![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
This book demystifies and explains a subject that affects every one of us in our private lives and at work. Security is a practical discipline concerned with safeguarding lives, property, information, wealth, reputations, and social wellbeing. It is the basis of civilised society. People, businesses, and nations cannot thrive in its absence, whereas the right kind of security frees us to live fulfilling lives. But deciding what is needed, and then making it happen, is not easy. The threats to our security are complex and continually evolving, as criminals, hackers, terrorists, and hostile foreign states continually find new ways of staying one step ahead of us, their potential victims. At the same time, we are continually creating new vulnerabilities as we adopt new technologies and new ways of working. Those who do not understand the fundamentals of security, risk, and resilience open themselves, and those around them, to avoidable dangers, needless anxieties, and unnecessary costs. Inadequate security may leave them exposed to intolerable risks, while the wrong kind of security is expensive, intrusive, and ineffective. In his essential new book, world-leading security expert Paul Martin sets out the ten most important guiding principles of protective security and resilience. Clearly expressed in the form of simple but powerful rules of thumb, their purpose is to help solve complicated problems for which there are no textbook solutions. The rules offer a powerful toolkit, designed to work in many different situations, including the cyber domain. When we are faced with novel problems requiring complex decisions, it is easy to focus on the wrong things. These rules remind us what really matters. The psychological and behavioural aspects of security are key themes throughout the book. People lie at the heart of security. The criminals, terrorists, and hackers are social animals with complex emotions and psychological predispositions. So too are the victims of those attackers and the security practitioners who strive to protect us. The human dimension is therefore crucial to understanding security. The Rules of Security will help anyone with an interest in their own security and that of their home, family, business, or society. It will be indispensable to those in positions of responsibility, allowing them to understand how best to protect their organisation, people, and assets. It assumes no expert technical knowledge and explains the ideas in clear and simple terms. It will appeal to anyone with an interest in security. If you read only one book about security, it should be this one.
Roy Snell has been in what he calls "close protection" for more than 16 years, guarding international royalty and celebrities including Madonna, Schwarzenegger, Stallone, Bruce Willis, Tom Jones, and Frank Sinatra. A former SAS sniper and heavyweight boxing champion, Roy is Britain's ultimate bodyguard. Roy was trained at the Regency College in Herefordshire, where the royal protection squad is drilled. He started out in security at showcases for the big bands of the 1980s--Duran Duran, Eurythmics, Aha, Kajagoogoo, and at a Wham! gig, he protected George Michael from a man with a baseball bat. A "Category A" bodyguard--a level that takes two years of training to reach--Roy is qualified to look after top level celebrity clients, from film stars to athletes, singers to royalty. Roy is also a skilled marksman trained in the use of the 9mm Bereta sub-machine gun and the 38 Snubnose--the standard issue weapon for the FBI.
A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides readers through important issues involving technology, data collection, and digital privacy as they apply to our daily lives. Our Data, Ourselves covers a broad range of everyday privacy concerns with easily digestible, accessible overviews and real-world examples. Lipton explores the ways we can protect our personal data and monitor its use by corporations, the government, and others. She also explains our rights regarding sensitive personal data like health insurance records and credit scores, as well as what information retailers can legally gather, and how. Who actually owns our personal information? Can an employer legally access personal emails? What privacy rights do we have on social media? Answering these questions and more, Our Data, Ourselves provides a strategic approach to assuming control over, and ultimately protecting, our personal information.
This provocative book offers a probing account of the erosion of privacy in American society, that shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience. The author reveals that in today's "information society," the personal data that we make available to virtually any organization for virtually any purpose is apt to surface elsewhere, applied to utterly different purposes. The mass collection and processing of personal information produces such tremendous efficiencies that both the public and private sector feel justified in pushing as far as they can into our private lives. And there is no easy cure. Indeed, there are many cases where privacy invasion is both hurtful to the individual and indispensable to an organization's quest for efficiency. And as long as we willingly accept the pursuit of profit, or the reduction of crime, or cutting government costs as sufficient reason for intensified scrutiny over our lives, then privacy will remain endangered.
