0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (40)
  • R500+ (418)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Privatising Justice - The Security Industry, War and Crime Control (Hardcover): Wendy Fitzgibbon, John Lea Privatising Justice - The Security Industry, War and Crime Control (Hardcover)
Wendy Fitzgibbon, John Lea
R2,755 Discovery Miles 27 550 Ships in 10 - 15 working days

Privatising Justice takes a broad historical view of the role of the private sector in the British state, from private policing and mercenaries in the eighteenth century to the modern rise of the private security industry in armed conflict, policing and the penal system. The development of the welfare state is seen as central to the decline of what the authors call 'old privatisation'. Its succession by neoliberalism has created the ground for the resurgence of the private sector. The growth of private military, policing and penal systems is located within the broader global changes brought about by neoliberalism and the dystopian future that it portends. The book is a powerful petition for the reversal of the increasing privatisation of the state and the neoliberalism that underlies it.

The Terror Factory: The Isis Edition (Paperback): Trevor Aaronson The Terror Factory: The Isis Edition (Paperback)
Trevor Aaronson
R522 R424 Discovery Miles 4 240 Save R98 (19%) Ships in 9 - 15 working days
Stopping The Spies - Constructing And Resisting The Surveillance State In South Africa (Paperback): Jane Duncan Stopping The Spies - Constructing And Resisting The Surveillance State In South Africa (Paperback)
Jane Duncan
R350 R273 Discovery Miles 2 730 Save R77 (22%) In Stock

In 2013, former U.S. National Security Agency (NSA) contractor Edward Snowden leaked secret documents revealing that state agencies like the NSA had spied on the communications of millions of innocent citizens. International outrage resulted, but the Snowden documents revealed only the tip of the surveillance iceberg. Apart from insisting on their rights to tap into communications, more and more states are placing citizens under surveillance, tracking their movements and transactions with public and private institutions. The state is becoming like a one-way mirror, where it can see more of what its citizens do and say, while citizens see less and less of what the state does, owing to high levels of secrecy around surveillance.

In this book, Jane Duncan assesses the relevance of Snowden’s revelations for South Africa. In doing so she questions the extent to which South Africa is becoming a surveillance society governed by a surveillance state. Duncan challenges members of civil society to be concerned about and to act on the ever-expanding surveillance capacities of the South African state. Is surveillance used for the democratic purpose of making people safer, or is it being used for the repressive purpose of social control, especially of those considered to be politically threatening to ruling interests? She explores the forms of collective action needed to ensure that unaccountable surveillance does not take place and examines what does and does not work when it comes to developing organised responses.

This book is aimed at South African citizens, academics as well as the general reader, who care about our democracy and the direction it is taking.

Investigations: 150 Things You Should Know (Paperback, 2nd edition): Lawrence Fennelly, Marianna Perry Investigations: 150 Things You Should Know (Paperback, 2nd edition)
Lawrence Fennelly, Marianna Perry
R1,676 R1,553 Discovery Miles 15 530 Save R123 (7%) Ships in 12 - 17 working days

Investigations: 150 Things You Should Know, Second Edition, explores the essential tips and techniques for security investigations, providing a useful reference for those at any stage of their security career. This practical guide covers the legal guidelines that all investigators must follow. Through anecdotes, case studies and documented procedures, the authors present the most complete collection of investigative information available. Readers in the security and law enforcement fields will find this book easy to use and understand when seeking explanations about a wide variety of investigative topics, including constitutional law, documentary evidence, surveillance equipment, interviewing, interrogating and reporting.

The Five Technological Forces Disrupting Security - How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical... The Five Technological Forces Disrupting Security - How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age (Paperback)
Steve Van Til
R1,763 R1,632 Discovery Miles 16 320 Save R131 (7%) Ships in 12 - 17 working days

The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. It also examines key questions on how these new technologies have lowered barriers for new entrants in the field and how they are likely to change market dynamics and affect customer choices. Set in the context of one of the early dot.com companies to enter physical security, the narrative is written for professionals from Chief Security Officers and systems integrators to product managers and investors.

