0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (38)
  • R500+ (359)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Cognitive Risk (Paperback): James Bone, Jessie H Lee Cognitive Risk (Paperback)
James Bone, Jessie H Lee
R1,110 Discovery Miles 11 100 Ships in 9 - 17 working days

Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback)
Alan Tang
R1,389 Discovery Miles 13 890 Ships in 9 - 17 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Theorizing Surveillance (Paperback): David Lyon Theorizing Surveillance (Paperback)
David Lyon
R1,402 Discovery Miles 14 020 Ships in 10 - 15 working days

This book is about explaining surveillance processes and practices in contemporary society. Surveillance studies is a relatively new multi-disciplinary enterprise that aims to understand who watches who, how the watched participate in and sometimes question their surveillance, why surveillance occurs, and with what effects. This book brings together some of the world's leading surveillance scholars to discuss the "why" question. The field has been dominated, since the groundbreaking work of Michel Foucault, by the idea of the panopticon and this book explores why this metaphor has been central to discussions of surveillance, what is fruitful in the panoptic approach, and what other possible approaches can throw better light on the phenomena in question. Since the advent of networked computer databases, and especially since 9/11, questions of surveillance have come increasingly to the forefront of democratic, political, and policy debates in the global north (and to an extent in the glo

Global Surveillance and Policing - Borders, security, identity (Paperback, Illustrated Ed): Elia Zureik, Mark Salter Global Surveillance and Policing - Borders, security, identity (Paperback, Illustrated Ed)
Elia Zureik, Mark Salter
R1,297 Discovery Miles 12 970 Ships in 10 - 15 working days

Since the 9.11 attacks in North America and the accession of the Schengen Accord in Europe there has been widespread concern with international borders, the passage of people and the flow of information across borders. States have fundamentally changed the ways in which they police and monitor this mobile population and its personal data. This book brings together leading authorities in the field who have been working on the common problem of policing and surveillance at physical and virtual borders at a time of increased perceived threat. It is concerned with both theoretical and empirical aspects of the ways in which the modern state attempts to control its borders and mobile population. It will be essential reading for students, practitioners, policy makers.

Nonproliferation Issues For Weapons of Mass Destruction (Hardcover): Mark A. Prelas, Michael Peck Nonproliferation Issues For Weapons of Mass Destruction (Hardcover)
Mark A. Prelas, Michael Peck
R5,623 Discovery Miles 56 230 Ships in 10 - 15 working days

Nonproliferation Issues for Weapons of Mass Destruction provides an understanding of WMD proliferation risks by bridging complex technical and political issues. The text begins by defining the world conditions that foster proliferation, followed by an analysis of characteristics of various classes of WMDs, including nuclear, biological, and chemical weapons. It then explores the effectiveness of arms control, discussing current nonproliferation problems, nonproliferation prior to the fall of the USSR, and weapons safeguards.
The book analyzes the future of these weapons, discussing delivery systems and potential use by states, terrorist groups, and individuals. The text concludes with a discussion of what can be done to limit the impact of WMDs. This volume enables a realistic understanding of the relative risks that WMDs present to our way of life.

Managing A Network Vulnerability Assessment (Paperback, illustrated edition): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Paperback, illustrated edition)
Thomas R. Peltier, Justin Peltier, John A Blackley
R2,607 Discovery Miles 26 070 Ships in 10 - 15 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.

Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Auditing Corporate Surveillance Systems - Research Methods for Greater Transparency (Hardcover, New Ed): Isabel Wagner Auditing Corporate Surveillance Systems - Research Methods for Greater Transparency (Hardcover, New Ed)
Isabel Wagner
R2,064 R1,749 Discovery Miles 17 490 Save R315 (15%) Ships in 10 - 15 working days

News headlines about privacy invasions, discrimination, and biases discovered in the platforms of big technology companies are commonplace today, and big tech's reluctance to disclose how they operate counteracts ideals of transparency, openness, and accountability. This book is for computer science students and researchers who want to study big tech's corporate surveillance from an experimental, empirical, or quantitative point of view and thereby contribute to holding big tech accountable. As a comprehensive technical resource, it guides readers through the corporate surveillance landscape and describes in detail how corporate surveillance works, how it can be studied experimentally, and what existing studies have found. It provides a thorough foundation in the necessary research methods and tools, and introduces the current research landscape along with a wide range of open issues and challenges. The book also explains how to consider ethical issues and how to turn research results into real-world change.

