![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it.
Change Management for Risk Professionals addresses a need in the marketplace for risk professionals to learn about change management. Organizations exist within a complex and changing environment. The changes within the organizational context (e.g., societal, technological, and customer preferences) place pressure upon the organization to remain relevant and competitive. Change is not inherently wrong; our perceptions of the change make it negative or positive. A perceived negative change can become a real opportunity for improvement if desired. Systemic degradation and irrelevancy are the results of an organization that fails to acknowledge the reality of change. The book focuses on the dynamics of change management with an eye toward the risk professional. There is a real need for an uncomplicated resource that helps educate non-change management professionals involved in risk-oriented change initiatives. Examples of risk disciplines are organizational resilience, business continuity, risk management, crisis management, and security management, but any discipline or function within an organization focuses on risk. Any organizational project is an initiative requiring dynamic change management skills. The author brings his extensive experience to offer risk practitioners advice, industry examples, and best practices to the change management process. Change Management for Risk Professionals will be a welcome addition to enterprise-wide business continuity, crisis management, disaster recovery, security management, and homeland security professionals wanting to learn the secrets to becoming successful in initiating organizational change.
This volume explores the contemporary challenges to US national cybersecurity. Taking stock of the field, it features contributions by leading experts working at the intersection between academia and government and offers a unique overview of some of the latest debates about national cybersecurity. These contributions showcase the diversity of approaches and issues shaping contemporary understandings of cybersecurity in the West, such as deterrence and governance, cyber intelligence and big data, international cooperation, and public-private collaboration. The volume's main contribution lies in its effort to settle the field around three main themes exploring the international politics, concepts, and organization of contemporary cybersecurity from a US perspective. Related to these themes, this volume pinpoints three pressing challenges US decision makers and their allies currently face as they attempt to govern cyberspace: maintaining international order, solving conceptual puzzles to harness the modern information environment, and coordinating the efforts of diverse partners. The volume will be of much interest to students of cybersecurity, defense studies, strategic studies, security studies, and IR in general.
Managing the ever-changing nature and cross-disciplinary challenges of the maritime sector demands a complete understanding of the special characteristics of the maritime space. The complexity of the operations of ships, ports, shipping companies, and naval and coast guard maritime security operations-as well as the economic significance and the inherent security vulnerabilities of global maritime trade-requires a thorough, holistic and adaptable understanding of commercial, law enforcement and naval maritime security phenomena. Written by a team of expert contributors, this book identifies and assesses the issues inherent in developing and implementing maritime security measures. It examines the new maritime security environment, including the different but complementary interests of the shipping industry and national regulatory agencies. The coverage includes analyses of the different threats to maritime security and how they are perceived by different actors in the maritime domain. The editors evaluate the international and national legal frameworks developed for specific sectors and the responses that different nations have given to these initiatives. Comprehensive in scope, the volume addresses security concerns that pertain to a wide spectrum of commercial shipping and maritime security situations, regulatory frameworks, sector-specific vulnerabilities, regional nuances, and port facilities.
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.
The US government spends billions of dollars to secure strategic and tactical assets at home and abroad against enemy attack. However, as "hard targets" such as military installations and government buildings are further strengthened, vulnerable soft targets are increasingly in the crosshairs of terrorists and violent criminals. Attacks on crowded spaces such as churches, schools, malls, transportation hubs, and recreational venues result in more casualties and have a powerful effect on the psyche of the populace. Soft Target Hardening: Protecting People from Attack, Second Edition, continues the national dialogue started by the first edition by providing case studies, best practices, and methodologies for identifying soft target vulnerabilities and reducing risk in the United States and beyond. Soft target attacks steadily climbed in number and scale of violence since the first edition of this book. New tactics emerged, as terrorists continually hit the "reset button" with each attack. In this volatile, ever-changing security environment, plans to protect people and property must be fluid and adaptable. Along with new hardening tactics, such as the use of tactical deception to disguise, conceal, and divert, the author has updated the text with new case studies to reflect and respond to the fast-moving transformation in methods from more complex and organized forms of terror to simpler, yet still-devastating approaches. This book is a must-read for those who secure, own, and operate soft target facilities, and for citizens who want to protect themselves and their families from attack. Soft Target Hardening, Second Edition, was named the ASIS International Security Industry Book of the Year in 2019.
Privatising Justice takes a broad historical view of the role of the private sector in the British state, from private policing and mercenaries in the eighteenth century to the modern rise of the private security industry in armed conflict, policing and the penal system. The development of the welfare state is seen as central to the decline of what the authors call 'old privatisation'. Its succession by neoliberalism has created the ground for the resurgence of the private sector. The growth of private military, policing and penal systems is located within the broader global changes brought about by neoliberalism and the dystopian future that it portends. The book is a powerful petition for the reversal of the increasing privatisation of the state and the neoliberalism that underlies it.