The Central Role of Thailand's Internal Security Operations Command in the Post-Counter-insurgency Period (Paperback):... The Central Role of Thailand's Internal Security Operations Command in the Post-Counter-insurgency Period (Paperback)
Puangthong R. Pawakapan
R220 Discovery Miles 2 200 Ships in 12 - 17 working days

The Thai military's Internal Security Operations Command (ISOC) was in charge of a wide range of civil affairs projects during the country's struggle with the communist insurgency between the mid-1960s and the mid-1980s. These projects - including rural development programmes, mass organizations and mobilization campaigns, and psychological operations - provided justification for the military to routinely penetrate the socio-political sphere. Since the Cold War drew to a close, little attention has been paid to ISOC's role and power within the state apparatus. Since the coups of September 2006 and May 2014 that toppled the elected governments, ISOC has been dangerously empowered and increasingly employed by the military regimes to dictate the country's political direction. The power of the Thai military is exerted not only through its use of force but also by means of its socio-political arms. ISOC represents a potent tool with which conservative elites can undermine and control electoral democracy and through which the military can maintain its power.

Security Operations Center Guidebook - A Practical Guide for a Successful SOC (Paperback): Gregory Jarpey, Scott Mccoy Security Operations Center Guidebook - A Practical Guide for a Successful SOC (Paperback)
Gregory Jarpey, Scott Mccoy
R2,150 Discovery Miles 21 500 Ships in 12 - 17 working days

Security Operations Center Guidebook: A Practical Guide for a Successful SOC provides everything security professionals need to create and operate a world-class Security Operations Center. It starts by helping professionals build a successful business case using financial, operational, and regulatory requirements to support the creation and operation of an SOC. It then delves into the policies and procedures necessary to run an effective SOC and explains how to gather the necessary metrics to persuade upper management that a company's SOC is providing value. This comprehensive text also covers more advanced topics, such as the most common Underwriter Laboratory (UL) listings that can be acquired, how and why they can help a company, and what additional activities and services an SOC can provide to maximize value to a company.

The Privatization of Israeli Security (Paperback): Shir Hever The Privatization of Israeli Security (Paperback)
Shir Hever
R553 R468 Discovery Miles 4 680 Save R85 (15%) Ships in 12 - 17 working days

Between 1994-2014, Israel's security service was transformed, becoming one of the most extreme examples of privatised security in the world. This book is an investigation into this period and the conditions that created 'Occupation Inc.': the institution of a private military-security-industrial complex. State sponsored violence is increasing as a result of this securitisation, but why is it necessary, and what are its implications? In this book, Shir Hever considers the impact of the ongoing Palestinian resistance to Israeli occupation, the influence of U.S. military aid and the rise of neoliberalism in Israel, to make sense of this dramatic change in security policy. Through the lens of political economy, this book shows how the Israeli security elites turn violence into a commodity in order to preserve their status and wealth, providing a fresh new perspective on the Israeli occupation.

Design and Evaluation of Physical Protection Systems (Paperback, 2nd edition): Mary Lynn Garcia Design and Evaluation of Physical Protection Systems (Paperback, 2nd edition)
Mary Lynn Garcia
R1,604 Discovery Miles 16 040 Ships in 12 - 17 working days

Design and Evaluation of Physical Security Systems, 2e, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.
* New chapter on transportation systems
* Extensively updated chapter on threat definition
* Major changes to response chapter

Introduction to Security (Hardcover, 9th edition): Robert Fischer, Edward Halibozek, David Walters Introduction to Security (Hardcover, 9th edition)
Robert Fischer, Edward Halibozek, David Walters
R1,664 Discovery Miles 16 640 Ships in 12 - 17 working days