Paranormal Investigation Log - 100 Pages 6 X 9 (Hardcover): Rwg Paranormal Investigation Log - 100 Pages 6 X 9 (Hardcover)
Rwg
R471 Discovery Miles 4 710 Ships in 18 - 22 working days
PKI Implementation and Infrastructures (Paperback): Julian Ashbourn PKI Implementation and Infrastructures (Paperback)
Julian Ashbourn
R1,154 Discovery Miles 11 540 Ships in 9 - 17 working days

1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.

Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Hardcover): Kevin E. Foltz,... Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Hardcover)
Kevin E. Foltz, William R. Simpson, Institute for Defense Analyses
R2,422 Discovery Miles 24 220 Ships in 9 - 17 working days

Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.

Transforming Security - A New Balance-of-Power Doctrine (Hardcover, 1st ed. 2022): Ursula Werther-Pietsch Transforming Security - A New Balance-of-Power Doctrine (Hardcover, 1st ed. 2022)
Ursula Werther-Pietsch
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

This book analyses the collective security system as it now stands, focusing on strategic and normative frameworks. The old system of international collective security is based on assumptions that are inadequate in relation to current challenges. Against the backdrop of changed geopolitical constellations, democracies under siege and the challenges posed by new types of warfare, critical analysts hold that not a single multilateral institution today is fully up to the task it was created for. The UN, from its founding to the Sustained Peace Approach, represents a fascinating global process of vision-building and adaptation to reality. Based on this understanding, the dynamics of the UN peace and security architecture are examined along with major agendas, from peacebuilding to development. In turn, reform proposals in the post-COVID-19 era are discussed. The book examines whether a regionalization of security structures within the UN framework may offer a way out of global fragility and growing instability factors, a question of utmost importance for conflict prevention and crisis management in the next few decades. In turn, the author discusses a normative positioning of a new intervention logic as the lowest common denominator between collaborative regional orders. Reinvented multilateralism will return as a "must." Given its scope, the book will appeal to students and scholars of international relations and international security studies, as well as to policymakers in governments and international organizations.

Supply Chain Security - How to Support Safety and Reduce Risk In Your Supply Chain Process (Paperback): Andrzej Szymonik,... Supply Chain Security - How to Support Safety and Reduce Risk In Your Supply Chain Process (Paperback)
Andrzej Szymonik, Robert Stanislawski
R1,481 Discovery Miles 14 810 Ships in 9 - 17 working days

Contemporary supply chains operate under the pressure of customer requirements, increasing price competition, sudden increases or decreases in demand, unforeseen obstacles and new threats. The right way to improve the functioning of the flow of material and accompanying information is not only the continuous collection of data but also their collection, analysis, inference and decision-making with the use of decision support systems, expert systems and artificial intelligence. Such procedures make it easier for logisticians not only to forecast processes but also to predict (forecast) and identify potential problems and facilitate the implementation of optimal modern solutions, paying attention to current trends in the supply chain market. An important issue that affects the quality, efficiency and availability (continuity) of the processes implemented within the supply chain is security. This is an area that is not clearly defined. This book uses theoretical and practical knowledge to define security in the supply chain as a state that gives a sense of certainty and guarantees the flow of material goods and services (in accordance with the 7w rule) as well as a smooth flow of information for the planning and management of logistics processes. Tools and instruments used to ensure the security of the supply chain contribute to the protection and survival in times of dangerous situations (threats) and adaptation to new conditions (susceptibility to unplanned situations). When analyzing the needs and structure of the 21st century supply chains, in the context of their security, it is impossible to ignore the problem of their digitization, which enables the determination of optimal routes and the anticipation of possible threats (crisis situations). Automatic data exchange between various departments of the company along the upper and lower part of the supply chain improves the functioning of the warehouse management through, among others, automation, robotization and pro-activity. It also contributes to efficient, good communication and market globalization. Automation also brings new, extremely attractive business models with regard to occupational safety, ergonomics and environmental protection. To meet the needs of creating modern supply chains, the book analyzes and presents current and future solutions that affect security and the continuity of supply chains.

