0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (40)
  • R500+ (418)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Security Risks - Assessment, Management & Current Challenges (Hardcover): Milica Boskovic Security Risks - Assessment, Management & Current Challenges (Hardcover)
Milica Boskovic
R6,471 R5,842 Discovery Miles 58 420 Save R629 (10%) Ships in 12 - 17 working days

Security is one of the key pillars on which a stable society is built, and which guarantees the rights of its members. One of the modern strategies -- human security -- potentiates that economy, environment, security, social conditions and law are the main attributes and functions that provide citizen's with prosperity, a sense of safety and integrity. Good socio-economic conditions, healthy environment and respect for human rights provide a state with political and democratic strength. It also allows for business to be stronger and progressive. This edition aims to provide some of the key challenges for modern societies so that scientists may explain them and give some solutions for better risk and crisis management. Scientists and researchers from different areas and universities analysed risks from areas of IT, global health, migrations, social engineering, nuclear weaponry, environmental protection, private anti-crime business and different security policies. One of the aims of this edition is to explain how important it is to recognise all different challenges, not to neglect them, but to provide them with all possible legal solutions, technical solutions and knowledge to protect people, society and state from qualitatively different risks and consequences. Through this edition, experts and researches have tried to provide actual reviews of challenges of the twenty-first century and possible solutions for their understanding, prevention and/or minimalising damages in emergency situations.

Security Governance in East Africa - Pictures of Policing from the Ground (Hardcover): Kennedy Agade Mkutu Security Governance in East Africa - Pictures of Policing from the Ground (Hardcover)
Kennedy Agade Mkutu; Contributions by Kennedy Agade Mkutu, Edward Mogire, Doreen Alusa, Laura Wunder, …
R3,489 Discovery Miles 34 890 Ships in 10 - 15 working days

This collection of cases from East Africa, contributed largely by locally-based authors, explores the increasing security governance phenomenon in the region: that is, the mix of state and non-state actors, including private entities, volunteer auxiliaries, homegrown vigilantes and gangs, and the relationship between police and communities. Local dynamics brought by globalization, liberalization, the new scramble for resource wealth, inequality, and international terrorism are observed in detail, superimposed upon the well-known development challenges, ethnopolitical divides, and patterns of government and security provision which continue to reflect their colonial past. This book raises both practical and theoretical ethical dilemmas of the increasing fragmentation of security functions within Uganda, Kenya, South Sudan, mainland Tanzania, and Zanzibar. It is a vital contribution to the "non-state," "plural policing" debates and is of both local and global relevance.

U.S. Assistance to Foreign Military & Security Forces - Roles of the Departments of State & Defense (Paperback): Louise... U.S. Assistance to Foreign Military & Security Forces - Roles of the Departments of State & Defense (Paperback)
Louise Patterson
R3,640 Discovery Miles 36 400 Ships in 12 - 17 working days

The Department of State and the Department of Defense (DOD) have long shared responsibility for U.S. assistance to train, equip, and otherwise engage with foreign military and other security forces. The legal framework for such assistance emerged soon after World War II, when Congress charged the Secretary of State with responsibility for overseeing and providing general direction for military and other security assistance programs and the Secretary of Defense with responsibility for administering such programs. Over the years, congressional directives and executive actions have modified, shaped, and refined State Department and DOD roles and responsibilities. Changes in the legal framework through which security assistance to foreign forcesweapons, training, lethal and nonlethal military assistance, and military education and trainingis provided have responded to a wide array of factors. This book provides an overview of U.S. assistance to and engagement with foreign military and other security forces, focusing on Department of State and DOD roles. It lays out the historical evolution and current framework of the Department of State-DOD shared responsibility.

The Inside Man - Evaluating Security Communication Failures at a United States Commercial Airport (Hardcover): Stacey L. Tyler The Inside Man - Evaluating Security Communication Failures at a United States Commercial Airport (Hardcover)
Stacey L. Tyler
R2,118 Discovery Miles 21 180 Ships in 10 - 15 working days