"Introduction to Security" has been the leading text on private security for over thirty years. Celebrated for its balanced and professional approach, this new edition gives future security professionals a broad, solid base that prepares them to serve in a variety of positions. Security is a diverse and rapidly growing field that is immune to outsourcing. The author team as well as an outstanding group of subject-matter experts combine their knowledge and experience with a full package of materials geared to experiential learning. As a recommended title for security certifications, and an information source for the military, this is an essential reference for all security professionals. This timely revision expands on key topics and adds new material on important issues in the 21st century environment such as the importance of communication skills; the value of education; internet-related security risks; changing business paradigms; and brand protection.
New sections on terrorism and emerging security threats like cybercrime and piracy Top industry professionals from aerospace and computer firms join instructors from large academic programs as co-authors and contributors Expanded ancillaries for both instructors and students, including interactive web-based video and case studies

Security and Loss Prevention - An Introduction (Paperback, 7th edition): Philip Purpura Security and Loss Prevention - An Introduction (Paperback, 7th edition)
Philip Purpura
R1,908 Discovery Miles 19 080 Ships in 12 - 17 working days

Security and Loss Prevention: An Introduction, Seventh Edition, provides introductory and advanced information on the security profession. Security expert, Phil Purpura, CPP, includes updates on security research, methods, strategies, technologies, laws, issues, statistics and career options, providing a comprehensive and interdisciplinary book that draws on many fields of study for concepts, strategies of protection and research. The book explains the real-world challenges facing security professionals and offers options for planning solutions. Linking physical security with IT security, the book covers internal and external threats to people and assets and private and public sector responses and issues. As in previous editions, the book maintains an interactive style that includes examples, illustrations, sidebar questions, boxed topics, international perspectives and web exercises. In addition, course instructors can download ancillaries, including an instructor's manual with outlines of chapters, discussion topics/special projects, essay questions, and a test bank and PowerPoint presentation for each chapter.

Tourism Security - Strategies for Effectively Managing Travel Risk and Safety (Paperback): Peter Tarlow Tourism Security - Strategies for Effectively Managing Travel Risk and Safety (Paperback)
Peter Tarlow
R1,138 Discovery Miles 11 380 Ships in 12 - 17 working days

Tourism security is an important part of both security management and tourism. Private security professionals and police departments in tourism cities, as well as hotels, major attractions, and theme parks, have all come to realize that tourism security and safety issues (often called tourism surety) are essential for industry survival and success. In Tourism Security, leading expert Peter Tarlow addresses a range of key issues in tourism safety and security. The book guides the reader through a study of tourism security themes and best practices. Topics include the relationship between tourism security and the economy, hotel and motel security, risk and crisis management, public places, transportation, and legal issues. The book also includes case studies of four popular tourist destinations. With each destination, an interview with a police or security representative is included-providing unique, in-depth insight to security concerns. Tourism Security is an invaluable resource for private security professionals, police departments that serve tourist destinations, and tourism professionals who work in hotels or convention centers, or at attractions, casinos, or events.

Cyber Strategy - The Evolving Character of Power and Coercion (Paperback): Brandon Valeriano, Benjamin Jensen, Ryan C Maness Cyber Strategy - The Evolving Character of Power and Coercion (Paperback)
Brandon Valeriano, Benjamin Jensen, Ryan C Maness
R833 Discovery Miles 8 330 Ships in 10 - 15 working days

Some pundits claim cyber weaponry is the most important military innovation in decades, a transformative new technology that promises a paralyzing first-strike advantage difficult for opponents to deter. Yet, what is cyber strategy? How do actors use cyber capabilities to achieve a position of advantage against rival states? This book examines the emerging art of cyber strategy and its integration as part of a larger approach to coercion by states in the international system between 2000 and 2014. To this end, the book establishes a theoretical framework in the coercion literature for evaluating the efficacy of cyber operations. Cyber coercion represents the use of manipulation, denial, and punishment strategies in the digital frontier to achieve some strategic end. As a contemporary form of covert action and political warfare, cyber operations rarely produce concessions and tend to achieve only limited, signaling objectives. When cyber operations do produce concessions between rival states, they tend to be part of a larger integrated coercive strategy that combines network intrusions with other traditional forms of statecraft such as military threats, economic sanctions, and diplomacy. The books finds that cyber operations rarely produce concessions in isolation. They are additive instruments that complement traditional statecraft and coercive diplomacy. The book combines an analysis of cyber exchanges between rival states and broader event data on political, military, and economic interactions with case studies on the leading cyber powers: Russia, China, and the United States. The authors investigate cyber strategies in their integrated and isolated contexts, demonstrating that they are useful for maximizing informational asymmetries and disruptions, and thus are important, but limited coercive tools. This empirical foundation allows the authors to explore how leading actors employ cyber strategy and the implications for international relations in the 21st century. While most military plans involving cyber attributes remain highly classified, the authors piece together strategies based on observations of attacks over time and through the policy discussion in unclassified space. The result will be the first broad evaluation of the efficacy of various strategic options in a digital world.

