0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (5)
  • R250 - R500 (37)
  • R500+ (384)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

The Rules of Security - Staying Safe in a Risky World (Hardcover): Paul Martin The Rules of Security - Staying Safe in a Risky World (Hardcover)
Paul Martin
R685 R598 Discovery Miles 5 980 Save R87 (13%) Ships in 9 - 17 working days

This book demystifies and explains a subject that affects every one of us in our private lives and at work. Security is a practical discipline concerned with safeguarding lives, property, information, wealth, reputations, and social wellbeing. It is the basis of civilised society. People, businesses, and nations cannot thrive in its absence, whereas the right kind of security frees us to live fulfilling lives. But deciding what is needed, and then making it happen, is not easy. The threats to our security are complex and continually evolving, as criminals, hackers, terrorists, and hostile foreign states continually find new ways of staying one step ahead of us, their potential victims. At the same time, we are continually creating new vulnerabilities as we adopt new technologies and new ways of working. Those who do not understand the fundamentals of security, risk, and resilience open themselves, and those around them, to avoidable dangers, needless anxieties, and unnecessary costs. Inadequate security may leave them exposed to intolerable risks, while the wrong kind of security is expensive, intrusive, and ineffective. In his essential new book, world-leading security expert Paul Martin sets out the ten most important guiding principles of protective security and resilience. Clearly expressed in the form of simple but powerful rules of thumb, their purpose is to help solve complicated problems for which there are no textbook solutions. The rules offer a powerful toolkit, designed to work in many different situations, including the cyber domain. When we are faced with novel problems requiring complex decisions, it is easy to focus on the wrong things. These rules remind us what really matters. The psychological and behavioural aspects of security are key themes throughout the book. People lie at the heart of security. The criminals, terrorists, and hackers are social animals with complex emotions and psychological predispositions. So too are the victims of those attackers and the security practitioners who strive to protect us. The human dimension is therefore crucial to understanding security. The Rules of Security will help anyone with an interest in their own security and that of their home, family, business, or society. It will be indispensable to those in positions of responsibility, allowing them to understand how best to protect their organisation, people, and assets. It assumes no expert technical knowledge and explains the ideas in clear and simple terms. It will appeal to anyone with an interest in security. If you read only one book about security, it should be this one.

The Bodyguard (Paperback): Roy Snell The Bodyguard (Paperback)
Roy Snell 1
R422 Discovery Miles 4 220 Ships in 10 - 15 working days

Roy Snell has been in what he calls "close protection" for more than 16 years, guarding international royalty and celebrities including Madonna, Schwarzenegger, Stallone, Bruce Willis, Tom Jones, and Frank Sinatra. A former SAS sniper and heavyweight boxing champion, Roy is Britain's ultimate bodyguard. Roy was trained at the Regency College in Herefordshire, where the royal protection squad is drilled. He started out in security at showcases for the big bands of the 1980s--Duran Duran, Eurythmics, Aha, Kajagoogoo, and at a Wham! gig, he protected George Michael from a man with a baseball bat. A "Category A" bodyguard--a level that takes two years of training to reach--Roy is qualified to look after top level celebrity clients, from film stars to athletes, singers to royalty. Roy is also a skilled marksman trained in the use of the 9mm Bereta sub-machine gun and the 38 Snubnose--the standard issue weapon for the FBI.

Our Data, Ourselves - A Personal Guide to Digital Privacy (Hardcover): Jacqueline D. Lipton Our Data, Ourselves - A Personal Guide to Digital Privacy (Hardcover)
Jacqueline D. Lipton
R1,931 Discovery Miles 19 310 Ships in 12 - 19 working days

A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides readers through important issues involving technology, data collection, and digital privacy as they apply to our daily lives. Our Data, Ourselves covers a broad range of everyday privacy concerns with easily digestible, accessible overviews and real-world examples. Lipton explores the ways we can protect our personal data and monitor its use by corporations, the government, and others. She also explains our rights regarding sensitive personal data like health insurance records and credit scores, as well as what information retailers can legally gather, and how. Who actually owns our personal information? Can an employer legally access personal emails? What privacy rights do we have on social media? Answering these questions and more, Our Data, Ourselves provides a strategic approach to assuming control over, and ultimately protecting, our personal information.

