![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
The protection of Federal employees and private citizens within U.S. government-owned or leased facilities is a top national priority. The mission of the Interagency Security Committee (ISC), comprised of 53 Federal departments and agencies, is to develop security standards, best practices, and guidelines for non-military Federal facilities in the United States. This book provides important information to assist department and agency security planners as they address a growing issue becoming increasingly present throughout both the public and the private sector: acts of violence in the workplace. The book provides a variety of examples based on real-world events for planners to study and take into consideration.
Threats of terrorism, natural disaster, identity theft, job loss, illegal immigration, and even biblical apocalypse - all are perils that trigger alarm in people today. Although there may be a factual basis for many of these fears, they do not simply represent objective conditions. Feelings of insecurity are instilled by politicians and the media, and sustained by urban fortification, technological surveillance, and economic vulnerability. ""Surveillance in the Time of Insecurity"" fuses advanced theoretical accounts of state power and neoliberalism with original research from the social settings in which insecurity dynamics play out in the new century. Torin Monahan explores the counterterrorism-themed show ""24"", Rapture fiction, traffic control centers, security conferences, public housing, and gated communities, and examines how each manifests complex relationships of inequality, insecurity, and surveillance. Alleviating insecurity requires that we confront its mythic dimensions, the politics inherent in new configurations of security provision, and the structural obstacles to achieving equality in societies.
"The Professional Protection Officer, "eight edition(formerly titled "Protection Officer Training Manual") is the definitive reference and instructional text for career-oriented security officers in both the private and public sectors.The first edition of this titleoriginated with the birth of the International Foundation for Protection Officers (IFPO) in 1988, which has been using the book as the official text since that time.Each subsequent edition has brought new and enlightened information to the protection professional.The material in this new edition includes all of the subjects essential to training of protection professionals, and has been renamed to reflect new strategies, tactics, and trends in this dynamic field. The eighth edition of "The Professional Protection Officer"
contains 12 units and 45 chapterswritten by leading security
educators, trainers and consultants. It has served as the
definitive text for both students and professionals worldwide.This
new edition adds critical updates and fresh pedagogy, as well as
new diagrams, illustrations, and self-assessments. "The
Professional Protection Officer" is tailored to the training and
certification needs of today s protection professionals and proves
to be the most exciting and progressive edition yet
In the past two decades, many have posited a correlation between the spread of globalization and the decline of the nation-state. In the realm of national security, advocates of the globalization thesis have argued that states' power has diminished relative to transnational governmental institutions, NGOs, and transnational capitalism. Initially, they pointed to declines in both global military spending (which has risen dramatically in recent years) and interstate war. But are these trends really indicative of the decline of nation-state's role as a guarantor of national security? In Globalization and the National Security State, T.V. Paul and Norrin M. Ripsman test the proposition against the available evidence and find that the globalization school has largely gotten it wrong. The decline in interstate warfare can largely be attributed to the end of the Cold War, not globalization. Moreover, great powers (the US, China, and Russia) continue to pursue traditional nation-state strategies. Regional security arrangements like the EU and ASEAN have not achieved much, and weak states--the ones most impacted by the turmoil generated by globalization--are far more traditional in their approaches to national security, preferring to rely on their own resources rather than those of regional and transnational institutions. This is a bold argument, and Paul and Ripsman amass a considerable amount of evidence for their claims. It cuts against a major movement in international relations scholarship, and is sure to generate controversy.