The present book addresses the prospects for security sector reform and governance regimes, focusing on democratic civilian control of armed forces. It assesses the extent to which the pioneering OSCE experience has inspired Africa and the Americas within their respective multilateral institutional settings.
Political discourse on immigration in the United States has largely focused on what is most visible, including border walls and detention centers, while the invisible information systems that undergird immigration enforcement have garnered less attention. Tracking the evolution of various surveillance-related systems since the 1980s, Borderland Circuitry investigates how the deployment of this information infrastructure has shaped immigration enforcement practices. Ana Muniz illuminates three phenomena that are becoming increasingly intertwined: digital surveillance, immigration control, and gang enforcement. Using ethnography, interviews, and analysis of documents never before seen, Muniz uncovers how information-sharing partnerships between local police, state and federal law enforcement, and foreign partners collide to create multiple digital borderlands. Diving deep into a select group of information systems, Borderland Circuitry reveals how those with legal and political power deploy the specter of violent cross-border criminals to justify intensive surveillance, detention, brutality, deportation, and the destruction of land for border militarization.
This practical reference provides the basics for instituting a
corporate anti-fraud program that helps prepare corporate security
professionals and other corporate managers for fighting corporate
fraud from inside the company. It provides an exceptional
foundation for security professionals or business executives
involved in developing and implementing a corporate anti-fraud
program as part of a corporate assets protection program.
'This book will change the way you think about today's new media technologies' - Daniel J. Solove, author of ""The Digital Person: Technology and Privacy in the Information Age"". Whether you're purchasing groceries with your Safeway 'club card' or casting a vote on ""American Idol"", those data are being collected. From Amazon to iTunes, smart phones to GPS devices, Google to TiVo - all of these products and services give us an expansive sense of choice, access, and participation. Mark Andrejevic shows, however, that these continuously evolving new technologies have also been employed as modes of surveillance and control, most disturbingly exemplified by revelations about the NSA's secret monitoring of our phone calls, e-mails, and internet searches. Many contend that our proliferating interactive media empower individuals and democratize society. But, Andrejevic asks, at what cost? In ""iSpy"", he reveals that these and other highly advertised benefits are accompanied by hidden risks and potential threats that we all tend to ignore. His book, providing the first sustained critique of a concept that has been a talking point for twenty years, debunks the false promises of the digital revolution still touted by the popular media while seeking to rehabilitate, rather than simply write off, the potentially democratic uses of interactive media. Andrejevic opens up the world of digital rights management and the data trail each of us leaves - data about our locations, preferences, or life events that are already put to use in various economic, political, and social contexts. He notes that, while citizens are becoming increasingly transparent to private and public monitoring agencies, they themselves are unable to access the information gathered about them - or know whether it's even correct. (The watchmen, it seems, don't want to be watched.) He also considers the appropriation of consumer marketing for political campaigns in targeting voters and examines the implications of the Internet for the so-called War on Terror. In ""iSpy"", Andrejevic poses real challenges for our digital future. Amazingly detailed, compellingly readable, it warns that we need to temper our enthusiasm for these technologies with a better understanding of the threats they pose - to be able to distinguish between interactivity as centralized control and as collaborative participation.
The March 2006 furor over a Dubai firms attempt to purchase the company managing some U.S. ports illustrates the difficult homeland security challenges that exist at the nexus of privately owned critical assets as well as global interdependence. Unfortunately, nearly five years after the September 11 attacks on New York and Washington, D.C., federal efforts to enlist the private sector in bolstering homeland security remain largely stillborn. Neglected Defense offers a thoughtful and tightly reasoned analysis of why that is so. It presents a way forward for strengthening cooperation between the private sector and government on homeland security. The report begins by laying out the policy dilemma in detail. It offers a recent history of the security role of the private sector, and highlights specific problems that have kept public-private security partnerships from maturing. It concludes with a series of recommendationsfor Congress, the Bush administration, and the private sectorto better secure the homeland.