Privacy in Peril - How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience (Paperback): James B.... Privacy in Peril - How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience (Paperback)
James B. Rule
R914 Discovery Miles 9 140 Ships in 10 - 15 working days

This provocative book offers a probing account of the erosion of privacy in American society, that shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience. The author reveals that in today's "information society," the personal data that we make available to virtually any organization for virtually any purpose is apt to surface elsewhere, applied to utterly different purposes. The mass collection and processing of personal information produces such tremendous efficiencies that both the public and private sector feel justified in pushing as far as they can into our private lives. And there is no easy cure. Indeed, there are many cases where privacy invasion is both hurtful to the individual and indispensable to an organization's quest for efficiency. And as long as we willingly accept the pursuit of profit, or the reduction of crime, or cutting government costs as sufficient reason for intensified scrutiny over our lives, then privacy will remain endangered.

Democratic Governance of the Security Sector Beyond the OSCE Area - Regional Approaches in Africa and the Americas (Paperback):... Democratic Governance of the Security Sector Beyond the OSCE Area - Regional Approaches in Africa and the Americas (Paperback)
Victor-Yves Ghebali, Alexander Lambert
R923 Discovery Miles 9 230 Ships in 12 - 19 working days

The present book addresses the prospects for security sector reform and governance regimes, focusing on democratic civilian control of armed forces. It assesses the extent to which the pioneering OSCE experience has inspired Africa and the Americas within their respective multilateral institutional settings.

Borderland Circuitry - Immigration Surveillance in the United States and Beyond (Hardcover): Ana Muniz Borderland Circuitry - Immigration Surveillance in the United States and Beyond (Hardcover)
Ana Muniz
R1,931 Discovery Miles 19 310 Ships in 12 - 19 working days

Political discourse on immigration in the United States has largely focused on what is most visible, including border walls and detention centers, while the invisible information systems that undergird immigration enforcement have garnered less attention. Tracking the evolution of various surveillance-related systems since the 1980s, Borderland Circuitry investigates how the deployment of this information infrastructure has shaped immigration enforcement practices. Ana Muniz illuminates three phenomena that are becoming increasingly intertwined: digital surveillance, immigration control, and gang enforcement. Using ethnography, interviews, and analysis of documents never before seen, Muniz uncovers how information-sharing partnerships between local police, state and federal law enforcement, and foreign partners collide to create multiple digital borderlands. Diving deep into a select group of information systems, Borderland Circuitry reveals how those with legal and political power deploy the specter of violent cross-border criminals to justify intensive surveillance, detention, brutality, deportation, and the destruction of land for border militarization.

Fighting Fraud - How to Establish and Manage an Anti-Fraud Program (Paperback): Gerald L. Kovacich Fighting Fraud - How to Establish and Manage an Anti-Fraud Program (Paperback)
Gerald L. Kovacich
R1,803 Discovery Miles 18 030 Ships in 10 - 15 working days

This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company. It provides an exceptional foundation for security professionals or business executives involved in developing and implementing a corporate anti-fraud program as part of a corporate assets protection program.
The author's intent is to provide the reader with a practitioner's guide (a "how-to" book), augmented by some background information to put it all in perspective. The approach used should enable the readers to immediately put in place a useful anti-fraud program under the leadership of the corporate security officer (CSO), or other corporate professional.
* Shows professionals how to save their companies money.
* Provides a roadmap for developing an anti-fraud program.
* Allows security professionals to tailor their anti-fraud program to their own corporate environment.
* Explains how fraud is costing corporations a competitive edge in the global marketplace.

