is a masterful storyteller. But make no mistake-Master of War is not a work of fiction...A powerful and true account." -Wolf Blitzer, anchor, CNN's The Situation Room Master of War is the riveting true story of Eric Prince, the ex-Navy SEAL who founded Blackwater and built the world's largest military contractor, privatizing war for client nations around the world. A CNN producer and anchor, Suzanne Simons is the first journalist to get deep inside Blackwater-and, as a result of her unprecedented access, Master of War provides the most complete and revelatory account of the rise of this powerful corporate army and the remarkable entrepreneur who brought it into being, while offering an eye-opening, behind-the-scenes look at the wars in Iraq and Afghanistan.

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback)
Alan Tang
R1,409 Discovery Miles 14 090 Ships in 12 - 19 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback): Andrew Jenkinson Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback)
Andrew Jenkinson
R933 Discovery Miles 9 330 Ships in 9 - 17 working days

- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.

Bounty Hunters, Marshals, and Sheriffs - Forward to the Past (Hardcover, New): Jacqueline Pope Bounty Hunters, Marshals, and Sheriffs - Forward to the Past (Hardcover, New)
Jacqueline Pope
R2,218 Discovery Miles 22 180 Ships in 10 - 15 working days

Sheriffs, marshals, and bounty hunters are remembered as relics of our Wild West past. Pope looks at these agents of the law who operate outside police departments, particularly their roles in urban areas. She examines reasons for becoming a sheriff, marshal (usually appointed and not elected), or bounty hunter, as well as employment requirements, responsibilities, and relationships with local police and city officials. Pope argues ultimately that these law enforcers, to a much greater degree than the police, threaten low-income people. Urban sheriffs do not make arrests, but rather serve summonses, track down scofflaws, and confiscate property. Marshals carry out evictions. Bounty hunters are usually armed and work often in urban areas, hunting down wanted persons for a variety of crimes. Although they are not policemen, they are authorized to capture people and can do so without the restrictions imposed on traditional law enforcement officers. Pope focuses her attention on sheriffs, marshals, and bounty hunters in Arizona, New Jersey, New Mexico and New York. She examines their activities in the nineteenth century and today, providing interviews with sheriffs, marshals, bounty hunters, policemen, and with people who have been pursued by them. A work of interest to students, researchers, and citizens concerned with the workings of the U.S. criminal justice system.

Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition)
Nick Catrantzos
R3,980 Discovery Miles 39 800 Ships in 9 - 17 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

Introduction to Terrorism (Hardcover): David H. McElreath, Carl J. Jensen, Michael Wigginton, Chester L. Quarles, Stephen... Introduction to Terrorism (Hardcover)
David H. McElreath, Carl J. Jensen, Michael Wigginton, Chester L. Quarles, Stephen Mallory
R2,459 R2,314 Discovery Miles 23 140 Save R145 (6%) Ships in 12 - 19 working days

It can take the form of a Molotov Cocktail or a Suicide Bomber detonating within a crowd. It can be a sophisticated electronic explosive device or a bomb in a shoe. Today's terrorism threats, and their constant assault on global security continues to be a menace of great concern.

Providing a hands-on look inside the ugly, blood-stained world of global terrorism, Introduction to Terrorism covers the evolution of terrorism, its growing sophistication, and its cynical indifference to human life. It begins by covering the history of terrorism and showing how the threats have changed since the September 11, 2001 attacks. It examines the methods America has chosen to guard against and deal with these threats using its military, government, and civilian agencies.

Illustrating and examining current and future challenges, this state-of-the-art text follows a flow model developed and successfully taught in the classroom at several colleges and universities. Designed to follow the standard academic semester (one chapter per week), the book's content, style, presentation, and organization have been class-tested and validated.

Access Rules - Freeing Data from Big Tech for a Better Future (Hardcover): Viktor Mayer-Schoenberger, Thomas Ramge Access Rules - Freeing Data from Big Tech for a Better Future (Hardcover)
Viktor Mayer-Schoenberger, Thomas Ramge
R720 R586 Discovery Miles 5 860 Save R134 (19%) Ships in 12 - 19 working days

A powerful and urgent call to action: to improve our lives and our societies, we must demand open access to data for all. Information is power, and the time is now for digital liberation. Access Rules mounts a strong and hopeful argument for how informational tools at present in the hands of a few could instead become empowering machines for everyone. By forcing data-hoarding companies to open access to their data, we can reinvigorate both our economy and our society. Authors Viktor Mayer-Schoenberger and Thomas Ramge contend that if we disrupt monopoly power and create a level playing field, digital innovations can emerge to benefit us all. Over the past twenty years, Big Tech has managed to centralize the most relevant data on their servers, as data has become the most important raw material for innovation. However, dominant oligopolists like Facebook, Amazon, and Google, in contrast with their reputation as digital pioneers, are actually slowing down innovation and progress by withholding data for the benefit of their shareholders--at the expense of customers, the economy, and society. As Access Rules compellingly argues, ultimately it is up to us to force information giants, wherever they are located, to open their treasure troves of data to others. In order for us to limit global warming, contain a virus like COVID-19, or successfully fight poverty, everyone-including citizens and scientists, start-ups and established companies, as well as the public sector and NGOs-must have access to data. When everyone has access to the informational riches of the data age, the nature of digital power will change. Information technology will find its way back to its original purpose: empowering all of us to use information so we can thrive as individuals and as societies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Silent Weapons for Quiet Wars - An…
Anonymous Hardcover R643 R575 Discovery Miles 5 750
The Enforcers - Inside Cape Town's…
Caryn Dolley Paperback  (1)
R295 R264 Discovery Miles 2 640
Model Security Policies, Plans and…
John Fay Paperback R1,776 Discovery Miles 17 760
Emergency Notification
Robert C. Chandler Hardcover R1,661 Discovery Miles 16 610
Investigations 150 Things You Should…
Lawrence Fennelly, Louis Tyska Paperback R1,128 Discovery Miles 11 280
Security Consulting
Charles A. Sennewald Paperback R1,172 Discovery Miles 11 720
Multllinguallsm, the Judicial Authority…
Kas Deprez, Theo du Plessis, … Paperback R623 Discovery Miles 6 230
The California Consumer Privacy Act…
Preston Bukaty Paperback R840 Discovery Miles 8 400
Machine See, Machine Do - How Technology…
Patrick K Lin Hardcover R741 R657 Discovery Miles 6 570
Theorizing Surveillance
David Lyon Paperback R1,396 Discovery Miles 13 960

 

Partners