0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (7)
  • R250 - R500 (38)
  • R500+ (373)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

U.S. Assistance to Foreign Military & Security Forces - Roles of the Departments of State & Defense (Paperback): Louise... U.S. Assistance to Foreign Military & Security Forces - Roles of the Departments of State & Defense (Paperback)
Louise Patterson
R3,457 Discovery Miles 34 570 Ships in 10 - 15 working days

The Department of State and the Department of Defense (DOD) have long shared responsibility for U.S. assistance to train, equip, and otherwise engage with foreign military and other security forces. The legal framework for such assistance emerged soon after World War II, when Congress charged the Secretary of State with responsibility for overseeing and providing general direction for military and other security assistance programs and the Secretary of Defense with responsibility for administering such programs. Over the years, congressional directives and executive actions have modified, shaped, and refined State Department and DOD roles and responsibilities. Changes in the legal framework through which security assistance to foreign forcesweapons, training, lethal and nonlethal military assistance, and military education and trainingis provided have responded to a wide array of factors. This book provides an overview of U.S. assistance to and engagement with foreign military and other security forces, focusing on Department of State and DOD roles. It lays out the historical evolution and current framework of the Department of State-DOD shared responsibility.

Guinea Pigs (Paperback): John Hall Guinea Pigs (Paperback)
John Hall
R452 Discovery Miles 4 520 Ships in 18 - 22 working days
Surveillance in the Time of Insecurity (Paperback, New): Surveillance in the Time of Insecurity (Paperback, New)
R1,118 Discovery Miles 11 180 Ships in 18 - 22 working days

Threats of terrorism, natural disaster, identity theft, job loss, illegal immigration, and even biblical apocalypse - all are perils that trigger alarm in people today. Although there may be a factual basis for many of these fears, they do not simply represent objective conditions. Feelings of insecurity are instilled by politicians and the media, and sustained by urban fortification, technological surveillance, and economic vulnerability. ""Surveillance in the Time of Insecurity"" fuses advanced theoretical accounts of state power and neoliberalism with original research from the social settings in which insecurity dynamics play out in the new century. Torin Monahan explores the counterterrorism-themed show ""24"", Rapture fiction, traffic control centers, security conferences, public housing, and gated communities, and examines how each manifests complex relationships of inequality, insecurity, and surveillance. Alleviating insecurity requires that we confront its mythic dimensions, the politics inherent in new configurations of security provision, and the structural obstacles to achieving equality in societies.

Digital Surveillance - Laws, Security & Related Issues (Paperback, New): Joseph G. Massingale Digital Surveillance - Laws, Security & Related Issues (Paperback, New)
Joseph G. Massingale
R1,555 R1,056 Discovery Miles 10 560 Save R499 (32%) Ships in 10 - 15 working days

New digital technologies and wireless services have altered the character of electronic surveillance. This book deals with some of the laws and technologies that are being utilised to cope with the rapid advances in digital technologies as it relates to crime and homeland security.

Surveillance - Power, Problems, and Politics (Hardcover): Sean P. Hier, Josh Greenberg Surveillance - Power, Problems, and Politics (Hardcover)
Sean P. Hier, Josh Greenberg
R2,192 Discovery Miles 21 920 Ships in 10 - 15 working days

Surveillance is commonly rationalized as a solution for existing problems such as crime and terrorism. This book explores how surveillance, often disguised as risk management or harm reduction, is also at the root of a range of social and political problems. Canadian scholars from diverse disciplines interrogate the moral and ideological bases as well as the material effects of surveillance in policing, consumerism, welfare administration, disaster management, popular culture, moral regulation, news media, social movements, and anti-terrorism campaigns.

Citizens Defending America - From Colonial Times to the Age of Terrorism (Hardcover, New): Martin Alan Greenberg Citizens Defending America - From Colonial Times to the Age of Terrorism (Hardcover, New)
Martin Alan Greenberg
R1,701 Discovery Miles 17 010 Ships in 10 - 15 working days

Foreword by John B. Wilt, Colonel (Retired), U.S. Airforce ReserveToday, concerns over homeland security have led thousands of Americans to volunteer for various citizen emergency response groups, such as the Civil Air Patrol, U.S. Coast Guard Auxiliary, Community Emergency Response Teams, fire units, etc. In Citizens Defending America, Martin Greenberg focuses new attention on the subject of citizen volunteerism by chronicling the nature and purpose of volunteer police units-authorized organizations of a public or private nature that work at deterring crime and/or preventing terrorism for little or no monetary compensation-in America since 1620. A number of these historical groups responsible for maintaining the civil order of the day-slave patrols, frontier posses, vice suppression societies, the American Protective League, for example-now seem controversial when viewed through a contemporary lens. Greenberg uses the history of such groups to reflect upon the nation's past and to consider the possibilities for a safe and secure future. He also emphasizes the role of young people in the fields of security and safety, and stresses the need for more qualified, trained volunteers to help cope with man-made and natural disasters.