Organizational communication impacts service efficiency and productivity. An increase in federal funding to strengthen communication within the airport stakeholders has failed to deliver expected results. The purpose of this qualitative case study is to explore whether miscommunication among the TSA agents and airport employees relates to effective implementation of airport security policies. The central research question focuses on the degree to which miscommunication between the TSA and airlines regarding prohibited items at security checkpoints impeded the effective execution of federal law regarding carry on luggage on commercial aircraft. Using Weick's organizational information theory, this study examines the implementation of airport security policy focusing on communication between government and industry organizations. A sample of 13 private airline employees and 7 airport employees at a large U.S. commercial airport participated in the study. Data was collected via semi structured interview questions. Data was coded and analyzed following an inductive coding strategy. According to study results, there is very little evidence of miscommunications between government and airline stakeholders regarding policy changes and expectations related to security procedures. However, miscommunication about the same policy changes to consumers confuses travelers, which may explain incidences of prohibited items at the security checkpoints. Implications for positive social change related to this study may assist policy makers in clarifying language to better inform travelers about security changes and prohibited items, the objective of which will promote safer flying experiences, reduce the potential for harm, and result in more expedient traveling.

Private Security in Africa - From the Global Assemblage to the Everyday (Hardcover): Doctor Paul Higate, Mats Utas Private Security in Africa - From the Global Assemblage to the Everyday (Hardcover)
Doctor Paul Higate, Mats Utas
R3,416 Discovery Miles 34 160 Ships in 10 - 15 working days

Across Africa, growing economic inequality, instability and urbanization have led to the rapid spread of private security providers. While these PSPs have already had a significant impact on African societies, their impact has so far received little in the way of comprehensive analysis. Drawing on a wide range of disciplinary approaches, and encompassing anthropology, sociology and political science, Private Security in Africa offers unique insight into the lives and experiences of security providers and those affected by them, as well as into the fragile state context which has allowed them to thrive. Featuring original empirical research and case studies ranging from private policing in South Africa to the recruitment of Sierra Leoneans for private security work in Iraq, the book considers the full implications of PSPs for security and the state, not only for Africa but for the world as a whole.

Surveillance - Power, Problems, and Politics (Paperback): Sean P. Hier, Josh Greenberg Surveillance - Power, Problems, and Politics (Paperback)
Sean P. Hier, Josh Greenberg
R952 Discovery Miles 9 520 Ships in 12 - 17 working days

Surveillance is commonly rationalized as a solution for existing problems such as crime and terrorism. This book explores how surveillance, often disguised as risk management or harm reduction, is also at the root of a range of social and political problems. Canadian scholars from diverse disciplines interrogate the moral and ideological bases as well as the material effects of surveillance in policing, consumerism, welfare administration, disaster management, popular culture, moral regulation, news media, social movements, and anti-terrorism campaigns.

Intelligent Network Video - Understanding Modern Video Surveillance Systems, Second Edition (Hardcover, 2nd edition): Fredrik... Intelligent Network Video - Understanding Modern Video Surveillance Systems, Second Edition (Hardcover, 2nd edition)
Fredrik Nilsson, Communications Axis
R3,576 Discovery Miles 35 760 Ships in 12 - 17 working days

Continuing in the tradition of the bestselling first edition, this book examines networked surveillance video solutions. It provides the latest details on industry hardware, software, and networking capabilities of the latest cameras and DVRs. It addresses in full detail updated specifications on MPEG-4 and other digital video formats, resolution advantages of analog v. digital, intelligent video capabilities, frame rate control, and indoor/outdoor installations factors. New chapters include cloud computing, standards, and thermal cameras.

Global Intelligence Oversight - Governing Security in the Twenty-First Century (Hardcover): Zachary K. Goldman, Samuel J.... Global Intelligence Oversight - Governing Security in the Twenty-First Century (Hardcover)
Zachary K. Goldman, Samuel J. Rascoff; Jane Harman
R2,574 Discovery Miles 25 740 Ships in 10 - 15 working days

In a world that is increasingly unstable, intelligence services like the American CIA and the United Kingdom's MI6 exist to deliver security. Whether the challenge involves terrorism, cyber-security, or the renewed specter of great power conflict, intelligence agencies mitigate threats and provide decisional advantage to national leaders. But empowered intelligence services require adequate supervision and oversight, which must be about more than the narrow (if still precarious) task of ensuring the legality of covert operations and surveillance activities. Global Intelligence Oversight is a comparative investigation of how democratic countries can govern their intelligence services so that they are effective, but operate within frameworks that are acceptable to their people in an interconnected world. The book demonstrates how the institutions that oversee intelligence agencies participate in the protection of national security while safeguarding civil liberties, balancing among competing national interests, and building public trust in inherently secret activities. It does so by analyzing the role of courts and independent oversight bodies as they operate in countries with robust constitutional frameworks and powerful intelligence services. The book also illuminates a new transnational oversight dynamic that is shaping and constraining security services in new ways. It describes how global technology companies and litigation in transnational forums constitute a new form of oversight whose contours are still undefined. As rapid changes in technology bring the world closer together, these forces will complement their more traditional counterparts in ensuring that intelligence activities remain effective, legitimate, and sustainable.