In 2003, the President and the U.S. Congress established the Department of Homeland Security. From the beginning, its mission was clear: prevent terrorist attacks, protect against threats to America's safety and security, and prepare the nation to respond effectively to disasters, both natural and man-made. This monumental mission demands a comprehensive strategy. It also requires a crystal-clear explanation of that strategy to Americans and their allies worldwide. In a revealing new book, "Homeland Security: Assessing the First Five Years," Michael Chertoff provides that explanation. In a refreshingly candid and engaging manner, America's former homeland security secretary depicts the department's long-term approach, what it has achieved, and what it has yet to do.The strategy begins with the threats America faces, from terrorist groups like al Qaeda to hurricanes like Ike or Gustav. "Once these threats are identified," Chertoff writes, "we can confront them, using every tool at our disposal. We can stop terrorists from entering the country, and discourage people from embracing terrorism by combating its lethal ideology. We can protect our critical assets and reduce our vulnerabilities to natural disasters. We can plan and prepare for emergencies and respond in a way that minimizes the consequences. And we can work closely with our allies abroad to reduce the risk of future disasters." In each of these areas, Chertoff informs the reader what the nation has done and what it still must do to secure its future.How well has this strategy fared in a post-9/11 world? Since that fateful day, there have been no global terror attacks on American soil. Yet in the face of continued dangers, Michael Chertoff warns repeatedly against complacency. He urges America and its leaders to strengthen their resolve, stay the course, and build creatively on past successes.
Surveillance is commonly rationalized as a solution for existing problems such as crime and terrorism. This book explores how surveillance, often disguised as risk management or harm reduction, is also at the root of a range of social and political problems. Canadian scholars from diverse disciplines interrogate the moral and ideological bases as well as the material effects of surveillance in policing, consumerism, welfare administration, disaster management, popular culture, moral regulation, news media, social movements, and anti-terrorism campaigns.
The classic book "The Art of War" (or as it is sometimes
translated, "The Art of Strategy") by Sun Tzu is often used to
illustrate principles that can apply to the management of business
environments. "The Art of War for Security Managers" is the first
book to apply the time-honored principles of Sun Tzu's theories of
conflict to contemporary organizational security.
Reviews four countries' domestic intelligence services to assess whether the creation of such an agency in the United States, apart from the Federal Bureau of Investigation, would be beneficial. (PW); Since the September 11, 2001, attacks, critics have charged that the Federal Bureau of Investigation (FBI), while qualified to investigate terrorist incidents after the fact, is not wel equipped enough to adequately gather and a assess information to prevent attacks. Given the bureau's law enforcement and prosecutorial cultural, many believe that the burden of countering terrorism, the FBI's main focus now, in addition to the load of taking on "ordinary" crime, may be too much. To better inform debate, researchers analyzed the domestic security structures of four allied countries-the United Kingdom, France, Canada, and Australia-weighing both their positive and negative aspects.
The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.
When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.
This book addresses the various ways in which modern approaches to the protection of national security have impacted upon the constitutional order of the United Kingdom. It outlines and assesses the constitutional significance of the three primary elements of the United Kingdom's response to the possibility of terrorism and other phenomena that threaten the security of the state: the body of counter-terrorism legislation that has grown up in the last decade and a half; the evolving law of investigatory powers; and, to the extent relevant to the domestic constitution, the law and practice governing international military action and co-operation. Following on from this, the author demonstrates that considerations of national security - as a good to be protected and promoted in contemporary Britain - are reflected not merely in the existence of discrete bodies of law by which it is protected at home and abroad, but simultaneously and increasingly leaked into other areas of public law. Elements of the constitution which are not directly and inherently linked to national security nevertheless become (by both accident and design) implicated in the state's national security endeavours, with significant and at times far-reaching consequences for the constitutional order generally. A renewed and strengthened concern for national security since September 2001 has, it is argued, dragged into its orbit a variety of constitutional phenomena and altered them in its image, giving rise to what we might call a national security constitution.
Security and Loss Prevention: An Introduction, Seventh Edition, provides introductory and advanced information on the security profession. Security expert, Phil Purpura, CPP, includes updates on security research, methods, strategies, technologies, laws, issues, statistics and career options, providing a comprehensive and interdisciplinary book that draws on many fields of study for concepts, strategies of protection and research. The book explains the real-world challenges facing security professionals and offers options for planning solutions. Linking physical security with IT security, the book covers internal and external threats to people and assets and private and public sector responses and issues. As in previous editions, the book maintains an interactive style that includes examples, illustrations, sidebar questions, boxed topics, international perspectives and web exercises. In addition, course instructors can download ancillaries, including an instructor's manual with outlines of chapters, discussion topics/special projects, essay questions, and a test bank and PowerPoint presentation for each chapter.
