0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (7)
  • R250 - R500 (39)
  • R500+ (375)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Privacy in Peril - How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience (Paperback): James B.... Privacy in Peril - How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience (Paperback)
James B. Rule
R723 Discovery Miles 7 230 Ships in 10 - 15 working days

This provocative book offers a probing account of the erosion of privacy in American society, that shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience. The author reveals that in today's "information society," the personal data that we make available to virtually any organization for virtually any purpose is apt to surface elsewhere, applied to utterly different purposes. The mass collection and processing of personal information produces such tremendous efficiencies that both the public and private sector feel justified in pushing as far as they can into our private lives. And there is no easy cure. Indeed, there are many cases where privacy invasion is both hurtful to the individual and indispensable to an organization's quest for efficiency. And as long as we willingly accept the pursuit of profit, or the reduction of crime, or cutting government costs as sufficient reason for intensified scrutiny over our lives, then privacy will remain endangered.

The Handbook of Communication and Security (Paperback): Bryan C. Taylor, Hamilton Bean The Handbook of Communication and Security (Paperback)
Bryan C. Taylor, Hamilton Bean
R2,738 Discovery Miles 27 380 Ships in 10 - 15 working days

The Handbook of Communication and Security provides a comprehensive collection and synthesis of communication scholarship that engages security at multiple levels, including theoretical vs. practical, international vs. domestic, and public vs. private. The handbook includes chapters that leverage communication-based concepts and theories to illuminate and influence contemporary security conditions. Collectively, these chapters foreground and analyze the role of communication in shaping the economic, technological, and cultural contexts of security in the 21st century. This book is ideal for advanced undergraduate and postgraduate students and scholars in the numerous subfields of communication and security studies.

Intelligence on the Frontier Between State and Civil Society (Hardcover): Karen Lund Petersen, Kira Ronn Intelligence on the Frontier Between State and Civil Society (Hardcover)
Karen Lund Petersen, Kira Ronn
R4,205 Discovery Miles 42 050 Ships in 10 - 15 working days

Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security.

Researching National Security Intelligence - Multidisciplinary Approaches (Hardcover): Stephen Coulthart, Michael... Researching National Security Intelligence - Multidisciplinary Approaches (Hardcover)
Stephen Coulthart, Michael Landon-Murray, Damien Van Puyvelde; Contributions by Stephen Coulthart, Michael Landon-Murray, …
R3,444 R2,614 Discovery Miles 26 140 Save R830 (24%) Ships in 10 - 15 working days

Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.

Soft Target Hardening - Protecting People from Attack (Hardcover, 2nd edition): Jennifer Hesterman Soft Target Hardening - Protecting People from Attack (Hardcover, 2nd edition)
Jennifer Hesterman
R6,367 Discovery Miles 63 670 Ships in 10 - 15 working days

The US government spends billions of dollars to secure strategic and tactical assets at home and abroad against enemy attack. However, as "hard targets" such as military installations and government buildings are further strengthened, vulnerable soft targets are increasingly in the crosshairs of terrorists and violent criminals. Attacks on crowded spaces such as churches, schools, malls, transportation hubs, and recreational venues result in more casualties and have a powerful effect on the psyche of the populace. Soft Target Hardening: Protecting People from Attack, Second Edition, continues the national dialogue started by the first edition by providing case studies, best practices, and methodologies for identifying soft target vulnerabilities and reducing risk in the United States and beyond. Soft target attacks steadily climbed in number and scale of violence since the first edition of this book. New tactics emerged, as terrorists continually hit the "reset button" with each attack. In this volatile, ever-changing security environment, plans to protect people and property must be fluid and adaptable. Along with new hardening tactics, such as the use of tactical deception to disguise, conceal, and divert, the author has updated the text with new case studies to reflect and respond to the fast-moving transformation in methods from more complex and organized forms of terror to simpler, yet still-devastating approaches. This book is a must-read for those who secure, own, and operate soft target facilities, and for citizens who want to protect themselves and their families from attack. Soft Target Hardening, Second Edition, was named the ASIS International Security Industry Book of the Year in 2019.

The Insider Threat - Assessment and Mitigation of Risks (Hardcover): Eleanor E. Thompson The Insider Threat - Assessment and Mitigation of Risks (Hardcover)
Eleanor E. Thompson
R2,041 Discovery Miles 20 410 Ships in 10 - 15 working days

This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.