The Legendary Detective - The Private Eye in Fact and Fiction (Hardcover): John Walton The Legendary Detective - The Private Eye in Fact and Fiction (Hardcover)
John Walton
R702 Discovery Miles 7 020 Ships in 7 - 13 working days

I'm in a business where people come to me with troubles. Big troubles, little troubles, but always troubles they don't want to take to the cops. That's Raymond Chandler's Philip Marlowe, succinctly setting out our image of the private eye. A no-nonsense loner, working on the margins of society, working in the darkness to shine a little light. The reality is a little different-but no less fascinating. In The Legendary Detective, John Walton offers a sweeping history of the American private detective in reality and myth, from the earliest agencies to the hard-boiled heights of the 1930s and '40s. Drawing on previously untapped archival accounts of actual detective work, Walton traces both the growth of major private detective agencies like Pinkerton, which became powerful bulwarks against social and labor unrest, and the motley, unglamorous work of small-time operatives. He then goes on to show us how writers like Dashiell Hammett and editors of sensational pulp magazines like Black Mask embellished on actual experiences and fashioned an image of the PI as a compelling, even admirable, necessary evil, doing society's dirty work while adhering to a self-imposed moral code. Scandals, public investigations, and regulations brought the boom years of private agencies to an end in the late 1930s, Walton explains, in the process fully cementing the shift from reality to fantasy. Today, as the private detective has long since given way to security services and armed guards, the myth of the lone PI remains as potent as ever. No fan of crime fiction or American history will want to miss The Legendary Detective.

Gender and Private Security in Global Politics (Paperback): Maya Eichler Gender and Private Security in Global Politics (Paperback)
Maya Eichler
R1,219 Discovery Miles 12 190 Ships in 10 - 15 working days

For two hundred years the provision of military security has been a central and defining function of the modern nation-state. The increasing reliance on private military and security companies in contemporary conflict marks a fundamental transformation in the organization of military violence, and it raises issues of accountability and ethics that are of particular concern to feminists. This privatization of force not only enables states to circumvent citizens' democratic control over questions of war and peace, but also undermines women's and minority groups' claims for greater inclusion in the military sphere. Gender and Private Security in Global Politics brings together key scholars from the fields of international relations, security studies, and gender studies to argue that privatization of military security is a deeply gendered process. The chapters employ a variety of feminist perspectives, including critical, postcolonial, poststructuralist, and queer feminist perspectives, as well as a wide range of methodological approaches including ethnography, participant-observation, genealogy, and discourse analysis. This is the first book to develop an extended feminist analysis of private militaries and to draw on feminist concerns regarding power, justice and equality to consider how to reform and regulate private forces.

Security of U.S. Diplomatic Facilities & Personnel Abroad - Background, Federal Initiatives & Staff Training (Paperback):... Security of U.S. Diplomatic Facilities & Personnel Abroad - Background, Federal Initiatives & Staff Training (Paperback)
Teresa D Boles
R1,952 R1,711 Discovery Miles 17 110 Save R241 (12%) Ships in 12 - 17 working days

The United States maintains about 285 diplomatic facilities worldwide. Attacks on such facilities, and on U.S. diplomatic personnel, are not infrequent. The deaths of Ambassador Christopher Stevens and three other U.S. personnel in Benghazi, Libya on 11 September 2012, along with attacks on U.S. embassies in Egypt, Sudan, Tunisia, and Yemen, drew renewed attention to the challenges facing U.S. diplomats abroad, as well as to the difficulty in balancing concerns for their security against the outreach required of their mission. Congress plays a key role in shaping the response to these challenges, such as by providing resources for diplomatic security and examining security breaches overseas. This book provides background information on the organisation, practice, and funding of U.S. diplomatic security efforts. It also provides summary information on the 11 September 2012, attack on U.S. facilities in Benghazi, Libya, as well as on the subsequent Accountability Review Board.