Global Intelligence Oversight - Governing Security in the Twenty-First Century (Hardcover): Zachary K. Goldman, Samuel J.... Global Intelligence Oversight - Governing Security in the Twenty-First Century (Hardcover)
Zachary K. Goldman, Samuel J. Rascoff; Jane Harman
R2,309 Discovery Miles 23 090 Ships in 10 - 15 working days

In a world that is increasingly unstable, intelligence services like the American CIA and the United Kingdom's MI6 exist to deliver security. Whether the challenge involves terrorism, cyber-security, or the renewed specter of great power conflict, intelligence agencies mitigate threats and provide decisional advantage to national leaders. But empowered intelligence services require adequate supervision and oversight, which must be about more than the narrow (if still precarious) task of ensuring the legality of covert operations and surveillance activities. Global Intelligence Oversight is a comparative investigation of how democratic countries can govern their intelligence services so that they are effective, but operate within frameworks that are acceptable to their people in an interconnected world. The book demonstrates how the institutions that oversee intelligence agencies participate in the protection of national security while safeguarding civil liberties, balancing among competing national interests, and building public trust in inherently secret activities. It does so by analyzing the role of courts and independent oversight bodies as they operate in countries with robust constitutional frameworks and powerful intelligence services. The book also illuminates a new transnational oversight dynamic that is shaping and constraining security services in new ways. It describes how global technology companies and litigation in transnational forums constitute a new form of oversight whose contours are still undefined. As rapid changes in technology bring the world closer together, these forces will complement their more traditional counterparts in ensuring that intelligence activities remain effective, legitimate, and sustainable.

The California Consumer Privacy Act (CCPA) - An implementation guide (Paperback): Preston Bukaty The California Consumer Privacy Act (CCPA) - An implementation guide (Paperback)
Preston Bukaty
R780 Discovery Miles 7 800 Ships in 18 - 22 working days

Understand the CCPA (California Consumer Privacy Act) and how to implement strategies to comply with this privacy regulation. Established in June 2018, the CCPA was created to remedy the lack of comprehensive privacy regulation in the state of California. When it comes into effect on January 1, 2020, the CCPA will give California residents the right to: Learn what personal data a business has collected about them Understand who this data has been disclosed to Find out whether their personal data has been sold to third parties, and who these third parties are Opt-out of such data transactions, or request that the data be deleted. Many organizations that do business in the state of California must align to the provisions of the CCPA. Much like the EU's GDPR (General Data Protection Regulation), businesses that fail to comply with the CCPA will face economic penalties. Prepare your business for CCPA compliance with our implementation guide that: Provides the reader with a comprehensive understanding of the legislation by explaining key terms Explains how a business can implement strategies to comply with the CCPA Discusses potential developments of the CCPA to further aid compliance Your guide to understanding the CCPA and how you can implement a strategy to comply with this legislation - buy this book today to get the guidance you need! About the author Preston Bukaty is an attorney and consultant. He specializes in data privacy GRC projects, from data inventory audits to gap analyses, contract management, and remediation planning. His compliance background and experience operationalizing compliance in a variety of industries give him a strong understanding of the legal issues presented by international regulatory frameworks. Having conducted more than 3,000 data mapping audits, he also understands the practical realities of project management in operationalizing compliance initiatives. Preston's legal experience and enthusiasm for technology make him uniquely suited to understanding the business impact of privacy regulations such as the GDPR and the CCPA. He has advised more than 250 organizations engaged in businesses as varied as SaaS platforms, mobile geolocation applications, GNSS/telematics tools, financial institutions, fleet management software, architectural/engineering design systems, and web hosting. He also teaches certification courses on GDPR compliance and ISO 27001 implementation, and writes on data privacy law topics. Preston lives in Denver, Colorado. Prior to working as a data privacy consultant, he worked for an international GPS software company, advising business areas on compliance issues across 140 countries. Preston holds a juris doctorate from the University of Kansas School of Law, along with a basketball signed by Hall of Fame coach Bill Self.

The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition): Anthony V. DiSalvatore (CPP, PSP & PCI) The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition)
Anthony V. DiSalvatore (CPP, PSP & PCI)
R1,160 Discovery Miles 11 600 Ships in 9 - 17 working days

Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.

The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover): Jeffrey W.... The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover)
Jeffrey W. Brown
R2,054 Discovery Miles 20 540 Ships in 9 - 17 working days

This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a "communication theory" book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

OR, Defence and Security (Hardcover): R. Forder OR, Defence and Security (Hardcover)
R. Forder
R3,342 Discovery Miles 33 420 Ships in 10 - 15 working days

OR, Defence and Security presents eleven papers, originally published in the Journal of the Operational Research Society and the Journal of Simulation, which exemplify important themes and topics in Operational Research (OR), as applied to modern-day defense and security issues. Topics range from frontline OR in a peace-support operation to new developments in combat modelling, and from the logistics of overseas intervention to defence planning at the top level. Also included are examples of applications addressing insurgency and terrorism. Edited by Dr Roger A. Forder, who had a distinguished career in OR in the UK Ministry of Defence, he has also written an authoritative introductory chapter which sets the papers in the context of the global strategic environment as it has evolved since the end of the Cold War. The OR Essentials series presents a unique cross-section of high quality research work fundamental to understanding contemporary issues and research in across a range of Operational Research (OR) topics. It brings together some of the best research papers from the esteemed Operational Research Society and its associated journals, also published by Palgrave Macmillan.