Since the terrorist attacks of September 2001, surveillance has been put forward as the essential tool for the aEURO"war on terror,aEURO(t) with new technologies and policies offering police and military operatives enhanced opportunities for monitoring suspect populations. The last few years have also seen the publicaEURO(t)s consumer tastes become increasingly codified, with aEURO"data minesaEURO(t) of demographic information such as postal codes and purchasing records. Additionally, surveillance has become a form of entertainment, with aEURO"realityaEURO(t) shows becoming the dominant genre on network and cable television.In The New Politics of Surveillance and Visibility, editors Kevin D. Haggerty and Richard V. Ericson bring together leading experts to analyse how society is organized through surveillance systems, technologies, and practices. They demonstrate how the new political uses of surveillance make visible that which was previously unknown, blur the boundaries between public and private, rewrite the norms of privacy, create new forms of inclusion and exclusion, and alter processes of democratic accountability. This collection challenges conventional wisdom and advances new theoretical approaches through a series of studies of surveillance in policing, the military, commercial enterprises, mass media, and health sciences.
In recent years, the expansion of night-time leisure has emerged as a key indicator of post-industrial urban prosperity, attracting investment, creating employment and re-generating the built environment. These leisure economies are youth-dominated, focusing upon the sale and consumption of alcohol. Unprecedented numbers of young people now flock to town centres that are crammed with bars, pubs and clubs, and the resulting violent disorder has over run police resources that remain geared to the drinking patterns and alcohol cultures of previous generations. Post-industrial re-structuring has spawned an increasingly complex mass of night-time leisure options through which numerous licit and illicit commercial opportunities flow. Yet, regardless of the fashionable and romantic notions of many contemporary urban theorists, it is alcohol, mass intoxication and profit rather than 'cultural regeneration,' which lies at the heart of this rapidly expanding dimension of post-industrial urbanism. Private security in the bulky form of bouncers fills the void left by the public police. These men (only 7% are women), whose activities are barely regulated by the State, are dominated by a powerful subculture rooted in routine violence and intimidation. Using ethnography, participant observation and extensive interviews with all the main players, this controversial book charts the emergence of the bouncer as one of the most graphic symbols in the iconography of post industrial Britain.
The Security Handbook, Second Edition is a user-friendly guide for
security officers and guards, covering everything from introductory
information to advanced topics. Whether looking for entry into the
profession or development within the security industry, this book
offers the practical information, training, and need-to-know
techniques for the realization of professional goals.
Internal loss is one of the most costly forms of loss. Embezzlement
is one of the least detected and prosecuted forms of internal
theft. Preventing Corporate Embezzlement is a professional
reference that offers solutions. Managers, auditors and others
charged with protecting assets must achieve a heightened awareness
of embezzlement. They need to recognize and understand the
opportunities, methods, and varieties of embezzlement, as well as
establish internal controls that will prevent and detect
embezzlement.
This book begins by laying out a history of espionage that clearly
shows that when a new technology or technique becomes available to
the information gatherers in public and private sectors, they can
quickly be adopted for Netspionage use. It then moves on to
describe how the Internet and associated technologies have already
revolutionized the collection and analysis of competitive
information. The convergence of dependency on networked and
exploitation tools (often propagated by "hackers," "cyberpunks,"
and even intelligence agencies) has already resulted in several
incidents that foreshadow the perilous future. Close study of these
incidents demonstrates how difficult yet how important it is to
confront the challenges of "netspionage" and its less intrusive
cousins. The authors present a set of the known incidents and then
outline protective measures that will reduce the potential and
consequences of netspionage.
This book addresses public safety and security from a holistic and
visionary perspective. For the first time, safety and security
organizations, as well as their administration, are brought
together into an integrated work.
Model Security Policies, Plans, and Procedures contains sample
security policy, planning, and procedural documents drawn from the
proven experiences of hundreds of America's most successful
corporations. If your job requires you to develop or update
security policies, plans, or procedures, this book will be a highly
valuable resource. The samples cover the key concepts of
organizational protection. Putting the samples to use, either as
presented or as drafting guides, can eliminate many hours of
tedious research and writing.
By covering the essential tips and techniques for investigators,
Investigations: 150 Things You Should Know becomes a useful
reference. By further covering the legal guidelines that
investigators must follow, it becomes indispensable. Through
anecdotes, case studies, and documented procedures the authors of
this book have amassed the most complete collection of
investigative information available.