US National Cybersecurity - International Politics, Concepts and Organization (Paperback): Damien Van Puyvelde, Aaron Brantly US National Cybersecurity - International Politics, Concepts and Organization (Paperback)
Damien Van Puyvelde, Aaron Brantly
R1,460 Discovery Miles 14 600 Ships in 10 - 15 working days

This volume explores the contemporary challenges to US national cybersecurity. Taking stock of the field, it features contributions by leading experts working at the intersection between academia and government and offers a unique overview of some of the latest debates about national cybersecurity. These contributions showcase the diversity of approaches and issues shaping contemporary understandings of cybersecurity in the West, such as deterrence and governance, cyber intelligence and big data, international cooperation, and public-private collaboration. The volume's main contribution lies in its effort to settle the field around three main themes exploring the international politics, concepts, and organization of contemporary cybersecurity from a US perspective. Related to these themes, this volume pinpoints three pressing challenges US decision makers and their allies currently face as they attempt to govern cyberspace: maintaining international order, solving conceptual puzzles to harness the modern information environment, and coordinating the efforts of diverse partners. The volume will be of much interest to students of cybersecurity, defense studies, strategic studies, security studies, and IR in general.

Public, Private, Secret - On Photography & the Configuration of Self (Paperback): Charlotte Cotton Public, Private, Secret - On Photography & the Configuration of Self (Paperback)
Charlotte Cotton; Marina Chao, Pauline Vermare
R710 R639 Discovery Miles 6 390 Save R71 (10%) Ships in 18 - 22 working days

Public, Private, Secret explores the roles that photography and video play in the crafting of identity, and the reconfiguration of social conventions that define our public and private selves. Consciously framed by our present era, this collection of essays, interviews, and reflections assesses how our image-making and consumption patterns are embedded and implicated in a wider matrix of online behavior and social codes, which in turn give images a life of their own. Within this context, our visual creations and online activities blur and remove conventional delineations between public and private (and sometimes secret) expression; in fact, they multiply and expand the number of potential selves in the contemporary image-centric world. The writings address the various disruptions, resistances, and subversions that artists propose to the limited versions of race, gender, sexuality, and autonomy that populate mainstream popular culture. In so doing, they anticipate a future for our image-world rich with diversity and alterity, one that can be shaped and influenced by the agency of self- representation.

Bouncers - Violence and Governance in the Night-Time Economy (Paperback, Revised): Dick Hobbs, Philip Hadfield, Stuart Lister,... Bouncers - Violence and Governance in the Night-Time Economy (Paperback, Revised)
Dick Hobbs, Philip Hadfield, Stuart Lister, Simon Winlow
R792 Discovery Miles 7 920 Ships in 10 - 15 working days

In recent years, the expansion of night-time leisure has emerged as a key indicator of post-industrial urban prosperity, attracting investment, creating employment and re-generating the built environment. These leisure economies are youth-dominated, focusing upon the sale and consumption of alcohol. Unprecedented numbers of young people now flock to town centres that are crammed with bars, pubs and clubs, and the resulting violent disorder has over run police resources that remain geared to the drinking patterns and alcohol cultures of previous generations. Post-industrial re-structuring has spawned an increasingly complex mass of night-time leisure options through which numerous licit and illicit commercial opportunities flow. Yet, regardless of the fashionable and romantic notions of many contemporary urban theorists, it is alcohol, mass intoxication and profit rather than 'cultural regeneration,' which lies at the heart of this rapidly expanding dimension of post-industrial urbanism. Private security in the bulky form of bouncers fills the void left by the public police. These men (only 7% are women), whose activities are barely regulated by the State, are dominated by a powerful subculture rooted in routine violence and intimidation. Using ethnography, participant observation and extensive interviews with all the main players, this controversial book charts the emergence of the bouncer as one of the most graphic symbols in the iconography of post industrial Britain.

Surveillance and Security - Technological Politics and Power in Everyday Life (Paperback, New edition): Torin Monahan Surveillance and Security - Technological Politics and Power in Everyday Life (Paperback, New edition)
Torin Monahan
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

This is a volume of original contributions from scholars in eight different humanities and social science disciplines. The aim of the book is to present a range of surveillance technologies used in everyday life and investigate the politics of their use. It is truly an interdisciplinary project that will find purchase in courses on security studies and the sociology of culture and the sociology of science. Courses on security studies and its impact on culture can be found in a variety of academic departments including STS, criminology, sociology, women's studies, anthropology, political science and justice studies.