Air Piracy, Airport Security, and International Terrorism - Winning the War Against Hijackers (Hardcover): Oliver P. St John Air Piracy, Airport Security, and International Terrorism - Winning the War Against Hijackers (Hardcover)
Oliver P. St John
R2,541 Discovery Miles 25 410 Ships in 10 - 15 working days

As international terrorism has grown over the past decades, airlines and airports have become increasingly popular targets for violent attacks and hijackings. In this volume, Peter St. John provides a survey of international air piracy and airline terrorism, and of the ways airline professionals and governments are coping, or attempting to cope, with the crisis. St. John not only deals with the history, politics, psychology, and sociology of air piracy, but also provides an assessment of the threat to commercial aircraft and ways to counter the danger. The principal theme he develops is that security for airports and aircraft can be achieved, and the fear of terrorists overcome, if Western countries cooperate in installing effective security policies and plans. St. John begins his work with a two-chapter history of the evolution of hijacking, tracing the five-to-seven-year cycles that seem to have emerged and the growth of the politically motivated hijacking that has become the most persistent and dangerous form. He next analyzes the eight types of individuals who have hijacked aircraft in the past, their different motives, and how they can be identified by airport security and flight crews. A major chapter discusses the politics of Western governments toward highjacking in Europe and North America, and identifies the best and worst airports around the globe. A seven-stage system of security that will probably be a necessity for the 1990s is also proposed. Ensuing chapters address the problem of the hijacked plane, offering advice for passengers and crew members who are victims of hijacking, and for government behavior, which often does more to encourage air terrorism than to preventit. Finally, St. John looks to the future of airport security and describes the need for a concentrated attempt at all levels of national and international government to develop effective defenses against air piracy. A group of appendices is also included, documenting the principal hijacks of the past forty years as well as sabotage attempts on commercial aircraft. This work will be an important reference tool for professionals in security services and the airline and airport management field, and for students in political science and international relations courses. It will also be a valuable addition to college, university, and public libraries.

Terror, Security, and Money - Balancing the Risks, Benefits, and Costs of Homeland Security (Hardcover, New): John Mueller,... Terror, Security, and Money - Balancing the Risks, Benefits, and Costs of Homeland Security (Hardcover, New)
John Mueller, Mark Stewart
R3,296 Discovery Miles 32 960 Ships in 10 - 15 working days

In seeking to evaluate the efficacy of post-9/11 homeland security expenses--which have risen by more than a trillion dollars, not including war costs--the common query has been, "Are we safer?" This, however, is the wrong question. Of course we are "safer"--the posting of a single security guard at one building's entrance enhances safety. The correct question is, "Are any gains in security worth the funds expended?"
In this engaging, readable book, John Mueller and Mark Stewart apply risk and cost-benefit evaluation techniques to answer this very question. This analytical approach has been used throughout the world for decades by regulators, academics, and businesses--but, as a recent National Academy of Science study suggests, it has never been capably applied by the people administering homeland security funds. Given the limited risk terrorism presents, expenses meant to lower it have for the most part simply not been worth it. For example, to be considered cost-effective, increased American homeland security expenditures would have had each year to have foiled up to 1,667 attacks roughly like the one intended on Times Square in 2010--more than four a day. Cataloging the mistakes that the US has made--and continues to make--in managing homeland security programs, Terror, Security, andMoney has the potential to redirect our efforts toward a more productive and far more cost-effective course.

Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback): Andrew Jenkinson Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback)
Andrew Jenkinson
R954 Discovery Miles 9 540 Ships in 10 - 15 working days

- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.

