0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (38)
  • R500+ (396)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Private Security in Africa - From the Global Assemblage to the Everyday (Paperback): Doctor Paul Higate, Mats Utas Private Security in Africa - From the Global Assemblage to the Everyday (Paperback)
Doctor Paul Higate, Mats Utas
R1,002 Discovery Miles 10 020 Ships in 12 - 19 working days

Across Africa, growing economic inequality, instability and urbanization have led to the rapid spread of private security providers. While these PSPs have already had a significant impact on African societies, their impact has so far received little in the way of comprehensive analysis. Drawing on a wide range of disciplinary approaches, and encompassing anthropology, sociology and political science, Private Security in Africa offers unique insight into the lives and experiences of security providers and those affected by them, as well as into the fragile state context which has allowed them to thrive. Featuring original empirical research and case studies ranging from private policing in South Africa to the recruitment of Sierra Leoneans for private security work in Iraq, the book considers the full implications of PSPs for security and the state, not only for Africa but for the world as a whole.

Surveillance and Space (Hardcover): Francisco Klauser Surveillance and Space (Hardcover)
Francisco Klauser
R4,030 Discovery Miles 40 300 Ships in 10 - 15 working days

The digital age is also a surveillance age. Today, computerized systems protect and manage our everyday life; the increasing number of surveillance cameras in public places, the computerized loyalty systems of the retail sector, geo-localized smart-phone applications, or smart traffic and navigation systems. Surveillance is nothing fundamentally new, and yet more and more questions are being asked: Who monitors whom, and how and why? How do surveillance techniques affect socio-spatial practices and relationships? How do they shape the fabrics of our cities, our mobilities, the spaces of the everyday? And what are the implications in terms of border control and the exercise of political power? Surveillance and Space responds to these modern questions by exploring the complex and varied interactions between surveillance and space. In doing so, the book also advances a programmatic reflection on the very possibility of a 'political geography of surveillance'.

Surveillance and Space (Paperback): Francisco Klauser Surveillance and Space (Paperback)
Francisco Klauser
R1,495 Discovery Miles 14 950 Ships in 10 - 15 working days

The digital age is also a surveillance age. Today, computerized systems protect and manage our everyday life; the increasing number of surveillance cameras in public places, the computerized loyalty systems of the retail sector, geo-localized smart-phone applications, or smart traffic and navigation systems. Surveillance is nothing fundamentally new, and yet more and more questions are being asked: Who monitors whom, and how and why? How do surveillance techniques affect socio-spatial practices and relationships? How do they shape the fabrics of our cities, our mobilities, the spaces of the everyday? And what are the implications in terms of border control and the exercise of political power? Surveillance and Space responds to these modern questions by exploring the complex and varied interactions between surveillance and space. In doing so, the book also advances a programmatic reflection on the very possibility of a 'political geography of surveillance'.

Biometric Technology - Authentication, Biocryptography, and Cloud-Based Architecture (Hardcover): Ravi Das Biometric Technology - Authentication, Biocryptography, and Cloud-Based Architecture (Hardcover)
Ravi Das
R4,489 Discovery Miles 44 890 Ships in 12 - 19 working days

Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the two, Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture is ideal for business, IT, or security managers that are faced with the task of making purchasing, migration, or adoption decisions. It brings biometrics down to an understandable level, so that you can immediately begin to implement the concepts discussed. Exploring the technological and social implications of widespread biometric use, the book considers the science and technology behind biometrics as well as how it can be made more affordable for small and medium-sized business. It also presents the results of recent research on how the principles of cryptography can make biometrics more secure. Covering biometric technologies in the cloud, including security and privacy concerns, the book includes a chapter that serves as a "how-to manual" on procuring and deploying any type of biometric system. It also includes specific examples and case studies of actual biometric deployments of localized and national implementations in the U.S. and other countries. The book provides readers with a technical background on the various biometric technologies and how they work. Examining optimal application in various settings and their respective strengths and weaknesses, it considers ease of use, false positives and negatives, and privacy and security issues. It also covers emerging applications such as biocryptography. Although the text can be understood by just about anybody, it is an ideal resource for corporate-level executives who are considering implementing biometric technologies in their organizations.