Business and Security - Public-Private Sector Relationships in a New Security Environment (Hardcover): Alyson J.K. Bailes,... Business and Security - Public-Private Sector Relationships in a New Security Environment (Hardcover)
Alyson J.K. Bailes, Isabel Frommelt
R1,305 Discovery Miles 13 050 Ships in 10 - 15 working days

The private business sector suffered both directly and indirectly from the terrorist strikes of 11 September 2001. Many business workers perished in the New York World Trade Center, and the insurance, transport, and tourism industries were hard hit by the aftermath. Restrictions imposed in the name of security made business travel and the movement of goods more complicated. The private sector was called upon to support the fight against terrorism actively with tougher controls on money transfers and on the export of dangerous materials and technologies. These events offered a striking case of the growing interdependence of the private and public sectors in tackling present-day security challenges. The impact of the private sector, for good or ill, in areas of conflict has long been recognized. Private business is at the centre of the latest concerns over the vulnerability of crucial infrastructures, including energy supply. Systematic public-private sector consultation and partnership are needed to tackle these problems, but neither the principles nor comprehensive mechanisms for such cooperation have yet been identified. This book brings together reflections on general and specific aspects of public-private sector interaction, from a variety of experts in business, government, international organizations, and the academic world. For completeness and balance, it also enquires into the costs of security and includes perspectives from Africa and the Arab world. It offers new reference material to help in the further exploration of this important subject.

Privatising Justice - The Security Industry, War and Crime Control (Paperback): Wendy Fitzgibbon, John Lea Privatising Justice - The Security Industry, War and Crime Control (Paperback)
Wendy Fitzgibbon, John Lea
R699 Discovery Miles 6 990 Ships in 10 - 15 working days

Privatising Justice takes a broad historical view of the role of the private sector in the British state, from private policing and mercenaries in the eighteenth century to the modern rise of the private security industry in armed conflict, policing and the penal system. The development of the welfare state is seen as central to the decline of what the authors call 'old privatisation'. Its succession by neoliberalism has created the ground for the resurgence of the private sector. The growth of private military, policing and penal systems is located within the broader global changes brought about by neoliberalism and the dystopian future that it portends. The book is a powerful petition for the reversal of the increasing privatisation of the state and the neoliberalism that underlies it.

The Grey Men - Pursuing the Stasi into the Present (Paperback): Ralph Hope The Grey Men - Pursuing the Stasi into the Present (Paperback)
Ralph Hope
R303 Discovery Miles 3 030 Ships in 10 - 15 working days

'Fascinating and powerful.' Sunday Times What do you do with a hundred thousand idle spies? By 1990 the Berlin Wall had fallen and the East German state security service folded. For forty years, they had amassed more than a billion pages in manila files detailing the lives of their citizens. Almost a hundred thousand Stasi employees, many of them experienced officers with access to highly personal information, found themselves unemployed overnight. This is the story of what they did next. Former FBI agent Ralph Hope uses present-day sources and access to Stasi records to track and expose ex-officers working everywhere from the Russian energy sector to the police and even the government department tasked with prosecuting Stasi crimes. He examines why the key players have never been called to account and, in doing so, asks if we have really learned from the past at all. He highlights a man who continued to fight the Stasi for thirty years after the Wall fell, and reveals a truth that many today don't want spoken. The Grey Men comes as an urgent warning from the past at a time when governments the world over are building an unprecedented network of surveillance over their citizens. Ultimately, this is a book about the present.

Private Security Vol 1 (Paperback): B. George, M Button Private Security Vol 1 (Paperback)
B. George, M Button
R1,389 Discovery Miles 13 890 Ships in 18 - 22 working days

Private security is now a multi-billion pound industry employing more personnel than the police. The authors provide incisive insights into the security world, scanning its weaknesses and exploring its potential. Based upon original research, supported by years of experience, they suggest that new ways of looking at the modern security world are long overdue. Private Security is a highly innovative book containing a wealth of up-to-date material. It is the definitive guide to the security world.