This is a volume of original contributions from scholars in eight different humanities and social science disciplines. The aim of the book is to present a range of surveillance technologies used in everyday life and investigate the politics of their use. It is truly an interdisciplinary project that will find purchase in courses on security studies and the sociology of culture and the sociology of science. Courses on security studies and its impact on culture can be found in a variety of academic departments including STS, criminology, sociology, women's studies, anthropology, political science and justice studies.
In recent years, the expansion of night-time leisure has emerged as a key indicator of post-industrial urban prosperity, attracting investment, creating employment and re-generating the built environment. These leisure economies are youth-dominated, focusing upon the sale and consumption of alcohol. Unprecedented numbers of young people now flock to town centres that are crammed with bars, pubs and clubs, and the resulting violent disorder has over run police resources that remain geared to the drinking patterns and alcohol cultures of previous generations. Post-industrial re-structuring has spawned an increasingly complex mass of night-time leisure options through which numerous licit and illicit commercial opportunities flow. Yet, regardless of the fashionable and romantic notions of many contemporary urban theorists, it is alcohol, mass intoxication and profit rather than 'cultural regeneration,' which lies at the heart of this rapidly expanding dimension of post-industrial urbanism. Private security in the bulky form of bouncers fills the void left by the public police. These men (only 7% are women), whose activities are barely regulated by the State, are dominated by a powerful subculture rooted in routine violence and intimidation. Using ethnography, participant observation and extensive interviews with all the main players, this controversial book charts the emergence of the bouncer as one of the most graphic symbols in the iconography of post industrial Britain.
Strategic Security Management, Second Edition provides security leadership and decision-makers with a fresh perspective on threat, vulnerability, and risk assessment. The book offers a framework to look at applying security analysis and theory into practice for effective security program, implementation, management and evaluation. Chapters examine metric-based security resource allocation of countermeasures, including security procedures, utilization of personnel, and electronic measures. The new edition is fully updated to reflect the latest industry best-practices and includes contributions from security industry leaders-based on their years of professional experience-including Norman Bates, Robert Emery, Jack Follis, Steve Kaufer, Andrew Rubin, Michael Silva, and Ken Wheatley. Strategic Security Management, Second Edition will be a welcome addition to the security literature for all security professionals, security managers, and criminal justice students interested in understanding foundational security principles and their application.
Private security is now a multi-billion pound industry employing more personnel than the police. The authors provide incisive insights into the security world, scanning its weaknesses and exploring its potential. Based upon original research, supported by years of experience, they suggest that new ways of looking at the modern security world are long overdue. Private Security is a highly innovative book containing a wealth of up-to-date material. It is the definitive guide to the security world.
In 2013, former U.S. National Security Agency (NSA) contractor Edward Snowden leaked secret documents revealing that state agencies like the NSA had spied on the communications of millions of innocent citizens. International outrage resulted, but the Snowden documents revealed only the tip of the surveillance iceberg. Apart from insisting on their rights to tap into communications, more and more states are placing citizens under surveillance, tracking their movements and transactions with public and private institutions. The state is becoming like a one-way mirror, where it can see more of what its citizens do and say, while citizens see less and less of what the state does, owing to high levels of secrecy around surveillance. In this book, Jane Duncan assesses the relevance of Snowden’s revelations for South Africa. In doing so she questions the extent to which South Africa is becoming a surveillance society governed by a surveillance state. Duncan challenges members of civil society to be concerned about and to act on the ever-expanding surveillance capacities of the South African state. Is surveillance used for the democratic purpose of making people safer, or is it being used for the repressive purpose of social control, especially of those considered to be politically threatening to ruling interests? She explores the forms of collective action needed to ensure that unaccountable surveillance does not take place and examines what does and does not work when it comes to developing organised responses. This book is aimed at South African citizens, academics as well as the general reader, who care about our democracy and the direction it is taking.
Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue. As such, the book's objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach. The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager. While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization's system of management and all its activities and functions. The "Introduction" section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization's overall business management strategy. The "Framework" section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The "Tactics and Control Measures" section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events. For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach. Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization's day-to-day activities-as an integral part of these activities-rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.
For all those who read the pages of this important study, they will undoubtedly appreciate the important responsibility the security sector has towards children. It will enable them to think through how child protection strategies can become an integral part of efforts to create a more secure and better world. What is particularly impressive is that the reflection and arguments presented here bring together and combine a common vision of the priorities that influence the security sector and civil society, and this fact alone is full of promise for it envisages investments in children today that will benefit the young people who will become the leaders of tomorrow. The book offers an excellent opportunity to broaden the debate on conflict and children away from just child soldiers, but to focus also on young people in general and the active contribution that they have to make to peacebuilding and social development. From a security governance perspective there is a clear responsibility on the part of multiple actors at multiple layers to formulate the collaborative approaches required to provide a secure environment for all children everywhere.
Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention. The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include: Employee theft and fraud Organizational fraud Identity theft and fraud Fraud against the elderly Internet, computer, and e-mail fraud Ponzi and pyramid schemes The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers. Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.
Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security.
When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, Floyd's innovative approach enables scholars to normatively evaluate past and present securitizations, equips practitioners to make informed judgements on what they ought to do in relevant situations, and empowers the public to hold relevant actors accountable for how they view security.
The protection and security of cultural properties is of primary concern to the thousands of federal, state, county, city, and private institutions entrusted with housing and displaying our national heritage and history of our society. Cultural property security is of global importance as well, with tens of thousands of institutions internationally tasked with protecting and maintaining relics and artifacts of social, cultural, and historical significance. Cultural Property Security offers powerful protection guidelines to security departments tasked with safeguarding popular historical sites, museums, and libraries and the historical artifacts they house. Presenting practical, ready-to-implement solutions in a clear writing style, the book: Provides a working definition of cultural properties Identifies the threats against cultural properties from crime and terrorism, particularly in regions with political or civil unrest Offers guidance in threat assessment Identifies the physical security measures and technology that can be used to protect such institutions Presents guidelines for establishing a protective service department for cultural properties Describes proper arrest and post-arrest protocols Includes a list of online resources for further information related to the protection of cultural properties Complete with dozens of photos, the book establishes leading industry best practices to identify the various threats to cultural properties and protect them. Dr. Daniel J. Benny has more than 35 years of security management experience and has served as a Director of Protective Services for the state of Pennsylvania's Historic and Museum Commission. His insight is invaluable to those responsible for securing these institutions from internal and external threats.
A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides readers through important issues involving technology, data collection, and digital privacy as they apply to our daily lives. Our Data, Ourselves covers a broad range of everyday privacy concerns with easily digestible, accessible overviews and real-world examples. Lipton explores the ways we can protect our personal data and monitor its use by corporations, the government, and others. She also explains our rights regarding sensitive personal data like health insurance records and credit scores, as well as what information retailers can legally gather, and how. Who actually owns our personal information? Can an employer legally access personal emails? What privacy rights do we have on social media? Answering these questions and more, Our Data, Ourselves provides a strategic approach to assuming control over, and ultimately protecting, our personal information.
Boko Haram analyzes the activities and atrocities of Nigeria's Jihadi terrorist group, Boko Haram, in the context of global religious fundamentalism and extremism. The book traces the early beginnings of the religious sect, the conversion of its leader to radical Islam in 2002, and the group's campaign of violence beginning in 2009 and continuing to the present. The group's attacks against a variety of targets are examined in detail as are their general tactics and strategies. The Nigerian government response is also examined in order to provide critical lessons to counterterrorism planners, policy and government officials, and scholars. The initial military response was hampered by capability and legislative constraints including a lack of arms and ammunition, a lack of modern counterterrorism equipment, training gaps, leadership issues, intelligence gaps, politicization of the conflict, and limited support to the Nigerian military by the international community. Boko Haram looks at the work that has been done thus far, and what work needs to continue, to make gains to combat, marginalize, and ultimately defeat Boko Haram and resolve the conflict facing Nigeria. Key features: Outlines the history of Boko Haram and its emergence in Nigeria Provides the latest developments on fundamentalism in Nigeria, the growth of Boko Haram and the government response Focuses on the attacks, attack methodology and targeting of Boko Haram, addressing best-practice countermeasures Examines Boko Haram's ties to other Islamist groups including ISIL/ISIS and others Details the importance for international cooperation in responding to Boko Haram's activities and threats. About the Author: Dr. Ona Ekhomu, CFE, CPP, CSP, PCI, CPOI was born in Irrua, Nigeria. He holds the PhD from University of Pittsburgh. A policy analyst and security expert, Ekhomu is Chairman Trans-World Security Systems Ltd. and Chairman School of Management and Security (Lagos, Nigeria). President of Trans-World Security Systems Inc. of Chicago, Illinois, USA, Ekhomu is also a lecturer in the Sociology Department of the University of Lagos, Nigeria. He is President of the Association of Industrial Security and Safety Operators of Nigeria; Africa Representative of the International Foundation for Protection Officers; and former Regional Vice-President (West and Central Africa) of ASIS International. Ekhomu is author of Kidnap: Face to Face with Death (2014) and Effective Personal & Corporate Security (2009).