ISpy - Surveillance and Power in the Interactive Era (Paperback): Mark Andrejevic ISpy - Surveillance and Power in the Interactive Era (Paperback)
Mark Andrejevic
R1,050 Discovery Miles 10 500 Ships in 10 - 15 working days

'This book will change the way you think about today's new media technologies' - Daniel J. Solove, author of ""The Digital Person: Technology and Privacy in the Information Age"". Whether you're purchasing groceries with your Safeway 'club card' or casting a vote on ""American Idol"", those data are being collected. From Amazon to iTunes, smart phones to GPS devices, Google to TiVo - all of these products and services give us an expansive sense of choice, access, and participation. Mark Andrejevic shows, however, that these continuously evolving new technologies have also been employed as modes of surveillance and control, most disturbingly exemplified by revelations about the NSA's secret monitoring of our phone calls, e-mails, and internet searches. Many contend that our proliferating interactive media empower individuals and democratize society. But, Andrejevic asks, at what cost? In ""iSpy"", he reveals that these and other highly advertised benefits are accompanied by hidden risks and potential threats that we all tend to ignore. His book, providing the first sustained critique of a concept that has been a talking point for twenty years, debunks the false promises of the digital revolution still touted by the popular media while seeking to rehabilitate, rather than simply write off, the potentially democratic uses of interactive media. Andrejevic opens up the world of digital rights management and the data trail each of us leaves - data about our locations, preferences, or life events that are already put to use in various economic, political, and social contexts. He notes that, while citizens are becoming increasingly transparent to private and public monitoring agencies, they themselves are unable to access the information gathered about them - or know whether it's even correct. (The watchmen, it seems, don't want to be watched.) He also considers the appropriation of consumer marketing for political campaigns in targeting voters and examines the implications of the Internet for the so-called War on Terror. In ""iSpy"", Andrejevic poses real challenges for our digital future. Amazingly detailed, compellingly readable, it warns that we need to temper our enthusiasm for these technologies with a better understanding of the threats they pose - to be able to distinguish between interactivity as centralized control and as collaborative participation.

Neglected Defense - Mobilizing the Private Sector to Support Homeland Security (Paperback): Stephen E. Flynn, Daniel B. Prieto Neglected Defense - Mobilizing the Private Sector to Support Homeland Security (Paperback)
Stephen E. Flynn, Daniel B. Prieto
R431 Discovery Miles 4 310 Ships in 10 - 15 working days

The March 2006 furor over a Dubai firms attempt to purchase the company managing some U.S. ports illustrates the difficult homeland security challenges that exist at the nexus of privately owned critical assets as well as global interdependence. Unfortunately, nearly five years after the September 11 attacks on New York and Washington, D.C., federal efforts to enlist the private sector in bolstering homeland security remain largely stillborn. Neglected Defense offers a thoughtful and tightly reasoned analysis of why that is so. It presents a way forward for strengthening cooperation between the private sector and government on homeland security. The report begins by laying out the policy dilemma in detail. It offers a recent history of the security role of the private sector, and highlights specific problems that have kept public-private security partnerships from maturing. It concludes with a series of recommendationsfor Congress, the Bush administration, and the private sectorto better secure the homeland.

The New Politics of Surveillance and Visibility (Paperback): Kevin Haggerty, Richard V. Ericson The New Politics of Surveillance and Visibility (Paperback)
Kevin Haggerty, Richard V. Ericson; Edited by Kevin Haggerty, Richard V. Ericson
R1,217 Discovery Miles 12 170 Ships in 12 - 19 working days

Since the terrorist attacks of September 2001, surveillance has been put forward as the essential tool for the aEURO"war on terror,aEURO(t) with new technologies and policies offering police and military operatives enhanced opportunities for monitoring suspect populations. The last few years have also seen the publicaEURO(t)s consumer tastes become increasingly codified, with aEURO"data minesaEURO(t) of demographic information such as postal codes and purchasing records. Additionally, surveillance has become a form of entertainment, with aEURO"realityaEURO(t) shows becoming the dominant genre on network and cable television.In The New Politics of Surveillance and Visibility, editors Kevin D. Haggerty and Richard V. Ericson bring together leading experts to analyse how society is organized through surveillance systems, technologies, and practices. They demonstrate how the new political uses of surveillance make visible that which was previously unknown, blur the boundaries between public and private, rewrite the norms of privacy, create new forms of inclusion and exclusion, and alter processes of democratic accountability. This collection challenges conventional wisdom and advances new theoretical approaches through a series of studies of surveillance in policing, the military, commercial enterprises, mass media, and health sciences.