The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Paperback): Shaun Aghili The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Paperback)
Shaun Aghili
R1,196 Discovery Miles 11 960 Ships in 10 - 15 working days

Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues

Technology Development for Security Practitioners (Hardcover, 1st ed. 2021): Babak Akhgar, Dimitrios Kavallieros, Evangelos... Technology Development for Security Practitioners (Hardcover, 1st ed. 2021)
Babak Akhgar, Dimitrios Kavallieros, Evangelos Sdongos
R2,730 Discovery Miles 27 300 Ships in 18 - 22 working days

This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com

Zero Trust Journey Across the Digital Estate (Paperback): Abbas Kudrati, Binil A. Pillai Zero Trust Journey Across the Digital Estate (Paperback)
Abbas Kudrati, Binil A. Pillai
R1,467 Discovery Miles 14 670 Ships in 10 - 15 working days

* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.

Sustainable Hospitality Management - Designing Meaningful Encounters with Talent and Technology (Hardcover): Huub Ruel,... Sustainable Hospitality Management - Designing Meaningful Encounters with Talent and Technology (Hardcover)
Huub Ruel, Angelique Lombarts
R3,225 Discovery Miles 32 250 Ships in 18 - 22 working days

Sustainable Hospitality Management: Designing Meaningful Encounters with Talent and Technology will generate international debate in the research and practice of hospitality management. It considers how the sector can and should innovate to respond to challenges such as talent scarcity, the growing ecological footprint, and technological developments. Volume 24 of Advanced Series in Management explores topics at the very heart of hospitality, by looking at meaningful encounters: positive, welcoming, genuinely service-oriented interactions between humans, and the role of technology in creating or improving these encounters. Human talent is essential to excellent service delivery and guest experience provision. It is also essential in the design and monitoring of technology-enabled guest or customer experience. Technology may be the service facilitator or it may be an experience enhancer. In today's globalizing platform economy, hospitality services are established most dominantly via technology-enabled platforms or networks. At the human interaction level, technology can deliver, support or intensify the hospitality experience. This volume is essential for researchers and students interested in the hospitality sector and the role of technology in creating a sustainable hospitality sector.

The Privatization of Policing - Two Views (Paperback): Brian Forst, Peter K Manning The Privatization of Policing - Two Views (Paperback)
Brian Forst, Peter K Manning
R633 Discovery Miles 6 330 Ships in 18 - 22 working days

The increasing reliance on private security services raises questions about the effects of privatization on the quality of public police forces, particularly in high-crime, low-income areas. In an effective pro-and-con format, two experts on policing offer two strikingly different perspectives on this trend towards privatization. In the process, they provide an unusually thoughtful discussion of the origins of both the public police and the private security sectors, the forces behind the recent growth of private security operations, and the risks to public safety posed by privatization.

In his critique of privatization, Peter K. Manning focuses on issues of free market theory and management practices such as Total Quality Management that he believes are harmful to the traditional police mandate to control crime. He questions the appropriateness of strategies that emphasize service to consumers. For Brian Forst, the free market paradigm and economic incentives do not carry the same stigma. He argues that neither public nor private policing should have a monopoly on law enforcement activities, and he predicts an even more varied mix of public and private police activities than are currently available.

Following the two main sections of the book, each author assesses the other's contribution, reflecting on not just their points of departure but also on the areas in which they agree. The breadth and depth of the discussion makes this book essential for both scholars and practitioners interested in policing generally and privatization in particular.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Systems Thinker - Analytical Skills…
Albert Rutherford Hardcover R667 Discovery Miles 6 670
The Complex WKB Method for Nonlinear…
Victor P. Maslov Hardcover R1,574 Discovery Miles 15 740
Operator Semigroups Meet Complex…
Wolfgang Arendt, Ralph Chill, … Hardcover R4,916 Discovery Miles 49 160
Annual Report of the Commissioner of…
Uni States Office of Indian Affairs Hardcover R920 Discovery Miles 9 200
The Calculus for Engineers and…
Robert H. (Robert Henry) Smith Hardcover R864 Discovery Miles 8 640
Quantization on Nilpotent Lie Groups
Michael Ruzhansky, Veronique Fischer Hardcover R1,836 Discovery Miles 18 360
A History of the Conceptions of Limits…
Florian 1859-1930 Cajori Hardcover R887 Discovery Miles 8 870
Management and Applications of Complex…
G. Rzevski, S. Syngellakis Hardcover R2,290 Discovery Miles 22 900
Symmetry: Representation Theory and Its…
Roger Howe, Markus Hunziker, … Hardcover R3,221 Discovery Miles 32 210
Introduction to the Theory of Fourier's…
Horatio Scott Carslaw Hardcover R888 Discovery Miles 8 880

 

Partners