The digital age is also a surveillance age. Today, computerized systems protect and manage our everyday life; the increasing number of surveillance cameras in public places, the computerized loyalty systems of the retail sector, geo-localized smart-phone applications, or smart traffic and navigation systems. Surveillance is nothing fundamentally new, and yet more and more questions are being asked: Who monitors whom, and how and why? How do surveillance techniques affect socio-spatial practices and relationships? How do they shape the fabrics of our cities, our mobilities, the spaces of the everyday? And what are the implications in terms of border control and the exercise of political power? Surveillance and Space responds to these modern questions by exploring the complex and varied interactions between surveillance and space. In doing so, the book also advances a programmatic reflection on the very possibility of a 'political geography of surveillance'.
The digital age is also a surveillance age. Today, computerized systems protect and manage our everyday life; the increasing number of surveillance cameras in public places, the computerized loyalty systems of the retail sector, geo-localized smart-phone applications, or smart traffic and navigation systems. Surveillance is nothing fundamentally new, and yet more and more questions are being asked: Who monitors whom, and how and why? How do surveillance techniques affect socio-spatial practices and relationships? How do they shape the fabrics of our cities, our mobilities, the spaces of the everyday? And what are the implications in terms of border control and the exercise of political power? Surveillance and Space responds to these modern questions by exploring the complex and varied interactions between surveillance and space. In doing so, the book also advances a programmatic reflection on the very possibility of a 'political geography of surveillance'.
Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the two, Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture is ideal for business, IT, or security managers that are faced with the task of making purchasing, migration, or adoption decisions. It brings biometrics down to an understandable level, so that you can immediately begin to implement the concepts discussed. Exploring the technological and social implications of widespread biometric use, the book considers the science and technology behind biometrics as well as how it can be made more affordable for small and medium-sized business. It also presents the results of recent research on how the principles of cryptography can make biometrics more secure. Covering biometric technologies in the cloud, including security and privacy concerns, the book includes a chapter that serves as a "how-to manual" on procuring and deploying any type of biometric system. It also includes specific examples and case studies of actual biometric deployments of localized and national implementations in the U.S. and other countries. The book provides readers with a technical background on the various biometric technologies and how they work. Examining optimal application in various settings and their respective strengths and weaknesses, it considers ease of use, false positives and negatives, and privacy and security issues. It also covers emerging applications such as biocryptography. Although the text can be understood by just about anybody, it is an ideal resource for corporate-level executives who are considering implementing biometric technologies in their organizations.
Private Security In The 21St Century: Concepts And Applications Informs The Learner About The Historical Development Of Private Security And Provides New Information For Educating And Training Private Security Personnel In The Beginning Stages Of Their Career, Whether They Are A Full Time Student Or Entry Level Security Worker On The Job. This Text Will Not Only Provide The Background Information That A Prospective Security Person Should Know, But Also Describes The Basic Operational Procedures Students Need To Understand. Private Security In The United States: Concepts And Applications Examines Current Practices In Private Security And Technology.
Frequently characterized as either mercenaries in modern guise or the market's response to a security vaccuum, private military companies are commercial firms offering military services ranging from combat and military training and advice to logistical support, and which play an increasingly important role in armed conflicts, UN peace operations, and providing security in unstable states. Executive Outcomes turned around an orphaned conflict in Sierra Leone in the mid-1990s; Military Professional Resources Incorporated (MPRI) was instrumental in shifting the balance of power in the Balkans, enabling the Croatian military to defeat Serb forces and clear the way for the Dayton negotiations; in Iraq, estimates of the number of private contractors on the ground are in the tens of thousands. As they assume more responsibilities in conflict and post-conflict settings, their growing significance raises fundamental questions about their nature, their role in different regions and contexts, and their regulation. This volume examines these issues with a focus on governance, in particular the interaction between regulation and market forces. It analyzes the current legal framework and the needs and possibilities for regulation in the years ahead. The book as a whole is organized around four sets of questions, which are reflected in the four parts of the book. First, why and how is regulation of PMCs now a challenging issue? Secondly, how have problems leading to a call for regulation manifested in different regions and contexts? Third, what regulatory norms and institutions currently exist and how effective are they? And, fourth, what role has the market to play in regulation?