Security and politics in South Africa - A regional dimension (Book): Peter Vale Security and politics in South Africa - A regional dimension (Book)
Peter Vale
R483 Discovery Miles 4 830 Ships in 2 - 4 working days

In this analysis of South Africa's post apartheid security system, the author moves beyond a realist discussion of interacting states to examine southern Africa as an integrated whole. The author argues that, despite South Africa's manipulation of state structures and elites in the region for its own ends, the suffering endured under the apartheid regime drew the region together at the popular level and that economic factors, such as the use of migrant labor, reinforced the process of integration. Exploring how the region is changing today as transnational solidarity and a single regional economy remove the distinctions between national and international politics he asks whether 'South African domination can finally be overcome and considers what sort of cosmopolitan political arrangement will be appropriate for southern Africa in the new century.

Private Investigation and Homeland Security (Hardcover): Daniel J Benny Private Investigation and Homeland Security (Hardcover)
Daniel J Benny
R4,205 Discovery Miles 42 050 Ships in 10 - 15 working days

The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.

Police Visibility - Privacy, Surveillance, and the False Promise of Body-Worn Cameras (Paperback): Bryce Clayton Newell Police Visibility - Privacy, Surveillance, and the False Promise of Body-Worn Cameras (Paperback)
Bryce Clayton Newell
R995 Discovery Miles 9 950 Ships in 18 - 22 working days

Police Visibility presents empirically grounded research into how police officers experience and manage the information politics of surveillance and visibility generated by the introduction of body cameras into their daily routines and the increasingly common experience of being recorded by civilian bystanders. Newell elucidates how these activities intersect with privacy, free speech, and access to information law and argues that rather than being emancipatory systems of police oversight, body-worn cameras are an evolution in police image work and state surveillance expansion. Throughout the book, he catalogs how surveillance generates information, the control of which creates and facilitates power and potentially fuels state domination. The antidote, he argues, is robust information law and policy that puts the power to monitor and regulate the police squarely in the hands of citizens.  

The National Security Constitution (Paperback): Paul F Scott The National Security Constitution (Paperback)
Paul F Scott
R2,066 Discovery Miles 20 660 Ships in 18 - 22 working days

This book addresses the various ways in which modern approaches to the protection of national security have impacted upon the constitutional order of the United Kingdom. It outlines and assesses the constitutional significance of the three primary elements of the United Kingdom's response to the possibility of terrorism and other phenomena that threaten the security of the state: the body of counter-terrorism legislation that has grown up in the last decade and a half; the evolving law of investigatory powers; and, to the extent relevant to the domestic constitution, the law and practice governing international military action and co-operation. Following on from this, the author demonstrates that considerations of national security - as a good to be protected and promoted in contemporary Britain - are reflected not merely in the existence of discrete bodies of law by which it is protected at home and abroad, but simultaneously and increasingly leaked into other areas of public law. Elements of the constitution which are not directly and inherently linked to national security nevertheless become (by both accident and design) implicated in the state's national security endeavours, with significant and at times far-reaching consequences for the constitutional order generally. A renewed and strengthened concern for national security since September 2001 has, it is argued, dragged into its orbit a variety of constitutional phenomena and altered them in its image, giving rise to what we might call a national security constitution.

Private Security in Africa - From the Global Assemblage to the Everyday (Paperback): Doctor Paul Higate, Mats Utas Private Security in Africa - From the Global Assemblage to the Everyday (Paperback)
Doctor Paul Higate, Mats Utas
R947 Discovery Miles 9 470 Ships in 10 - 15 working days

Across Africa, growing economic inequality, instability and urbanization have led to the rapid spread of private security providers. While these PSPs have already had a significant impact on African societies, their impact has so far received little in the way of comprehensive analysis. Drawing on a wide range of disciplinary approaches, and encompassing anthropology, sociology and political science, Private Security in Africa offers unique insight into the lives and experiences of security providers and those affected by them, as well as into the fragile state context which has allowed them to thrive. Featuring original empirical research and case studies ranging from private policing in South Africa to the recruitment of Sierra Leoneans for private security work in Iraq, the book considers the full implications of PSPs for security and the state, not only for Africa but for the world as a whole.