Private Security In The 21St Century: Concepts And Applications (Paperback): Dr Edward J Maggio Private Security In The 21St Century: Concepts And Applications (Paperback)
Dr Edward J Maggio
R3,151 Discovery Miles 31 510 Ships in 10 - 15 working days

Private Security In The 21St Century: Concepts And Applications Informs The Learner About The Historical Development Of Private Security And Provides New Information For Educating And Training Private Security Personnel In The Beginning Stages Of Their Career, Whether They Are A Full Time Student Or Entry Level Security Worker On The Job. This Text Will Not Only Provide The Background Information That A Prospective Security Person Should Know, But Also Describes The Basic Operational Procedures Students Need To Understand. Private Security In The United States: Concepts And Applications Examines Current Practices In Private Security And Technology.

Australian Security After 9/11 - New and Old Agendas (Hardcover, New Ed): Peter Shearman Australian Security After 9/11 - New and Old Agendas (Hardcover, New Ed)
Peter Shearman; Derek Mcdougall
R4,471 Discovery Miles 44 710 Ships in 12 - 19 working days

Debates on security became more intense following the unanticipated end of the Cold War conflict and took on added force after the terrorist attacks on the US on September 11, 2001. Generally viewed as a part of the wider 'West' despite its separation by enormous geographical distances from both Europe and the United States, Australia is a regional power in its own right. It has been an active and loyal member of the US-led coalitions of the willing, first in Afghanistan and then in Iraq. The terrorist attacks in Bali one year after the attacks in the United States brought home to Australia the direct nature of the new global terrorist threats to its own security. This volume brings together leading experts on international security and Australia's foreign and security policies in a critical examination of Australia's adaptations to the new security challenges. It is the first in-depth and comprehensive analysis of Australia's defence and security policies as well as the country's role in countering regional and global challenges to international security since the war on terrorism began.

Best Of Times, The Worst Of Times, The: Maritime Security In The Asia-pacific (Hardcover): Joshua Ho, Catherine Zara Raymond Best Of Times, The Worst Of Times, The: Maritime Security In The Asia-pacific (Hardcover)
Joshua Ho, Catherine Zara Raymond
R4,706 Discovery Miles 47 060 Ships in 12 - 19 working days

This authoritative book brings together in a single volume international experts renowned in their specializations to discuss issues and current trends relating to maritime security.It looks at the issue of maritime security in the Asia-Pacific through a three step approach. Firstly, it surveys both the global maritime outlook and the outlook in each of the regions of Northeast Asia, Southeast Asia, and South Asia. From these regional perspectives, trends in commercial shipping and force modernization, and issues like the weapons proliferation and maritime terrorism are discussed.After looking at the maritime environment, the specific challenges that the maritime community faces are examined. These challenges include maritime boundary and territorial disputes in the South China Sea, the force modernization of three Northeast Asian navies, and the spectre of maritime terrorism. The volume concludes by looking at some new initiatives for maritime cooperation, a survey of maritime "regime" building, and the legal and political implications of the proliferation security initiative.

International Relations Theory and the Consequences of Unipolarity (Hardcover): G.John Ikenberry, Michael Mastanduno, William... International Relations Theory and the Consequences of Unipolarity (Hardcover)
G.John Ikenberry, Michael Mastanduno, William C. Wohlforth
R2,667 Discovery Miles 26 670 Ships in 12 - 19 working days

The end of the Cold War and subsequent dissolution of the Soviet Union resulted in a new unipolar international system that presented fresh challenges to international relations theory. Since the Enlightenment, scholars have speculated that patterns of cooperation and conflict might be systematically related to the manner in which power is distributed among states. Most of what we know about this relationship, however, is based on European experiences between the seventeenth and twentieth centuries, when five or more powerful states dominated international relations, and the latter twentieth century, when two superpowers did so. Building on a highly successful special issue of the leading journal World Politics, this book seeks to determine whether what we think we know about power and patterns of state behaviour applies to the current 'unipolar' setting and, if not, how core theoretical propositions about interstate interactions need to be revised.