Churchill's Bodyguard (Paperback, New ed): Tom Hickman Churchill's Bodyguard (Paperback, New ed)
Tom Hickman 2
R342 R279 Discovery Miles 2 790 Save R63 (18%) Ships in 9 - 15 working days

For fans of Darkest Hour and Dunkirk, discover the story of Walter H. Thompson, the man who saved Winston Churchill's life more than once. Walter H. Thompson was Churchill's bodyguard from 1921 until 1945, brought back from retirement at the outbreak of war. Tom Hickman's authorised biography draws heavily on extracts from a manuscript recently discovered by his great-niece, in which Thompson gives a unique insider's account of a number of occasions on which Churchill's life was put seriously at risk and his intervention was needed. After the war, Thompson married one of Churchill's secretaries, and her recollections, as well as those of surviving family members, are interwoven to tell the revelatory inside story of life beside the Greatest Briton.

Concealing for Freedom 2022 - The Making of Encryption, Secure Messaging and Digital Liberties (Paperback): Ksenia Ermoshina,... Concealing for Freedom 2022 - The Making of Encryption, Secure Messaging and Digital Liberties (Paperback)
Ksenia Ermoshina, Francesca Musiani; Introduction by Laura Denardis
R621 Discovery Miles 6 210 Ships in 10 - 15 working days
The Privacy Prescription - Why Health Data Privacy Is in Critical Condition and How to Fix It (Paperback): Jacqueline Kimmell The Privacy Prescription - Why Health Data Privacy Is in Critical Condition and How to Fix It (Paperback)
Jacqueline Kimmell
R457 R387 Discovery Miles 3 870 Save R70 (15%) Ships in 10 - 15 working days
Silent Weapons for Quiet Wars - An Introductory Programming Manual (Paperback): Anonymous Silent Weapons for Quiet Wars - An Introductory Programming Manual (Paperback)
Anonymous
R502 R432 Discovery Miles 4 320 Save R70 (14%) Ships in 10 - 15 working days
Cloak - On the Textobject & its Concealment (Paperback): Cloak Cloak - On the Textobject & its Concealment (Paperback)
Cloak
R246 R198 Discovery Miles 1 980 Save R48 (20%) Ships in 10 - 15 working days
The Future of U.S.-India Security Cooperation (Hardcover): Sumit Ganguly, M. Chris Mason The Future of U.S.-India Security Cooperation (Hardcover)
Sumit Ganguly, M. Chris Mason
R2,545 R2,138 Discovery Miles 21 380 Save R407 (16%) Ships in 9 - 15 working days

This book deals with the evolution, current status and potential of U.S.-India strategic cooperation. From very modest beginnings, the U.S.-India strategic partnership has developed significantly over the last decade. In considerable part, this growth has stemmed from overlapping concerns about the rise and assertiveness of the People's Republic of China, as well as the instability of Pakistan. Despite the emergence of this partnership, significant differences remain, some of which stem from Cold War legacies, others from divergent global strategic interests and institutional design. In spite of these areas of discord, the overall trajectory of the relationship appears promising. Increased cooperation and closer policy coordination underscore a deepening of the relationship, while fundamental differences in national approaches to strategic challenges demand flexibility and compromise in the future. -- .