Bouncers - Violence and Governance in the Night-Time Economy (Paperback, Revised): Dick Hobbs, Philip Hadfield, Stuart Lister,... Bouncers - Violence and Governance in the Night-Time Economy (Paperback, Revised)
Dick Hobbs, Philip Hadfield, Stuart Lister, Simon Winlow
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

In recent years, the expansion of night-time leisure has emerged as a key indicator of post-industrial urban prosperity, attracting investment, creating employment and re-generating the built environment. These leisure economies are youth-dominated, focusing upon the sale and consumption of alcohol. Unprecedented numbers of young people now flock to town centres that are crammed with bars, pubs and clubs, and the resulting violent disorder has over run police resources that remain geared to the drinking patterns and alcohol cultures of previous generations. Post-industrial re-structuring has spawned an increasingly complex mass of night-time leisure options through which numerous licit and illicit commercial opportunities flow. Yet, regardless of the fashionable and romantic notions of many contemporary urban theorists, it is alcohol, mass intoxication and profit rather than 'cultural regeneration,' which lies at the heart of this rapidly expanding dimension of post-industrial urbanism. Private security in the bulky form of bouncers fills the void left by the public police. These men (only 7% are women), whose activities are barely regulated by the State, are dominated by a powerful subculture rooted in routine violence and intimidation. Using ethnography, participant observation and extensive interviews with all the main players, this controversial book charts the emergence of the bouncer as one of the most graphic symbols in the iconography of post industrial Britain.

The Security Handbook (Paperback, 2nd edition): Philip Purpura The Security Handbook (Paperback, 2nd edition)
Philip Purpura
R1,836 Discovery Miles 18 360 Ships in 10 - 15 working days

The Security Handbook, Second Edition is a user-friendly guide for security officers and guards, covering everything from introductory information to advanced topics. Whether looking for entry into the profession or development within the security industry, this book offers the practical information, training, and need-to-know techniques for the realization of professional goals.
The Second Edition emphasizes the proper skills required to improve job performance -- customer service, security methods, patrolling, communicating, and report writing. Chapters cover such important topics as arrest law and procedure (including legal liability), self-defense and weapons, a new section on career planning, violence in the workplace, internal theft, burglary, robbery, terrorism, cybercrime, and first response during emergencies. Countermeasures to a variety of threats are explained throughout the book.
Experienced security officers, supervisors, and managers will also find the book useful in outlining the changing roles and responsibilities of the protection officer and for helping train their front line staff.
* Covers every important aspect of the security officer's job, with several new updates and access to online sources
* Defines key terms and outlines basic information before moving on to more advanced topics
* Each chapter includes an outline, chapter objectives, and follows with review questions to aid in the learning process
* Features numerous examples, illustrations, Web sites, case studies, and new "What if?" scenarios to relate theory to practice
* Serves as a comprehensive study guide for state mandated training and certification exams such as the Certified Protection Officer (CPO) program sponsored by the IFPO

Preventing Corporate Embezzlement (Paperback): Paul Shaw, Jack Bologna Preventing Corporate Embezzlement (Paperback)
Paul Shaw, Jack Bologna
R2,163 Discovery Miles 21 630 Ships in 10 - 15 working days

Internal loss is one of the most costly forms of loss. Embezzlement is one of the least detected and prosecuted forms of internal theft. Preventing Corporate Embezzlement is a professional reference that offers solutions. Managers, auditors and others charged with protecting assets must achieve a heightened awareness of embezzlement. They need to recognize and understand the opportunities, methods, and varieties of embezzlement, as well as establish internal controls that will prevent and detect embezzlement.

Practical tool for detecting and combatting embezzlement: checklists, forms and evaluations
Offers how-to advice on avoiding lawsuits by practicing preventive law
Lists further resources, publications and directories on embezzlement, internal controls and security, risk management, insurance, auditors, and security services and equipment

Netspionage - The Global Threat to Information (Paperback): William C. Boni, Gerald Kovacich Netspionage - The Global Threat to Information (Paperback)
William C. Boni, Gerald Kovacich
R1,685 Discovery Miles 16 850 Ships in 10 - 15 working days

This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers," "cyberpunks," and even intelligence agencies) has already resulted in several incidents that foreshadow the perilous future. Close study of these incidents demonstrates how difficult yet how important it is to confront the challenges of "netspionage" and its less intrusive cousins. The authors present a set of the known incidents and then outline protective measures that will reduce the potential and consequences of netspionage.
Unlike most security books, this one is written for managers and executives in non-protection roles of the organization, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise.