Casino Security and Gaming Surveillance (Hardcover, 3rd Edition): Derk J. Boss, Alan W. Zajic Casino Security and Gaming Surveillance (Hardcover, 3rd Edition)
Derk J. Boss, Alan W. Zajic
R4,229 Discovery Miles 42 290 Ships in 10 - 15 working days

Almost all incidences of cheating, theft, fraud, or loss can be detected through the surveillance of critical transactions, audit observations, and reviews of key metrics. Providing proven-techniques for detecting and mitigating the ever-evolving threats to casino security, this book covers the core skills, knowledge, and techniques needed to protect casino assets, guests, and employees.

Drawing on the authors’ six decades of combined experience in the industry, Casino Security and Gaming Surveillance identifies the most common threats to casino security and provides specific solutions for addressing these threats. From physical security and security management to table and gaming surveillance, it details numerous best practice techniques, strategies, and tactics, in addition to the metrics required to effectively monitor operations. The authors highlight valuable investigation tools, including interview techniques and evidence gathering. They also cover IOU patrol, tri-shot coverage, surveillance audits, threat analysis, card counting, game protection techniques, players’ club theft and fraud, surveillance standard operating procedures, nightclub and bar security, as well as surveillance training.

Complete with a glossary of gaming terms and a resource-rich appendix that includes helpful forms, this book covers everything surveillance and security professionals need to know to avoid high-profile incidents, costly compliance violations and damage to property and revenue.

Table of Contents

Section I: Surveillance in Gaming Operations

Chapter 1: Camera Operational Techniques

Chapter 2: Game Protection

Chapter 3: Internal Theft and Fraud

Chapter 4: Security Surveillance

Chapter 5: Standard Operating Procedures

Chapter 6: Investigations

Chapter 7: Surveillance Training and Education

Chapter 8: Statistical Information and Analysis

Chapter 9: Surveillance in the Future

Section II: Physical Security in Gaming Operations

Chapter 10: The Gaming Security Officer’s Role

Chapter 11: Security Patrols and Assignments in the Gaming Environment

Chapter 12: Alcohol and the Gaming Environment

Chapter 13: Table Game Fills, Credits, Drops, and Money

Chapter 14: Managing and Controlling Incidents

Chapter 15: Removing Undesirables

Chapter 16: Arrests and Detainments

Chapter 17: Theft, Larceny, and Other Property Crimes

Chapter 18: The Major Security Incident

Chapter 19: Training Gaming Security Officers

Chapter 20: Common Casino Scams and Crimes

Chapter 21: Managing Casino Security

The Age of Surveillance Capitalism - The Fight for a Human Future at the New Frontier of Power (Hardcover): Shoshana Zuboff The Age of Surveillance Capitalism - The Fight for a Human Future at the New Frontier of Power (Hardcover)
Shoshana Zuboff 1
R1,018 R837 Discovery Miles 8 370 Save R181 (18%) Ships in 18 - 22 working days

The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it.

Preventing and Managing Violence in Organizations - Workplace Violence, Targeted Violence, and Active Shooters (Hardcover):... Preventing and Managing Violence in Organizations - Workplace Violence, Targeted Violence, and Active Shooters (Hardcover)
Marc H. Siegel
R4,204 Discovery Miles 42 040 Ships in 10 - 15 working days

Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue. As such, the book's objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach. The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager. While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization's system of management and all its activities and functions. The "Introduction" section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization's overall business management strategy. The "Framework" section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The "Tactics and Control Measures" section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events. For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach. Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization's day-to-day activities-as an integral part of these activities-rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.

A Comprehensive Look at Fraud Identification and Prevention (Hardcover): James R. Youngblood A Comprehensive Look at Fraud Identification and Prevention (Hardcover)
James R. Youngblood
R3,242 Discovery Miles 32 420 Ships in 10 - 15 working days

Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention. The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include: Employee theft and fraud Organizational fraud Identity theft and fraud Fraud against the elderly Internet, computer, and e-mail fraud Ponzi and pyramid schemes The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers. Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.