Debates on security became more intense following the unanticipated end of the Cold War conflict and took on added force after the terrorist attacks on the US on September 11, 2001. Generally viewed as a part of the wider 'West' despite its separation by enormous geographical distances from both Europe and the United States, Australia is a regional power in its own right. It has been an active and loyal member of the US-led coalitions of the willing, first in Afghanistan and then in Iraq. The terrorist attacks in Bali one year after the attacks in the United States brought home to Australia the direct nature of the new global terrorist threats to its own security. This volume brings together leading experts on international security and Australia's foreign and security policies in a critical examination of Australia's adaptations to the new security challenges. It is the first in-depth and comprehensive analysis of Australia's defence and security policies as well as the country's role in countering regional and global challenges to international security since the war on terrorism began.
This authoritative book brings together in a single volume international experts renowned in their specializations to discuss issues and current trends relating to maritime security.It looks at the issue of maritime security in the Asia-Pacific through a three step approach. Firstly, it surveys both the global maritime outlook and the outlook in each of the regions of Northeast Asia, Southeast Asia, and South Asia. From these regional perspectives, trends in commercial shipping and force modernization, and issues like the weapons proliferation and maritime terrorism are discussed.After looking at the maritime environment, the specific challenges that the maritime community faces are examined. These challenges include maritime boundary and territorial disputes in the South China Sea, the force modernization of three Northeast Asian navies, and the spectre of maritime terrorism. The volume concludes by looking at some new initiatives for maritime cooperation, a survey of maritime "regime" building, and the legal and political implications of the proliferation security initiative.
The end of the Cold War and subsequent dissolution of the Soviet Union resulted in a new unipolar international system that presented fresh challenges to international relations theory. Since the Enlightenment, scholars have speculated that patterns of cooperation and conflict might be systematically related to the manner in which power is distributed among states. Most of what we know about this relationship, however, is based on European experiences between the seventeenth and twentieth centuries, when five or more powerful states dominated international relations, and the latter twentieth century, when two superpowers did so. Building on a highly successful special issue of the leading journal World Politics, this book seeks to determine whether what we think we know about power and patterns of state behaviour applies to the current 'unipolar' setting and, if not, how core theoretical propositions about interstate interactions need to be revised.
Conventional wisdom holds that weak and failing states are the source of the world's most pressing security threats. After all, the 9/11 attacks originated in an impoverished, war-ravaged country, and transnational crime appears to flourish in weakly governed states. However, our assumptions about the threats posed by failing states are based on anecdotal arguments, not on a systematic analysis of the connections between state failure and transnational security threats. Analyzing terrorism, transnational crime, WMDs, pandemic diseases, and energy insecurity, Stewart Patrick shows that while some global threats do emerge in fragile states, most of their weaknesses create misery only for their own citizenry. Moreover, many threats originate farther up the chain, in wealthier and more stable countries like Russia and Venezuela. Weak Links will force policymakers to rethink what they assume about state failure and transnational insecurity.
The outbreak of anthrax infections that followed September 11, 2001, showed all too clearly that while we can defend ourselves against bioterrorism, our defenses need improvement. What's most important is the ability to recognize the associated disease, and recognize them quickly. Yet, many in the medical world are unfamiliar with the characteristic signs and symptoms of bioterrorism agents and are unable to differentiate between diseases whose symptoms appear almost identical. While a plethora of information on such diseases is available, finding it is time consuming.