Bioterrorism - Field Guide to Disease Identification and Initial Patient Management (Paperback, New): Dag K.J.E. von Lubitz Bioterrorism - Field Guide to Disease Identification and Initial Patient Management (Paperback, New)
Dag K.J.E. von Lubitz
R2,966 Discovery Miles 29 660 Ships in 12 - 19 working days

The outbreak of anthrax infections that followed September 11, 2001, showed all too clearly that while we can defend ourselves against bioterrorism, our defenses need improvement. What's most important is the ability to recognize the associated disease, and recognize them quickly. Yet, many in the medical world are unfamiliar with the characteristic signs and symptoms of bioterrorism agents and are unable to differentiate between diseases whose symptoms appear almost identical. While a plethora of information on such diseases is available, finding it is time consuming.

Bioterrorism: Field Guide to Disease Identification and Initial Patient Management is an accessible resource that helps first-responders to quickly recognize the signs and symptoms caused by exposure to bioterrorism agents. It provides enough information to initiate treatment while a definitive diagnosis is being determined and presents measures for preventing contamination of those involved in the victims' medical management.

A special quick-reference foldout chart features a matrix linking 180 symptoms to 17 diseases and 90 differential diagnosis. In bulleted format, the book includes for each pathogenic agent:

" A brief description
" Signs and symptoms
" Diagnostic features
" Lab tests and expected results
" Treatment (specific drug regimens)
" Prophylaxis (specific drug regimens)
" Precautionary measures

This book is a potentially life-saving resource that can be thrown into a medical bag and kept there, hopefully forever unused. But if needed, it is a resource that can quickly provide information that will prevent secondary infections, improve site safety, and buy life-saving time for victims.

Radiation Injury Prevention and Mitigation in Humans (Hardcover): Kedar Prasad Radiation Injury Prevention and Mitigation in Humans (Hardcover)
Kedar Prasad
R4,478 Discovery Miles 44 780 Ships in 12 - 19 working days

With an estimated 3.3 billion ionizing radiation imaging examinations performed worldwide each year, the growing use of x-ray-based diagnostic procedures raises concerns about long-term health risks, especially cancer. In addition, rapid growth in the number of nuclear power plants around the world increases the risk of a nuclear accident similar to that of Fukushima, Japan. Add to this, exposure to non-ionizing radiation from prolonged cell phone use, proton radiation from solar flares, and potential nuclear conflict or a dirty bomb attack, and the need to expand our repertoire of radiation prevention and mitigation strategies becomes increasingly urgent. Radiation Injury Prevention and Mitigation in Humans identifies and examines physical protection strategies as well as non-toxic, cost-effective biological protection strategies. This includes agents that-when administered orally before and/or after irradiation exposures-could be effective in preventing and mitigating acute radiation damage. The book discusses implementing physical and biological protection strategies particularly for first responders, radiation workers, astronauts, and civilians who might be exposed to higher doses of radiation in the course of their activities. The book describes: Physics of ionizing radiation and radiological weapons, principles of nuclear reactors, the types of radiological weapons, and consequences of their explosions Acute and late health effects of high and low doses of radiation The efficacy of FDA-approved and unapproved radioprotective and radiation mitigating agents The efficacy of radioprotective and radiation mitigating agents not requiring FDA approval (antioxidants and herbs) Scientific data and rationale in support of using micronutrient preparations containing dietary and endogenous antioxidants for preventing acute radiation sickness and for mitigating the late adverse health effects among survivors of high and low doses of radiation Examining cutting-edge advances in the research of the effects of non-ionizing radiation on cellular and genetic levels, the book proposes an implementation plan of both physical and biological protection strategies. It covers the full range of potential sources of radiation and includes an up-to-date list of helpful resources and references for the latest research and readings on the topic.