Hospitality Security - Managing Security in Today's Hotel, Nightlife, Entertainment, and Tourism Environment (Paperback,... Hospitality Security - Managing Security in Today's Hotel, Nightlife, Entertainment, and Tourism Environment (Paperback, 2nd edition)
Darrell Clifton
R1,900 Discovery Miles 19 000 Ships in 10 - 15 working days

Outlines risk assessments in which threats and vulnerabilities are calculated with probabilities to determine risk Presents how to establish a security plan, and, in this, how to determine the best deployment of various layers of control to mitigate risks Offers an overview of budgeting-determining, advocating for, and implementing the security program based on allotted funding Details how to document policies into a security manual, training manual, emergency procedures manual, and incident action plan Provides the ins and outs of staffing including scheduling, wages, deployment, and contract security Examines training best practices including physical security, emergency response and procedures, as well as specialized topics such as use of force and patrol procedures Explains prostitution and human trafficking, presenting sections with a focus on awareness and prevention

Cultural Property Security - Protecting Museums, Historic Sites, Archives, and Libraries (Hardcover): Daniel J Benny Cultural Property Security - Protecting Museums, Historic Sites, Archives, and Libraries (Hardcover)
Daniel J Benny
R4,216 Discovery Miles 42 160 Ships in 10 - 15 working days

The protection and security of cultural properties is of primary concern to the thousands of federal, state, county, city, and private institutions entrusted with housing and displaying our national heritage and history of our society. Cultural property security is of global importance as well, with tens of thousands of institutions internationally tasked with protecting and maintaining relics and artifacts of social, cultural, and historical significance. Cultural Property Security offers powerful protection guidelines to security departments tasked with safeguarding popular historical sites, museums, and libraries and the historical artifacts they house. Presenting practical, ready-to-implement solutions in a clear writing style, the book: Provides a working definition of cultural properties Identifies the threats against cultural properties from crime and terrorism, particularly in regions with political or civil unrest Offers guidance in threat assessment Identifies the physical security measures and technology that can be used to protect such institutions Presents guidelines for establishing a protective service department for cultural properties Describes proper arrest and post-arrest protocols Includes a list of online resources for further information related to the protection of cultural properties Complete with dozens of photos, the book establishes leading industry best practices to identify the various threats to cultural properties and protect them. Dr. Daniel J. Benny has more than 35 years of security management experience and has served as a Director of Protective Services for the state of Pennsylvania's Historic and Museum Commission. His insight is invaluable to those responsible for securing these institutions from internal and external threats.

Churchill's Bodyguard (Paperback, New ed): Tom Hickman Churchill's Bodyguard (Paperback, New ed)
Tom Hickman 2
R316 R287 Discovery Miles 2 870 Save R29 (9%) Ships in 9 - 17 working days

For fans of Darkest Hour and Dunkirk, discover the story of Walter H. Thompson, the man who saved Winston Churchill's life more than once. Walter H. Thompson was Churchill's bodyguard from 1921 until 1945, brought back from retirement at the outbreak of war. Tom Hickman's authorised biography draws heavily on extracts from a manuscript recently discovered by his great-niece, in which Thompson gives a unique insider's account of a number of occasions on which Churchill's life was put seriously at risk and his intervention was needed. After the war, Thompson married one of Churchill's secretaries, and her recollections, as well as those of surviving family members, are interwoven to tell the revelatory inside story of life beside the Greatest Briton.

Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Paperback):... Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Paperback)
Bruce Turner
R1,161 Discovery Miles 11 610 Ships in 10 - 15 working days

Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the 'mailroom to the boardroom' follows the story of a young banker who moved into the internal auditing profession as part of the 'new breed', then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.

Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Hardcover): Douglas J Landoll Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Hardcover)
Douglas J Landoll
R3,788 Discovery Miles 37 880 Ships in 10 - 15 working days

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.

War Virtually - The Quest to Automate Conflict, Militarize Data, and Predict the Future (Hardcover): Roberto J. Gonzalez War Virtually - The Quest to Automate Conflict, Militarize Data, and Predict the Future (Hardcover)
Roberto J. Gonzalez
R651 Discovery Miles 6 510 Ships in 10 - 15 working days

A critical look at how the US military is weaponizing technology and data for new kinds of warfare-and why we must resist. War Virtually is the story of how scientists, programmers, and engineers are racing to develop data-driven technologies for fighting virtual wars, both at home and abroad. In this landmark book, Roberto J. Gonzalez gives us a lucid and gripping account of what lies behind the autonomous weapons, robotic systems, predictive modeling software, advanced surveillance programs, and psyops techniques that are transforming the nature of military conflict. Gonzalez, a cultural anthropologist, takes a critical approach to the techno-utopian view of these advancements and their dubious promise of a less deadly and more efficient warfare. With clear, accessible prose, this book exposes the high-tech underpinnings of contemporary military operations-and the cultural assumptions they're built on. Chapters cover automated battlefield robotics; social scientists' involvement in experimental defense research; the blurred line between political consulting and propaganda in the internet era; and the military's use of big data to craft new counterinsurgency methods based on predicting conflict. Gonzalez also lays bare the processes by which the Pentagon and US intelligence agencies have quietly joined forces with Big Tech, raising an alarming prospect: that someday Google, Amazon, and other Silicon Valley firms might merge with some of the world's biggest defense contractors. War Virtually takes an unflinching look at an algorithmic future-where new military technologies threaten democratic governance and human survival.