Acts of Violence in the Federal Workplace - Prevention & Response Guide (Hardcover): Felix Tash Acts of Violence in the Federal Workplace - Prevention & Response Guide (Hardcover)
Felix Tash
R3,339 Discovery Miles 33 390 Ships in 12 - 17 working days

The protection of Federal employees and private citizens within U.S. government-owned or leased facilities is a top national priority. The mission of the Interagency Security Committee (ISC), comprised of 53 Federal departments and agencies, is to develop security standards, best practices, and guidelines for non-military Federal facilities in the United States. This book provides important information to assist department and agency security planners as they address a growing issue becoming increasingly present throughout both the public and the private sector: acts of violence in the workplace. The book provides a variety of examples based on real-world events for planners to study and take into consideration.

One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Hardcover): Simon... One Nation Under Surveillance - A New Social Contract to Defend Freedom Without Sacrificing Liberty (Hardcover)
Simon Chesterman
R1,963 Discovery Miles 19 630 Ships in 10 - 15 working days

What limits, if any, should be placed on a government's efforts to spy on its citizens in the name of national security? Spying on foreigners has long been regarded as an unseemly but necessary enterprise. Spying on one's own citizens in a democracy, by contrast, has historically been subject to various forms of legal and political restraint. For most of the twentieth century these regimes were kept distinct. That position is no longer tenable. Modern threats do not respect national borders. Changes in technology make it impractical to distinguish between 'foreign' and 'local' communications. And our culture is progressively reducing the sphere of activity that citizens can reasonably expect to be kept from government eyes. The main casualty of this transformed environment will be privacy. Recent battles over privacy have been dominated by fights over warrantless electronic surveillance and CCTV; the coming years will see debates over DNA databases, data mining, and biometric identification. There will be protests and lawsuits, editorials and elections resisting these attacks on privacy. Those battles are worthy. But the war will be lost. Modern threats increasingly require that governments collect such information, governments are increasingly able to collect it, and citizens increasingly accept that they will collect it. This book proposes a move away from questions of whether governments should collect information and onto more problematic and relevant questions concerning its use. By reframing the relationship between privacy and security in the language of a social contract, mediated by a citizenry who are active participants rather than passive targets, the book offers a framework to defend freedom without sacrificing liberty.

Public Safety and Law Enforcement (Loose-leaf): Public Safety and Law Enforcement (Loose-leaf)
R1,207 Discovery Miles 12 070 Ships in 12 - 17 working days

Public Safety and Law Enforcement guides readers to various career possibilities in this interesting field. Featuring invaluable tips and practical advice from professionals, this new book offers an overview of jobs in public safety and law enforcement as well as ways to map out career goals for the future.

Careers profiled include:

Antiterrorism consultant

Building inspector

Emergency medical technician

Firefighter

Forensic science technician

Information security consultant

Park ranger

Police officer

Private investigator.

Emergency Notification (Hardcover): Robert C. Chandler Emergency Notification (Hardcover)
Robert C. Chandler
R1,702 Discovery Miles 17 020 Ships in 10 - 15 working days

This text provides critical information to help organizations improve their emergency communications, including the tools, automation technology, and processes of crisis notification. To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain the situation, campus personnel need to communicate immediately and efficiently, not only with the students, faculty, and staff, but also the local police, federal law enforcement, and media. Effective emergency notification makes things "right," it allows the right message to reach the right people at the right time—facilitating the right response. Emergency Notification explains how. This book offers must-know information for business security, senior management, human resources staff, government policymakers, and emergency planners, examining what, when, how, why, and with whom to communicate during crises. This text also covers risk communication, message mapping, information loading, audience comprehension, and practical issues like testing emergency notification systems.

Surveillance in the Time of Insecurity (Paperback, New): Surveillance in the Time of Insecurity (Paperback, New)
R1,231 Discovery Miles 12 310 Ships in 10 - 15 working days

Threats of terrorism, natural disaster, identity theft, job loss, illegal immigration, and even biblical apocalypse - all are perils that trigger alarm in people today. Although there may be a factual basis for many of these fears, they do not simply represent objective conditions. Feelings of insecurity are instilled by politicians and the media, and sustained by urban fortification, technological surveillance, and economic vulnerability. ""Surveillance in the Time of Insecurity"" fuses advanced theoretical accounts of state power and neoliberalism with original research from the social settings in which insecurity dynamics play out in the new century. Torin Monahan explores the counterterrorism-themed show ""24"", Rapture fiction, traffic control centers, security conferences, public housing, and gated communities, and examines how each manifests complex relationships of inequality, insecurity, and surveillance. Alleviating insecurity requires that we confront its mythic dimensions, the politics inherent in new configurations of security provision, and the structural obstacles to achieving equality in societies.