With thorough analysis and balanced reporting, Ghost Guns: Hobbyists, Hackers, and the Homemade Weapons Revolution is an essential resource for readers seeking to understand the rise of homemade firearms and future options for managing them. For more than a century, strict gun control was possible because firearms were produced in centralized industrial factories. Today, the Fourth Industrial Revolution, combining old and new technologies, threatens to upend this arrangement. An increasing number of hobbyists, "makers," technology provocateurs, and sophisticated criminals are proving that you don't need a factory to make guns anymore. The security challenges of this transformation are increasingly apparent, but the technologies behind it hold tremendous potential, and while ignoring the security implications would entail risks, the costs of new policies also must be evaluated. "Do-it-yourself," or DIY, weapons will bring significant ramifications for First and Second Amendment law, international and homeland security, crime control, technology, privacy, innovation, and the character of open source culture itself. How can a liberal society adjust to technologies that make it easier to produce weapons and contraband? Informative and thought-provoking, Ghost Guns: Hobbyists, Hackers, and the Homemade Weapons Revolution carefully analyzes the technical, legal, social, political, and criminological trends behind this challenging new area of illicit weapons activity. Provides readers with informative background on DIY gun laws and legislative trends and fascinating descriptions of legal and illegal practices with homemade weapons around the world Presents in-depth explanations of the consumer appeal, technology, economics, politics, and enforcement challenges behind America's quickly growing DIY gun-making phenomenon Evaluates the current and future appeal of homemade weapons for differing types of crime and terrorism Offers a series of forward-looking recommendations for weapons control and security policy in an increasingly "post-industrial" 21st century
Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.
There is a Russian saying that "police mirror society." The gist of this is that every society is policed to the extent that it allows itself to be policed. Centralized in control but decentralized in their reach, the police are remarkably similar in structure, chain of command, and their relationships with the political elite across post-Soviet nations-they also remain one of the least reformed post-communist institutions. As a powerful state organ, the Soviet-style militarized police have resisted change despite democratic transformations in the overall political context, including rounds of competitive elections and growing civil society. While consensus between citizens and the state about reform may be possible in democratic nations, it is considerably more difficult to achieve in authoritarian states. Across post-Soviet countries, such discussions most often occur between political elites and powerful non-state actors, such as criminal syndicates and nationalistic ethnic groups, rather than the wider citizenry. Even in countries where one or more rounds of democratic elections have taken place since 1991, empowered citizens and politicians have not renegotiated the way states police and coerce society. On the contrary, in many post-Soviet countries, police functions have expanded to serve the interests of the ruling political elites. What does it take to reform a post-Soviet police force? This book explores the conditions in which a meaningful transformation of the police is likely to succeed and when it will fail. Departing from the conventional interpretation of the police as merely an institution of coercion, this book defines it as a medium for state-society consensus on the limits of the state's legitimate use of violence. It thus considers policing not as a way to measure the state's capacity to coerce society, but rather as a reflection of a complex society bound together by a web of casual interactions and political structures. The book compares reform efforts in Ukraine, Georgia, Kyrgyzstan, Kazakhstan, and Tajikistan, finding that bottom-up public mobilization is likely to emerge in the aftermath of transformative violence-an incident when the usual patterns of policing are interrupted with unprecedented brutality against vulnerable individuals. Ultimately, The Politics of Police Reform examines the various pathways to transforming how the state relates to society through policing.
#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021! 2020 Cybersecurity CANON Hall of Fame Winner! Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.
Between 1994-2014, Israel's security service was transformed, becoming one of the most extreme examples of privatised security in the world. This book is an investigation into this period and the conditions that created 'Occupation Inc.': the institution of a private military-security-industrial complex. State sponsored violence is increasing as a result of this securitisation, but why is it necessary, and what are its implications? In this book, Shir Hever considers the impact of the ongoing Palestinian resistance to Israeli occupation, the influence of U.S. military aid and the rise of neoliberalism in Israel, to make sense of this dramatic change in security policy. Through the lens of political economy, this book shows how the Israeli security elites turn violence into a commodity in order to preserve their status and wealth, providing a fresh new perspective on the Israeli occupation. |
![]() ![]() You may like...
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad
Hardcover
R4,186
Discovery Miles 41 860
Evolutionary Computing and Mobile…
V. Suma, Noureddine Bouhmala, …
Hardcover
R5,823
Discovery Miles 58 230
Mechanical Sciences - The Way Forward
Uday S. Dixit, Santosha Kumar Dwivedy
Hardcover
R4,377
Discovery Miles 43 770
Software Architecture in Practice
Len Bass, Paul Clements, …
Paperback
R1,450
Discovery Miles 14 500
|