Afterlives of Data - Life and Debt under Capitalist Surveillance (Hardcover): Mary F.E. Ebeling Afterlives of Data - Life and Debt under Capitalist Surveillance (Hardcover)
Mary F.E. Ebeling
R1,904 Discovery Miles 19 040 Ships in 12 - 17 working days

What our health data tell American capitalism about our value-and how that controls our lives. Afterlives of Data follows the curious and multiple lives that our data live once they escape our control. Mary F. E. Ebeling's ethnographic investigation shows how information about our health and the debt that we carry becomes biopolitical assets owned by healthcare providers, insurers, commercial data brokers, credit reporting companies, and platforms. By delving into the oceans of data built from everyday medical and debt traumas, Ebeling reveals how data about our lives come to affect our bodies and our life chances and to wholly define us. Investigations into secretive data collection and breaches of privacy by the likes of Cambridge Analytica have piqued concerns among many Americans about exactly what is being done with their data. From credit bureaus and consumer data brokers like Equifax and Experian to the secretive military contractor Palantir, this massive industry has little regulatory oversight for health data and works to actively obscure how it profits from our data. In this book, Ebeling traces the health data-medical information extracted from patients' bodies-that are digitized and repackaged into new data commodities that have afterlives in database lakes and oceans, algorithms, and statistical models used to score patients on their creditworthiness and riskiness. Critical and disturbing, Afterlives of Data examines how Americans' data about their health and their debt are used in the service of marketing and capitalist surveillance.

Machine See, Machine Do - How Technology Mirrors Bias in Our Criminal Justice System (Hardcover): Patrick K Lin Machine See, Machine Do - How Technology Mirrors Bias in Our Criminal Justice System (Hardcover)
Patrick K Lin
R800 R662 Discovery Miles 6 620 Save R138 (17%) Ships in 10 - 15 working days
Mysteries in the Music - Case Closed (Paperback): Jim Berkenstadt Mysteries in the Music - Case Closed (Paperback)
Jim Berkenstadt; Foreword by Butch Vig
R609 Discovery Miles 6 090 Ships in 10 - 15 working days
Investigator Procedures Manual (Paperback): Mark & Wendy Murnan Investigator Procedures Manual (Paperback)
Mark & Wendy Murnan
R1,118 Discovery Miles 11 180 Ships in 10 - 15 working days
Technology Development for Security Practitioners (Hardcover, 1st ed. 2021): Babak Akhgar, Dimitrios Kavallieros, Evangelos... Technology Development for Security Practitioners (Hardcover, 1st ed. 2021)
Babak Akhgar, Dimitrios Kavallieros, Evangelos Sdongos
R3,047 Discovery Miles 30 470 Ships in 10 - 15 working days

This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com

Machine See, Machine Do - How Technology Mirrors Bias in Our Criminal Justice System (Paperback): Patrick K Lin Machine See, Machine Do - How Technology Mirrors Bias in Our Criminal Justice System (Paperback)
Patrick K Lin
R464 R387 Discovery Miles 3 870 Save R77 (17%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Access Rules - Freeing Data from Big…
Viktor Mayer-Schoenberger, Thomas Ramge Hardcover R554 Discovery Miles 5 540
Privacy in Practice - Establish and…
Alan Tang Paperback R1,390 Discovery Miles 13 900
Tell Me Everything - The Story of a…
Erika Krouse Paperback R545 R461 Discovery Miles 4 610
The Political Economy of Defence
Ron Matthews Hardcover R2,991 Discovery Miles 29 910
Cognitive Risk
James Bone, Jessie H Lee Paperback R1,123 Discovery Miles 11 230
Software Deployment, Updating, and…
Bill Stackpole, Patrick Hanrion Paperback R1,827 Discovery Miles 18 270
PKI Implementation and Infrastructures
Julian Ashbourn Paperback R1,110 Discovery Miles 11 100
Family Tree Workbook - 30+ Step-By-Step…
Brian Sheffey Paperback R384 R328 Discovery Miles 3 280
Managing the Insider Threat - No Dark…
Nick Catrantzos Paperback R1,734 Discovery Miles 17 340
The Security Hippie
Barak Engel Paperback R1,110 Discovery Miles 11 100

 

Partners