With an estimated 3.3 billion ionizing radiation imaging examinations performed worldwide each year, the growing use of x-ray-based diagnostic procedures raises concerns about long-term health risks, especially cancer. In addition, rapid growth in the number of nuclear power plants around the world increases the risk of a nuclear accident similar to that of Fukushima, Japan. Add to this, exposure to non-ionizing radiation from prolonged cell phone use, proton radiation from solar flares, and potential nuclear conflict or a dirty bomb attack, and the need to expand our repertoire of radiation prevention and mitigation strategies becomes increasingly urgent. Radiation Injury Prevention and Mitigation in Humans identifies and examines physical protection strategies as well as non-toxic, cost-effective biological protection strategies. This includes agents that-when administered orally before and/or after irradiation exposures-could be effective in preventing and mitigating acute radiation damage. The book discusses implementing physical and biological protection strategies particularly for first responders, radiation workers, astronauts, and civilians who might be exposed to higher doses of radiation in the course of their activities. The book describes: Physics of ionizing radiation and radiological weapons, principles of nuclear reactors, the types of radiological weapons, and consequences of their explosions Acute and late health effects of high and low doses of radiation The efficacy of FDA-approved and unapproved radioprotective and radiation mitigating agents The efficacy of radioprotective and radiation mitigating agents not requiring FDA approval (antioxidants and herbs) Scientific data and rationale in support of using micronutrient preparations containing dietary and endogenous antioxidants for preventing acute radiation sickness and for mitigating the late adverse health effects among survivors of high and low doses of radiation Examining cutting-edge advances in the research of the effects of non-ionizing radiation on cellular and genetic levels, the book proposes an implementation plan of both physical and biological protection strategies. It covers the full range of potential sources of radiation and includes an up-to-date list of helpful resources and references for the latest research and readings on the topic.
Without our consent and often without our knowledge, the government
can constantly monitor many of our daily activities, using closed
circuit TV, global positioning systems, and a wide array of other
sophisticated technologies. With just a few keystrokes, records
containing our financial information, phone and e-mail logs, and
sometimes even our medical histories can be readily accessed by law
enforcement officials. As Christopher Slobogin explains in "Privacy
at Risk," these intrusive acts of surveillance are subject to very
little regulation.
Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of a cyber forensic investigation. The authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition delineates the scope and goals of cyber forensics to reveal and track legal and illegal activity. Beginning with an introduction and definition of cyber forensics, chapters explain the rules of evidence and chain of custody in maintaining legally valid electronic evidence. They describe how to begin an investigation and employ investigative methodology, as well as establish standard operating procedures for the field and cyber forensic laboratory. The authors provide an in depth examination of the manipulation of technology to conceal illegal activities and the use of cyber forensics to uncover them. They discuss topics and issues such as conducting a cyber forensic investigation within both the local and federal legal framework, and evaluating the current data security and integrity exposure of multifunctional devices. Cyber Forensics includes details and tips on taking control of a suspect computer or PDA and its "operating" environment, mitigating potential exposures and risks to chain of custody, and establishing and following a flowchart for the seizure of electronic evidence. An extensive list of appendices include websites, organizations, pertinent legislation, further readings, best practice recommendations, more information on hardware and software, and a recap of the federal rules of civil procedure. |
![]() ![]() You may like...
Dying for an iPhone - Apple, Foxconn and…
Jenny Chan, Mark Selden, …
Hardcover
R2,836
Discovery Miles 28 360
Biometrics - Concepts, Methodologies…
Information Reso Management Association
Hardcover
R10,772
Discovery Miles 107 720
Censorship, Surveillance, and Privacy…
Information Reso Management Association
Hardcover
R10,208
Discovery Miles 102 080
Multllinguallsm, the Judicial Authority…
Kas Deprez, Theo du Plessis, …
Paperback
R610
Discovery Miles 6 100
|