Privacy in Peril - How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience (Paperback): James B.... Privacy in Peril - How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience (Paperback)
James B. Rule
R874 Discovery Miles 8 740 Ships in 10 - 15 working days

This provocative book offers a probing account of the erosion of privacy in American society, that shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience. The author reveals that in today's "information society," the personal data that we make available to virtually any organization for virtually any purpose is apt to surface elsewhere, applied to utterly different purposes. The mass collection and processing of personal information produces such tremendous efficiencies that both the public and private sector feel justified in pushing as far as they can into our private lives. And there is no easy cure. Indeed, there are many cases where privacy invasion is both hurtful to the individual and indispensable to an organization's quest for efficiency. And as long as we willingly accept the pursuit of profit, or the reduction of crime, or cutting government costs as sufficient reason for intensified scrutiny over our lives, then privacy will remain endangered.

Making Public Places Safer - Surveillance and Crime Prevention (Hardcover): Brandon C. Welsh, David P. Farrington Making Public Places Safer - Surveillance and Crime Prevention (Hardcover)
Brandon C. Welsh, David P. Farrington
R1,762 Discovery Miles 17 620 Ships in 10 - 15 working days

The United Kingdom has more than 4.2 million public closed-circuit television (CCTV) cameras-one for every fourteen citizens. Across the United States, hundreds of video surveillance systems are being installed in town centers, public transportation facilities, and schools at a cost exceeding $100 million annually. And now other Western countries have begun to experiment with CCTV to prevent crime in public places. In light of this expansion and the associated public expenditure, as well as pressing concerns about privacy rights, there is an acute need for an evidence-based approach to inform policy and practice.
Drawing on the highest-quality research, criminologists Brandon C. Welsh and David P. Farrington assess the effectiveness and social costs of not only CCTV, but also of other important surveillance methods to prevent crime in public space, such as improved street lighting, security guards, place managers, and defensible space. Importantly, the book goes beyond the question of "Does it work?" and examines the specific conditions and contexts under which these surveillance methods may have an effect on crime as well as the mechanisms that bring about a reduction in crime.
At a time when cities need cost-effective methods to fight crime and the public gradually awakens to the burdens of sacrificing their privacy and civil rights for security, Welsh and Farrington provide this timely and reliable guide to the most effective and non-invasive uses of surveillance to make public places safer from crime.

ISpy - Surveillance and Power in the Interactive Era (Paperback): Mark Andrejevic ISpy - Surveillance and Power in the Interactive Era (Paperback)
Mark Andrejevic
R1,026 Discovery Miles 10 260 Ships in 10 - 15 working days

'This book will change the way you think about today's new media technologies' - Daniel J. Solove, author of ""The Digital Person: Technology and Privacy in the Information Age"". Whether you're purchasing groceries with your Safeway 'club card' or casting a vote on ""American Idol"", those data are being collected. From Amazon to iTunes, smart phones to GPS devices, Google to TiVo - all of these products and services give us an expansive sense of choice, access, and participation. Mark Andrejevic shows, however, that these continuously evolving new technologies have also been employed as modes of surveillance and control, most disturbingly exemplified by revelations about the NSA's secret monitoring of our phone calls, e-mails, and internet searches. Many contend that our proliferating interactive media empower individuals and democratize society. But, Andrejevic asks, at what cost? In ""iSpy"", he reveals that these and other highly advertised benefits are accompanied by hidden risks and potential threats that we all tend to ignore. His book, providing the first sustained critique of a concept that has been a talking point for twenty years, debunks the false promises of the digital revolution still touted by the popular media while seeking to rehabilitate, rather than simply write off, the potentially democratic uses of interactive media. Andrejevic opens up the world of digital rights management and the data trail each of us leaves - data about our locations, preferences, or life events that are already put to use in various economic, political, and social contexts. He notes that, while citizens are becoming increasingly transparent to private and public monitoring agencies, they themselves are unable to access the information gathered about them - or know whether it's even correct. (The watchmen, it seems, don't want to be watched.) He also considers the appropriation of consumer marketing for political campaigns in targeting voters and examines the implications of the Internet for the so-called War on Terror. In ""iSpy"", Andrejevic poses real challenges for our digital future. Amazingly detailed, compellingly readable, it warns that we need to temper our enthusiasm for these technologies with a better understanding of the threats they pose - to be able to distinguish between interactivity as centralized control and as collaborative participation.