Surveillance and Space (Paperback): Francisco Klauser Surveillance and Space (Paperback)
Francisco Klauser
R1,384 Discovery Miles 13 840 Ships in 18 - 22 working days

The digital age is also a surveillance age. Today, computerized systems protect and manage our everyday life; the increasing number of surveillance cameras in public places, the computerized loyalty systems of the retail sector, geo-localized smart-phone applications, or smart traffic and navigation systems. Surveillance is nothing fundamentally new, and yet more and more questions are being asked: Who monitors whom, and how and why? How do surveillance techniques affect socio-spatial practices and relationships? How do they shape the fabrics of our cities, our mobilities, the spaces of the everyday? And what are the implications in terms of border control and the exercise of political power? Surveillance and Space responds to these modern questions by exploring the complex and varied interactions between surveillance and space. In doing so, the book also advances a programmatic reflection on the very possibility of a 'political geography of surveillance'.

Private Security In The 21St Century: Concepts And Applications (Paperback): Dr Edward J Maggio Private Security In The 21St Century: Concepts And Applications (Paperback)
Dr Edward J Maggio
R2,909 Discovery Miles 29 090 Ships in 18 - 22 working days

Private Security In The 21St Century: Concepts And Applications Informs The Learner About The Historical Development Of Private Security And Provides New Information For Educating And Training Private Security Personnel In The Beginning Stages Of Their Career, Whether They Are A Full Time Student Or Entry Level Security Worker On The Job. This Text Will Not Only Provide The Background Information That A Prospective Security Person Should Know, But Also Describes The Basic Operational Procedures Students Need To Understand. Private Security In The United States: Concepts And Applications Examines Current Practices In Private Security And Technology.

Australian Security After 9/11 - New and Old Agendas (Hardcover, New Ed): Peter Shearman Australian Security After 9/11 - New and Old Agendas (Hardcover, New Ed)
Peter Shearman; Derek Mcdougall
R4,208 Discovery Miles 42 080 Ships in 10 - 15 working days

Debates on security became more intense following the unanticipated end of the Cold War conflict and took on added force after the terrorist attacks on the US on September 11, 2001. Generally viewed as a part of the wider 'West' despite its separation by enormous geographical distances from both Europe and the United States, Australia is a regional power in its own right. It has been an active and loyal member of the US-led coalitions of the willing, first in Afghanistan and then in Iraq. The terrorist attacks in Bali one year after the attacks in the United States brought home to Australia the direct nature of the new global terrorist threats to its own security. This volume brings together leading experts on international security and Australia's foreign and security policies in a critical examination of Australia's adaptations to the new security challenges. It is the first in-depth and comprehensive analysis of Australia's defence and security policies as well as the country's role in countering regional and global challenges to international security since the war on terrorism began.

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover): Dan... A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R2,496 Discovery Miles 24 960 Ships in 10 - 15 working days

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

Bioterrorism - Field Guide to Disease Identification and Initial Patient Management (Paperback, New): Dag K.J.E. von Lubitz Bioterrorism - Field Guide to Disease Identification and Initial Patient Management (Paperback, New)
Dag K.J.E. von Lubitz
R2,793 Discovery Miles 27 930 Ships in 10 - 15 working days

The outbreak of anthrax infections that followed September 11, 2001, showed all too clearly that while we can defend ourselves against bioterrorism, our defenses need improvement. What's most important is the ability to recognize the associated disease, and recognize them quickly. Yet, many in the medical world are unfamiliar with the characteristic signs and symptoms of bioterrorism agents and are unable to differentiate between diseases whose symptoms appear almost identical. While a plethora of information on such diseases is available, finding it is time consuming.

Bioterrorism: Field Guide to Disease Identification and Initial Patient Management is an accessible resource that helps first-responders to quickly recognize the signs and symptoms caused by exposure to bioterrorism agents. It provides enough information to initiate treatment while a definitive diagnosis is being determined and presents measures for preventing contamination of those involved in the victims' medical management.