Hospital and Healthcare Security (Paperback, 5th Revised edition): Russell L. Colling, Tony W. York Hospital and Healthcare Security (Paperback, 5th Revised edition)
Russell L. Colling, Tony W. York
R2,145 Discovery Miles 21 450 Out of stock

Hospital and Healthcare Security, Fifth Edition, examines the issues inherent to healthcare and hospital security, including licensing, regulatory requirements, litigation, and accreditation standards. Building on the solid foundation laid down in the first four editions, the book looks at the changes that have occurred in healthcare security since the last edition was published in 2001. It consists of 25 chapters and presents examples from Canada, the UK, and the United States. It first provides an overview of the healthcare environment, including categories of healthcare, types of hospitals, the nonhospital side of healthcare, and the different stakeholders. It then describes basic healthcare security risks/vulnerabilities and offers tips on security management planning. The book also discusses security department organization and staffing, management and supervision of the security force, training of security personnel, security force deployment and patrol activities, employee involvement and awareness of security issues, implementation of physical security safeguards, parking control and security, and emergency preparedness. Healthcare security practitioners and hospital administrators will find this book invaluable. FEATURES AND BENEFITS: * Practical support for healthcare security professionals, including operationally proven policies, and procedures * Specific assistance in preparing plans and materials tailored to healthcare security programs * Summary tables and sample forms bring together key data, facilitating ROI discussions with administrators and other departments * General principles clearly laid out so readers can apply the industry standards most appropriate to their own environment NEW TO THIS EDITION: * Quick-start section for hospital administrators who need an overview of security issues and best practices

Cyber Forensics - A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition... Cyber Forensics - A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition (Electronic book text, 2nd Revised edition)
Albert Marcella, Jr., Doug Menendez
R1,937 Discovery Miles 19 370 Out of stock

Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of a cyber forensic investigation. The authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition delineates the scope and goals of cyber forensics to reveal and track legal and illegal activity. Beginning with an introduction and definition of cyber forensics, chapters explain the rules of evidence and chain of custody in maintaining legally valid electronic evidence. They describe how to begin an investigation and employ investigative methodology, as well as establish standard operating procedures for the field and cyber forensic laboratory. The authors provide an in depth examination of the manipulation of technology to conceal illegal activities and the use of cyber forensics to uncover them. They discuss topics and issues such as conducting a cyber forensic investigation within both the local and federal legal framework, and evaluating the current data security and integrity exposure of multifunctional devices. Cyber Forensics includes details and tips on taking control of a suspect computer or PDA and its "operating" environment, mitigating potential exposures and risks to chain of custody, and establishing and following a flowchart for the seizure of electronic evidence. An extensive list of appendices include websites, organizations, pertinent legislation, further readings, best practice recommendations, more information on hardware and software, and a recap of the federal rules of civil procedure.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Newnes Digital Logic IC Pocket Book…
R.M. Marston Hardcover R1,097 Discovery Miles 10 970
Microwave Active Circuit Analysis and…
Clive Poole, Izzat Darwazeh Hardcover R2,104 R1,817 Discovery Miles 18 170
Hockly's Law Of Insolvency - Winding-up…
Alastair Smith, Kathleen van der Linde, … Paperback R952 R842 Discovery Miles 8 420
Personnel Psychology - An Applied…
M. Coetzee, D. Schreuder Paperback R598 Discovery Miles 5 980
CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
Crash And Burn - A CEO's Crazy…
Glenn Orsmond Paperback R320 R286 Discovery Miles 2 860
Automated Calibration of Modulated…
Dan McMahill Hardcover R2,868 Discovery Miles 28 680
Vusi - Business & Life Lessons From a…
Vusi Thembekwayo Paperback  (3)
R325 R305 Discovery Miles 3 050
Power System Loads and Power System…
Yue Zhu Hardcover R3,612 Discovery Miles 36 120
Operations Management - Global…
Nigel Slack, Alistair Brandon-Jones, … Paperback  (4)
R1,144 Discovery Miles 11 440

 

Partners