Securitising Russia - The Domestic Politics of Vladimir Putin (Hardcover, New): Edwin Bacon, Bettina Renz, Julian Cooper Securitising Russia - The Domestic Politics of Vladimir Putin (Hardcover, New)
Edwin Bacon, Bettina Renz, Julian Cooper
R3,387 Discovery Miles 33 870 Ships in 10 - 15 working days

Securitising Russia shows the impact of twenty-first-century security concerns on the way Russia is ruled. It demonstrates how President Putin has wrestled with terrorism, immigration, media freedom, religious pluralism, and economic globalism, and argues that fears of a return to old-style authoritarianism oversimplify the complex context of contemporary Russia. The book focuses on the internal security issues common to many states in the early twenty-first-century, and places them in the particular context of Russia. Detailed analysis of the place of security in Russia's political discourse and policy-making reveals nuances often missing from overarching assessments of Russia today. To characterise the Putin regime as the 'KGB-resurgent' is to miss vital continuities, contexts, and on-going political conflicts which make up the contemporary Russian scene. Securitising Russia draws together current debates about whether Russia is a 'normal' country developing its own democratic and market structures, or a nascent authoritarian regime returning to the past. -- .

European Security Law (Hardcover, New): Martin Trybus, Nigel White European Security Law (Hardcover, New)
Martin Trybus, Nigel White
R3,173 Discovery Miles 31 730 Ships in 10 - 15 working days

There have been a number of EU military operations in the last few years, evidence of a growing European military confidence, which in turn is a reflection of a developing competence in security matters. The creation of the European Union and its Common Foreign and Security Policy by the Maastricht Treaty of 1992 heralded this development, though the idea of a common defense can be traced to the beginnings of European integration. This book provides an analysis of the EU's evolving legal framework and powers on such matters, but it also recognizes that such a framework sits, sometimes uneasily, within the wider body of EU and International Law. The EU's security and defense policy also overlaps with those of other organizations such as the Organization for Security and Cooperation in Europe (OSCE), but more especially the North Atlantic Treaty Organization (NATO). EU relations with NATO have, in particular, caused some concern and are still evolving as both organizations seek to play a wider security role in the post-Cold War, and now post-9/11, era. With security now dominating political agendas at the domestic, regional and international levels, it is no surprise that the EU's concern for security has grown, and, following the Union's respect for the rule of law, has been shaped legally as well as politically. This book evaluates the progress of the Union in this regard in its international context and in its wider context of European integration generally. The analysis is in the main a legal one, but is placed squarely within wider historical and political perspectives.

Electronic Security Systems - A Manager's Guide to Evaluating and Selecting System Solutions (Paperback): Robert Pearson Electronic Security Systems - A Manager's Guide to Evaluating and Selecting System Solutions (Paperback)
Robert Pearson
R2,138 Discovery Miles 21 380 Ships in 10 - 15 working days

" Electronic Security Systems " is a book written to help the security professional understand the various electronic security functional components and the ways these components interconnect. Providing a holistic approach to solving security issues, this book discusses such topics as integrating electronic functions, developing a system, component philosophy, possible long-term issues, and the culture within a corporation. The book uses a corporate environment as its example; however, the basic issues can be applied to virtually any environment.
For a security professional to be effective, he or she needs to understand the electronics as they are integrated into a total security system. " Electronic Security Systems " allows the professional to do just that, and is an invaluable addition to any security library.
* Provides a well-written and concise overview of electronic security systems and their functions
* Takes a holistic approach by focusing on the integration of different aspects of electronic security systems
* Includes a collection of practical experiences, solutions, and an approach to solving technical problems

The Secret Life of the Lawman's Wife (Hardcover, Annotated edition): Barbara J. Alderman The Secret Life of the Lawman's Wife (Hardcover, Annotated edition)
Barbara J. Alderman
R2,861 Discovery Miles 28 610 Ships in 10 - 15 working days