*Practical guide written from front-line experience
*Explains the evolution of information collection and why it has never been easier
*Highlights the tools of the trade and how they can be put to best use

Public Safety and Security Administration (Paperback): P J. Ortmeier Public Safety and Security Administration (Paperback)
P J. Ortmeier
R2,172 Discovery Miles 21 720 Ships in 10 - 15 working days

This book addresses public safety and security from a holistic and visionary perspective. For the first time, safety and security organizations, as well as their administration, are brought together into an integrated work.
The protection of persons and property involves many public agencies and priivate organizations. Entities from the criminal jutics system (law enforcement, courts, corrections) as well as the fire service, private security and hazardous materials all contribute to public safety and security. This book addresses these entities, as well as safety and security issues, from a holistic and visionary perspective. It addresses criminal and non-criminal safety and security concerns, provides an overview of each entity (component) of the system of public safety and security, presents an overview of the administration process involved in planning, organizing, managing and evaluating public safety and security organizations and describes collateral functions of investigations, documentation and report writing.
Public safety and security organizations should not work in isolation. Rather, they should collaborate to protect persons and property. This book represents the first time all the public safety and security entities have been addressed in one text.

Focuses on the theories, concepts, practices and problems related to the present and future of public safety and security
Examines different strategies for problem solving which personnel working in the field may utilize
Synthesizes college-level lectures prepared, presented, and updated by the author over the past twenty years

Model Security Policies, Plans and Procedures (Paperback): John Fay Model Security Policies, Plans and Procedures (Paperback)
John Fay
R2,698 Discovery Miles 26 980 Ships in 10 - 15 working days

Model Security Policies, Plans, and Procedures contains sample security policy, planning, and procedural documents drawn from the proven experiences of hundreds of America's most successful corporations. If your job requires you to develop or update security policies, plans, or procedures, this book will be a highly valuable resource. The samples cover the key concepts of organizational protection. Putting the samples to use, either as presented or as drafting guides, can eliminate many hours of tedious research and writing.

Offers a practical mode of reference for security professionalsContains sample plans, policies and procedures

Investigations 150 Things You Should Know (Paperback): Lawrence Fennelly, Louis Tyska Investigations 150 Things You Should Know (Paperback)
Lawrence Fennelly, Louis Tyska
R1,672 Discovery Miles 16 720 Ships in 10 - 15 working days

By covering the essential tips and techniques for investigators, Investigations: 150 Things You Should Know becomes a useful reference. By further covering the legal guidelines that investigators must follow, it becomes indispensable. Through anecdotes, case studies, and documented procedures the authors of this book have amassed the most complete collection of investigative information available.
This ready reference is for anyone interested in investigations. Readers in and out of the law enforcement field will find this book easy to use and understand when seeking explanations about a wide variety of investigative topics including: constitutional law, documentary evidence, interviewing and interrogating, and surveillance.

Comprehensive overview of investigation
Easily readable and accessible information supplies all the necessary elements for the beginner or expert investigator
Further investigative resources are listed in valuable appendices

Loss Prevention and the Small Business - The Security Professional's Guide to Asset Protection Strategies (Paperback): J.... Loss Prevention and the Small Business - The Security Professional's Guide to Asset Protection Strategies (Paperback)
J. Robert Wyman
R1,683 Discovery Miles 16 830 Ships in 10 - 15 working days

With half of all new businesses failing in the first two years, every aspect of good business planning must be considered, but loss prevention is very often overlooked. Most small business owners grapple with the day to day challenges of sales and marketing, never realizing that the shadow of shrinkage is expanding daily, waiting to reveal itself in the annual inventory results. Ravaged by theft and paperwork losses, the already tight profit margin can shrink into oblivion. Loss Prevention and the Small Business opens the eyes of the reader to the reality of shrinkage in all its guises including shoplifting, fraud, and embezzlement. Armed with this awareness, the security specialist or owner/manager can utilize the many strategies to both inhibit losses and aggressively pursue those persons and processes that cause losses.
This is a comprehensive guide to developing and maintaining a loss prevention strategy. It assists the reader in creating a dynamic proactive plan for protecting their hard-earned profits from the menace of internal and external loss.