With half of all new businesses failing in the first two years,
every aspect of good business planning must be considered, but loss
prevention is very often overlooked. Most small business owners
grapple with the day to day challenges of sales and marketing,
never realizing that the shadow of shrinkage is expanding daily,
waiting to reveal itself in the annual inventory results. Ravaged
by theft and paperwork losses, the already tight profit margin can
shrink into oblivion. Loss Prevention and the Small Business opens
the eyes of the reader to the reality of shrinkage in all its
guises including shoplifting, fraud, and embezzlement. Armed with
this awareness, the security specialist or owner/manager can
utilize the many strategies to both inhibit losses and aggressively
pursue those persons and processes that cause losses.
Premises Security: A Guide for Attorneys and Security Professionals
guides the security professional through the ins and outs of
premises security liability. Premises security litigation claims
represent a serious financial threat to owners and occupiers of
property. This book provides an overview of risk assessment
techniques, identification of reasonable security measures, legal
issues and litigation strategies.
Police Visibility presents empirically grounded research into how police officers experience and manage the information politics of surveillance and visibility generated by the introduction of body cameras into their daily routines and the increasingly common experience of being recorded by civilian bystanders. Newell elucidates how these activities intersect with privacy, free speech, and access to information law and argues that rather than being emancipatory systems of police oversight, body-worn cameras are an evolution in police image work and state surveillance expansion. Throughout the book, he catalogs how surveillance generates information, the control of which creates and facilitates power and potentially fuels state domination. The antidote, he argues, is robust information law and policy that puts the power to monitor and regulate the police squarely in the hands of citizens.
This is a truly unique collection of 39 articles written by
authorities or based on authoritative research. It goes beyond
locks, lighting, and alarms to offer provocative viewpoints on a
variety of security topics. The book looks beyond everyday applications and routines to an
understanding of the social significance of careers in security. It
will be of interest to practitioners in all sectors as well as
students at all levels.
The idea of espionage has always carried a certain mystique, having
grown its roots in the political and national defense spheres.
Today, espionage must be taken seriously in the business arena as
well. Having company secrets stolen by competitors is costly and
can be lethal. Counterespionage for American Business is a how-to
manual for security professionals that teaches secret methods
counterespionage experts have been using for years to protect
business information
A critical look at how the US military is weaponizing technology and data for new kinds of warfare-and why we must resist. War Virtually is the story of how scientists, programmers, and engineers are racing to develop data-driven technologies for fighting virtual wars, both at home and abroad. In this landmark book, Roberto J. Gonzalez gives us a lucid and gripping account of what lies behind the autonomous weapons, robotic systems, predictive modeling software, advanced surveillance programs, and psyops techniques that are transforming the nature of military conflict. Gonzalez, a cultural anthropologist, takes a critical approach to the techno-utopian view of these advancements and their dubious promise of a less deadly and more efficient warfare. With clear, accessible prose, this book exposes the high-tech underpinnings of contemporary military operations-and the cultural assumptions they're built on. Chapters cover automated battlefield robotics; social scientists' involvement in experimental defense research; the blurred line between political consulting and propaganda in the internet era; and the military's use of big data to craft new counterinsurgency methods based on predicting conflict. Gonzalez also lays bare the processes by which the Pentagon and US intelligence agencies have quietly joined forces with Big Tech, raising an alarming prospect: that someday Google, Amazon, and other Silicon Valley firms might merge with some of the world's biggest defense contractors. War Virtually takes an unflinching look at an algorithmic future-where new military technologies threaten democratic governance and human survival.
Goldberg (finance, U. of Miami) and White (economics, New York U.) present the results of a 1978 conference that brought together representatives from business, government, and academics. Much of the conversation revolves around the Glass- Steagall Act and attempts to remove the dividing line betwee
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice. |
![]() ![]() You may like...
The Pangenome - Diversity, Dynamics and…
Herve Tettelin, Duccio Medini
Hardcover
R1,675
Discovery Miles 16 750
The History of British Birds
Derek Yalden, Umberto Albarella
Hardcover
R1,896
Discovery Miles 18 960
Introduction to Physical Anthropology
Wenda Trevathan, Robert Jurmain, …
Paperback
|