A special quick-reference foldout chart features a matrix linking 180 symptoms to 17 diseases and 90 differential diagnosis. In bulleted format, the book includes for each pathogenic agent:

" A brief description
" Signs and symptoms
" Diagnostic features
" Lab tests and expected results
" Treatment (specific drug regimens)
" Prophylaxis (specific drug regimens)
" Precautionary measures

This book is a potentially life-saving resource that can be thrown into a medical bag and kept there, hopefully forever unused. But if needed, it is a resource that can quickly provide information that will prevent secondary infections, improve site safety, and buy life-saving time for victims.

Cyber Forensics - A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition... Cyber Forensics - A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition (Electronic book text, 2nd Revised edition)
Albert Marcella, Jr., Doug Menendez
R1,791 Discovery Miles 17 910 Out of stock

Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of a cyber forensic investigation. The authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition delineates the scope and goals of cyber forensics to reveal and track legal and illegal activity. Beginning with an introduction and definition of cyber forensics, chapters explain the rules of evidence and chain of custody in maintaining legally valid electronic evidence. They describe how to begin an investigation and employ investigative methodology, as well as establish standard operating procedures for the field and cyber forensic laboratory. The authors provide an in depth examination of the manipulation of technology to conceal illegal activities and the use of cyber forensics to uncover them. They discuss topics and issues such as conducting a cyber forensic investigation within both the local and federal legal framework, and evaluating the current data security and integrity exposure of multifunctional devices. Cyber Forensics includes details and tips on taking control of a suspect computer or PDA and its "operating" environment, mitigating potential exposures and risks to chain of custody, and establishing and following a flowchart for the seizure of electronic evidence. An extensive list of appendices include websites, organizations, pertinent legislation, further readings, best practice recommendations, more information on hardware and software, and a recap of the federal rules of civil procedure.

Hospital and Healthcare Security (Paperback, 5th Revised edition): Russell L. Colling, Tony W. York Hospital and Healthcare Security (Paperback, 5th Revised edition)
Russell L. Colling, Tony W. York
R1,982 Discovery Miles 19 820 Out of stock

Hospital and Healthcare Security, Fifth Edition, examines the issues inherent to healthcare and hospital security, including licensing, regulatory requirements, litigation, and accreditation standards. Building on the solid foundation laid down in the first four editions, the book looks at the changes that have occurred in healthcare security since the last edition was published in 2001. It consists of 25 chapters and presents examples from Canada, the UK, and the United States. It first provides an overview of the healthcare environment, including categories of healthcare, types of hospitals, the nonhospital side of healthcare, and the different stakeholders. It then describes basic healthcare security risks/vulnerabilities and offers tips on security management planning. The book also discusses security department organization and staffing, management and supervision of the security force, training of security personnel, security force deployment and patrol activities, employee involvement and awareness of security issues, implementation of physical security safeguards, parking control and security, and emergency preparedness. Healthcare security practitioners and hospital administrators will find this book invaluable. FEATURES AND BENEFITS: * Practical support for healthcare security professionals, including operationally proven policies, and procedures * Specific assistance in preparing plans and materials tailored to healthcare security programs * Summary tables and sample forms bring together key data, facilitating ROI discussions with administrators and other departments * General principles clearly laid out so readers can apply the industry standards most appropriate to their own environment NEW TO THIS EDITION: * Quick-start section for hospital administrators who need an overview of security issues and best practices

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Machine See, Machine Do - How Technology…
Patrick K Lin Hardcover R683 R612 Discovery Miles 6 120
Biometrics - Concepts, Methodologies…
Information Reso Management Association Hardcover R9,436 Discovery Miles 94 360
Contemporary Security Management
John Fay Hardcover R1,479 Discovery Miles 14 790
Risk Management for Security…
Carl Roper Hardcover R1,849 Discovery Miles 18 490
Security Consulting
Charles A. Sennewald Paperback R1,107 Discovery Miles 11 070
The Enforcers - Inside Cape Town's…
Caryn Dolley Paperback  (1)
R295 R264 Discovery Miles 2 640
Managing the Insider Threat - No Dark…
Nick Catrantzos Hardcover R3,582 R3,071 Discovery Miles 30 710
Tell Me Everything - The Story of a…
Erika Krouse Paperback R443 Discovery Miles 4 430
Security Intelligence Services in New…
K. Williams, D. Deletant Hardcover R1,418 Discovery Miles 14 180
Women in the Security Profession - A…
Sandi J. Davies Paperback R1,379 Discovery Miles 13 790

 

Partners