Includes information beyond the typical retail theft by employees and customers
Cover business losses from administrative errors to white collar crime
Practical with numerous worksheets, forms, and templates for asset protection exercises

Premises Security - A Guide for Security Professionals and Attorneys (Paperback): William Blake, Walter F. Bradley Premises Security - A Guide for Security Professionals and Attorneys (Paperback)
William Blake, Walter F. Bradley
R1,761 Discovery Miles 17 610 Ships in 10 - 15 working days

Premises Security: A Guide for Attorneys and Security Professionals guides the security professional through the ins and outs of premises security liability. Premises security litigation claims represent a serious financial threat to owners and occupiers of property. This book provides an overview of risk assessment techniques, identification of reasonable security measures, legal issues and litigation strategies.
Premises security litigation is increasing at a dramatic rate and has a significant negative impact on corporate profits. Realizing the increasing costs of litigation, business owners and other interested parties are initiating proactive measures to provide adequate security. Attorneys can use this book as a security resource for providing legal advice to their clients and during the litigation process. Security professionals will be better able to propose and implement reasonable and appropriate security measures. The format of providing information in response to specific questions carries the reader through a logical and sequential method for understanding the legal concepts of premises liability, the identification of reasonable and appropriate protection measures, and how to acquire premises security information.
This is a practical, concise and informative guide. This book can be used in a proactive prevention mode as well as a reactive response to litigation claims. It explains what security professionals should be thinking about and planning for when it comes to protecting people on their premises. It also provides a common base of knowledge for attorneys and security professionals that does not exist in any other publication.

Designed to meet the needs of both attorneys and security professionals
Covers both liability and security issues
Appendices provide detailed premises security information to facilitate a proactive approach to providing reasonable and appropriate security measures and reacting to litigation

Police Visibility - Privacy, Surveillance, and the False Promise of Body-Worn Cameras (Hardcover): Bryce Clayton Newell Police Visibility - Privacy, Surveillance, and the False Promise of Body-Worn Cameras (Hardcover)
Bryce Clayton Newell
R1,938 Discovery Miles 19 380 Ships in 12 - 19 working days

Police Visibility presents empirically grounded research into how police officers experience and manage the information politics of surveillance and visibility generated by the introduction of body cameras into their daily routines and the increasingly common experience of being recorded by civilian bystanders. Newell elucidates how these activities intersect with privacy, free speech, and access to information law and argues that rather than being emancipatory systems of police oversight, body-worn cameras are an evolution in police image work and state surveillance expansion. Throughout the book, he catalogs how surveillance generates information, the control of which creates and facilitates power and potentially fuels state domination. The antidote, he argues, is robust information law and policy that puts the power to monitor and regulate the police squarely in the hands of citizens.

Issues in Security Management - Thinking Critically About Security (Paperback): Robert Robinson Issues in Security Management - Thinking Critically About Security (Paperback)
Robert Robinson
R2,158 Discovery Miles 21 580 Ships in 10 - 15 working days

This is a truly unique collection of 39 articles written by authorities or based on authoritative research. It goes beyond locks, lighting, and alarms to offer provocative viewpoints on a variety of security topics.
Contributors to this book are knowledgeable and practical individuals who are aware of the impact of their work on society. They have extensive and specialized experience in their respective sectors including corporate, retail, college, hospital, art gallery, and within the community at large. They are knowledgeable about technical and legal aspects of CCTV, electronic counter-intelligence, computers, fire safety, violent employees, terrorism and the future of policing. In addition, they are concerned about the right to privacy, the influence of gambling on employee theft, privatization of correctional services, the place of women in security work, security audit anxiety, and crime control/prevention.