The office of county sheriff has existed in America since 1634. Between 1800 and 1960, families of the sheriff lived in or near the jail. All family members, young and old, worked alongside the lawman to fulfill the required duties, without additional pay. The "mom and pop" jail was truly a family business. After the middle of the 20th century, fewer families carried on this tradition as counties modernized and jails became professionalized. During an era when many women concentrated on hearth and home, thousands of women quietly and without pay served in law enforcement. They organized, administered, presented reports to county commissioners, prepared for inspections, comforted victims, disciplined unruly inmates, fought with escapees, rode shotgun with their husbands as backup, and raised children, tended gardens, and kept house. They risked their lives every day and some paid the ultimate price. This is their story.

Beyond Fear - Thinking Sensibly About Security in an Uncertain World (Hardcover, 1st ed. 2003. Corr. 2nd printing 2006): Bruce... Beyond Fear - Thinking Sensibly About Security in an Uncertain World (Hardcover, 1st ed. 2003. Corr. 2nd printing 2006)
Bruce Schneier
R1,309 R1,039 Discovery Miles 10 390 Save R270 (21%) Ships in 10 - 15 working days

Why must we design security systems that work and fail well? Why are national ID cards a technically unsound, even dangerous idea? Why is buying online safe? Why should we definitely NOT invest in biometrics- based scanners for airports? Surprising assessments and advice from a leading security expert.Schneier, the highly regarded author of "Applied Cryptography and Secrets and Lies", turns his iconoclastic mind on the broader issues of security, including the vast infrastructure we already have in place, and the vaster systems -- some useful, others useless or worse -- that we're being asked to submit to and pay for. Rather than heavy-handed proselytizing, Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions.

The New Politics of Surveillance and Visibility (Paperback): Kevin Haggerty, Richard V. Ericson The New Politics of Surveillance and Visibility (Paperback)
Kevin Haggerty, Richard V. Ericson; Edited by Kevin Haggerty, Richard V. Ericson
R1,914 Discovery Miles 19 140 Ships in 10 - 15 working days

Since the terrorist attacks of September 2001, surveillance has been put forward as the essential tool for the aEURO"war on terror,aEURO(t) with new technologies and policies offering police and military operatives enhanced opportunities for monitoring suspect populations. The last few years have also seen the publicaEURO(t)s consumer tastes become increasingly codified, with aEURO"data minesaEURO(t) of demographic information such as postal codes and purchasing records. Additionally, surveillance has become a form of entertainment, with aEURO"realityaEURO(t) shows becoming the dominant genre on network and cable television.In The New Politics of Surveillance and Visibility, editors Kevin D. Haggerty and Richard V. Ericson bring together leading experts to analyse how society is organized through surveillance systems, technologies, and practices. They demonstrate how the new political uses of surveillance make visible that which was previously unknown, blur the boundaries between public and private, rewrite the norms of privacy, create new forms of inclusion and exclusion, and alter processes of democratic accountability. This collection challenges conventional wisdom and advances new theoretical approaches through a series of studies of surveillance in policing, the military, commercial enterprises, mass media, and health sciences.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Software Deployment, Updating, and…
Bill Stackpole, Patrick Hanrion Paperback R1,827 Discovery Miles 18 270
1984
George Orwell Paperback R171 Discovery Miles 1 710
Managing the Insider Threat - No Dark…
Nick Catrantzos Hardcover R3,800 Discovery Miles 38 000
Introduction to Terrorism
David H. McElreath, Carl J. Jensen, … Hardcover R2,508 R2,138 Discovery Miles 21 380
The Security Hippie
Barak Engel Paperback R1,110 Discovery Miles 11 100
Multllinguallsm, the Judicial Authority…
Kas Deprez, Theo du Plessis, … Paperback R590 R546 Discovery Miles 5 460
Tracer - A gripping thriller full of…
Jason Dean Paperback R138 Discovery Miles 1 380
Family Tree Workbook - 30+ Step-By-Step…
Brian Sheffey Paperback R384 R328 Discovery Miles 3 280
Privacy in Practice - Establish and…
Alan Tang Hardcover R3,133 Discovery Miles 31 330
PKI Implementation and Infrastructures
Julian Ashbourn Paperback R1,110 Discovery Miles 11 100

 

Partners