Boko Haram - Security Considerations and the Rise of an Insurgency (Hardcover): Ona Ekhomu Boko Haram - Security Considerations and the Rise of an Insurgency (Hardcover)
Ona Ekhomu
R3,514 Discovery Miles 35 140 Ships in 10 - 15 working days

Boko Haram analyzes the activities and atrocities of Nigeria's Jihadi terrorist group, Boko Haram, in the context of global religious fundamentalism and extremism. The book traces the early beginnings of the religious sect, the conversion of its leader to radical Islam in 2002, and the group's campaign of violence beginning in 2009 and continuing to the present. The group's attacks against a variety of targets are examined in detail as are their general tactics and strategies. The Nigerian government response is also examined in order to provide critical lessons to counterterrorism planners, policy and government officials, and scholars. The initial military response was hampered by capability and legislative constraints including a lack of arms and ammunition, a lack of modern counterterrorism equipment, training gaps, leadership issues, intelligence gaps, politicization of the conflict, and limited support to the Nigerian military by the international community. Boko Haram looks at the work that has been done thus far, and what work needs to continue, to make gains to combat, marginalize, and ultimately defeat Boko Haram and resolve the conflict facing Nigeria. Key features: Outlines the history of Boko Haram and its emergence in Nigeria Provides the latest developments on fundamentalism in Nigeria, the growth of Boko Haram and the government response Focuses on the attacks, attack methodology and targeting of Boko Haram, addressing best-practice countermeasures Examines Boko Haram's ties to other Islamist groups including ISIL/ISIS and others Details the importance for international cooperation in responding to Boko Haram's activities and threats. About the Author: Dr. Ona Ekhomu, CFE, CPP, CSP, PCI, CPOI was born in Irrua, Nigeria. He holds the PhD from University of Pittsburgh. A policy analyst and security expert, Ekhomu is Chairman Trans-World Security Systems Ltd. and Chairman School of Management and Security (Lagos, Nigeria). President of Trans-World Security Systems Inc. of Chicago, Illinois, USA, Ekhomu is also a lecturer in the Sociology Department of the University of Lagos, Nigeria. He is President of the Association of Industrial Security and Safety Operators of Nigeria; Africa Representative of the International Foundation for Protection Officers; and former Regional Vice-President (West and Central Africa) of ASIS International. Ekhomu is author of Kidnap: Face to Face with Death (2014) and Effective Personal & Corporate Security (2009).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bioinspired Computation in Combinatorial…
Frank Neumann, Carsten Witt Hardcover R1,426 Discovery Miles 14 260
Handbook of Research on Modeling…
Sujata Dash, B. K. Tripathy, … Hardcover R6,518 Discovery Miles 65 180
Music-Inspired Harmony Search Algorithm…
Zong Woo Geem Hardcover R2,763 Discovery Miles 27 630
Advanced HDL Synthesis and SOC…
Vaibbhav Taraate Hardcover R4,644 Discovery Miles 46 440
Applied Artificial Intelligence - A…
Swati V. Shinde, Varsha Bendre, … Hardcover R3,369 Discovery Miles 33 690
Handbook of Research on Fireworks…
Ying Tan Hardcover R8,027 Discovery Miles 80 270
Glowworm Swarm Optimization - Theory…
Krishnanand N. Kaipa, Debasish Ghose Hardcover R3,906 R3,376 Discovery Miles 33 760
Genetic Programming Theory and Practice…
Rick Riolo, Trent McConaghy, … Hardcover R2,797 Discovery Miles 27 970
Iterative Learning Control - An…
David H. Owens Hardcover R4,567 Discovery Miles 45 670
Genetic Programming Theory and Practice…
Rick Riolo, Una-May O'Reilly, … Hardcover R2,781 Discovery Miles 27 810

 

Partners