The book looks beyond everyday applications and routines to an understanding of the social significance of careers in security. It will be of interest to practitioners in all sectors as well as students at all levels.
Goes beyond the usual nuts and bolts security book
An important, horizon-broadening supplement to the basic texts
Appeals to everybody in the security field from students to practitioners

Counterespionage for American Business (Paperback): Peter Pitorri Counterespionage for American Business (Paperback)
Peter Pitorri
R1,488 Discovery Miles 14 880 Ships in 10 - 15 working days

The idea of espionage has always carried a certain mystique, having grown its roots in the political and national defense spheres. Today, espionage must be taken seriously in the business arena as well. Having company secrets stolen by competitors is costly and can be lethal. Counterespionage for American Business is a how-to manual for security professionals that teaches secret methods counterespionage experts have been using for years to protect business information
Secret techniques you will learn include:
. screening employee applicants; how to use standard screening methods to defend against industrial espionage and violent persons
. how to design security education programs by teaching protection of critical business information
. how to avoid liability
Counterespionage for American Business also names the foreign countries that are conducting espionage against American business.

Learn how to protect your proprietary business information and reduce liability riskGuidlines on how small businesses can save thousands of dollars"

War Virtually - The Quest to Automate Conflict, Militarize Data, and Predict the Future (Hardcover): Roberto J. Gonzalez War Virtually - The Quest to Automate Conflict, Militarize Data, and Predict the Future (Hardcover)
Roberto J. Gonzalez
R848 R688 Discovery Miles 6 880 Save R160 (19%) Ships in 12 - 19 working days

A critical look at how the US military is weaponizing technology and data for new kinds of warfare-and why we must resist. War Virtually is the story of how scientists, programmers, and engineers are racing to develop data-driven technologies for fighting virtual wars, both at home and abroad. In this landmark book, Roberto J. Gonzalez gives us a lucid and gripping account of what lies behind the autonomous weapons, robotic systems, predictive modeling software, advanced surveillance programs, and psyops techniques that are transforming the nature of military conflict. Gonzalez, a cultural anthropologist, takes a critical approach to the techno-utopian view of these advancements and their dubious promise of a less deadly and more efficient warfare. With clear, accessible prose, this book exposes the high-tech underpinnings of contemporary military operations-and the cultural assumptions they're built on. Chapters cover automated battlefield robotics; social scientists' involvement in experimental defense research; the blurred line between political consulting and propaganda in the internet era; and the military's use of big data to craft new counterinsurgency methods based on predicting conflict. Gonzalez also lays bare the processes by which the Pentagon and US intelligence agencies have quietly joined forces with Big Tech, raising an alarming prospect: that someday Google, Amazon, and other Silicon Valley firms might merge with some of the world's biggest defense contractors. War Virtually takes an unflinching look at an algorithmic future-where new military technologies threaten democratic governance and human survival.

The Deregulation of the Banking and Securities Industries (Paperback): Lawrence G. Goldberg, Lawrence J. White The Deregulation of the Banking and Securities Industries (Paperback)
Lawrence G. Goldberg, Lawrence J. White
R998 Discovery Miles 9 980 Ships in 10 - 15 working days

Goldberg (finance, U. of Miami) and White (economics, New York U.) present the results of a 1978 conference that brought together representatives from business, government, and academics. Much of the conversation revolves around the Glass- Steagall Act and attempts to remove the dividing line betwee

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover): Dan... A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R2,650 Discovery Miles 26 500 Ships in 12 - 19 working days

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Pangenome - Diversity, Dynamics and…
Herve Tettelin, Duccio Medini Hardcover R1,675 Discovery Miles 16 750
Phrenology Proved, Illustrated and…
Orson Squire Fowler Paperback R563 Discovery Miles 5 630
The Madness of July
James Naughtie Paperback R288 Discovery Miles 2 880
The History of British Birds
Derek Yalden, Umberto Albarella Hardcover R1,896 Discovery Miles 18 960
Introduction to Physical Anthropology
Wenda Trevathan, Robert Jurmain, … Paperback R1,441 R1,323 Discovery Miles 13 230
Smarter Not Harder - The Biohacker's…
Dave Asprey Paperback R520 R473 Discovery Miles 4 730
Creativity in Human Evolution and…
Steven Mithen Hardcover R4,491 Discovery Miles 44 910
Aspects of Mathematical Finance
K. Qechar Hardcover R1,370 Discovery Miles 13 700
Nexx A4 File Pockets - 100 Micron (50…
R128 Discovery Miles 1 280
Matroid Theory
James Oxley Hardcover R6,445 Discovery Miles 64 450

 

Partners