![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Academic & Education > Professional & Technical > Security
Since 9/11, business and industry has paid close attention to
security within their own organizations. In fact, at no other time
in modern history has business and industry been more concerned
with security issues. A new concern for security measures to combat
potential terrorism, sabotage, theft and disruption -- which could
bring any business to it's knees --has swept the nation. This has
opened up a huge opportunity for private investigators and security
professionals as consultants. Many retiring law enforcement and
security management professionals look to enter the private
security consulting market. Security consulting often involves
conducting in-depth security surveys so businesses will know
exactly where security holes are present and where they need
improvement to limit their exposure to various threats. The fourth
edition of "Security Consulting" introduces security and law
enforcement professionals to the career and business of security
consulting. It provides new and potential consultants with the
practical guidelines needed to start up and maintain a successful
independent practice. Updated and expanded information is included
on marketing, fees and expenses, forensic consulting, the use of
computers, and the need for professional growth.Useful sample forms
have been updated in addition tonew promotion opportunities and
keys to conducting research on the Web. - The only book of its kind dedicated to beginning a security consulting practice from the ground-up - Proven, practical methods to establish and run a security consulting business - Newchapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet - The most up-to-date best practices from the IAPSC"
Hiring highly qualified people is crucial to every company, and
Background Screening and Investigations is an essential guide to
succeeding in a turbulent business environment. A crucial part of
any hiring process should be employment background screening, pre-
and post-hire, which gives hiring personnel a glimpse into a
person's past behavior patterns, propensities, and likely future
behavior.
"Retail Crime, Security, and Loss Prevention" is destined to become
the "go to" source of crime- and loss prevention- related
information in the retail industry. Written and edited by two
nationally recognized retail security experts and enhanced with 63
contributions by others who contribute expertise in specialized
areas, this book provides over 150 definitions of loss prevention
terms, and discusses topics ranging from accident investigations,
counterfeit currency, emergency planning, and workplace violence to
vendor frauds. No other single work contains such a wealth of
retail security information.
" High-Security Mechanical Locks " comprehensively surveys and
explains the highly technical area of high security locks in a way
that is accessible to a wide audience. Well over 100 different
locks are presented, organized into 6 basic types. Each chapter
introduces the necessary concepts in a historical perspective and
further categorizes the locks. This is followed by detailed 'how it
works' descriptions with many pictures, diagrams and references.
The descriptions are based on actual dissections of the real locks.
The effects of digital technology on the security industry require
constant vigilance by security distributors, sales staff, and
installation professionals. Today and for the foreseeable future,
all security professionals must have at least a basic understanding
of digital technology. "Digital CCTV" addresses this new challenge.
" Biometric Technologies and Verification Systems" is organized
into nine parts composed of 30 chapters, including an extensive
glossary of biometric terms and acronyms. It discusses the current
state-of-the-art in biometric verification/authentication,
identification and system design principles. It also provides a
step-by-step discussion of how biometrics works; how biometric data
in human beings can be collected and analyzed in a number of ways;
how biometrics are currently being used as a method of personal
identification in which people are recognized by their own unique
corporal or behavioral characteristics; and how to create detailed
menus for designing a biometric verification system.
A practical reference written to assist the security professional
in clearly identifying what systems are required to meet security
needs as defined by a threat analysis and vulnerability assessment.
All of the elements necessary to conduct a detailed survey of a
facility and the methods used to document the findings of that
survey are covered. Once the required systems are determined, the
chapters following present how to assemble and evaluate bids for
the acquisition of the required systems in a manner that will meet
the most rigorous standards established for competitive bidding.
The book also provides recommended approaches for system/user
implementation, giving checklists and examples for developing
management controls using the installed systems. This book was
developed after a careful examination of the approved reference
material available from the American Society for Industrial
Security (ASIS International) for the certification of Physical
Security Professionals (PSP). It is intended to fill voids left by
the currently approved reference material to perform implementation
of systems suggested in the existing reference texts. This book is
an excellent "How To" for the aspiring security professional who
wishes to take on the responsibilities of security system
implementation, or the security manager who wants to do a
professional job of system acquisition without hiring a
professional consultant.
The information systems security (InfoSec) profession remains one
of the fastest growing professions in the world today. With the
advent of the Internet and its use as a method of conducting
business, even more emphasis is being placed on InfoSec. However,
there is an expanded field of threats that must be addressed by
today's InfoSec and information assurance (IA) professionals.
Trojans, Worms, and Spyware provides practical, easy to understand,
and readily usable advice to help organizations to improve their
security and reduce the possible risks of malicious code attacks.
Despite the global downturn, information systems security remains
one of the more in-demand professions in the world today. With the
widespread use of the Internet as a business tool, more emphasis is
being placed on information security than ever before. To
successfully deal with this increase in dependence and the ever
growing threat of virus and worm attacks, Information security and
information assurance (IA) professionals need a jargon-free book
that addresses the practical aspects of meeting new security
requirements.
Investigative Data Mining for Security and Criminal Detection is
the first book to outline how data mining technologies can be used
to combat crime in the 21st century. It introduces security
managers, law enforcement investigators, counter-intelligence
agents, fraud specialists, and information security analysts to the
latest data mining techniques and shows how they can be used as
investigative tools. Readers will learn how to search public and
private databases and networks to flag potential security threats
and root out criminal activities even before they occur. Key Features:
Kovacich and Halibozek offer you the benefit of more than 55 years
of combined experience in government and corporate security.
Throughout the book, the authors use a fictional global corporation
as a model to provide continual real-world challenges and
solutions. New and experienced managers alike will find a wealth of
information and practical advice to help you develop strategic and
tactical plans and manage your daily operations.
CCTV for Security Professionals provides the information necessary
to design the ideal CCTV system. The chapters are stand-alone
sources of information on their subjects and are presented in
logical sequence to guide the reader from basic principles to more
complex for a complete system understanding.
This textbook provides students and law enforcement officers with
the fundamentals of the criminal investigation process, from
arrival on the scene to trial procedures. Written in a clear and
simple style, Criminal Investigation: Law and Practice surpasses
traditional texts by presenting a unique combination of legal,
technical, and procedural aspects of the criminal investigation.
The hands-on approach taken by the author helps to increase the
learning experience.
Physical Security 150 Things You Should Know is a comprehensive reference for the security professional. This book covers all aspects of security operations, from lighting and fencing to tracking systems and crime risk management. The "150 Things" offered by Tyska and Fennelly will help professionals in the field build a well-trained, alert, and conscientious security staff.
In the very competitive security alarm business, companies are
finding themselves more and more burdened with the responsibility
of preparing corporate mission statements, paradigm analyses, and
corporate reengineering plans. Surviving in the Security Alarm
Business will help explain their importance, how to perform them,
and what the expected result will be.
This book addresses public safety and security from a holistic and
visionary perspective. For the first time, safety and security
organizations, as well as their administration, are brought
together into an integrated work.
Model Security Policies, Plans, and Procedures contains sample
security policy, planning, and procedural documents drawn from the
proven experiences of hundreds of America's most successful
corporations. If your job requires you to develop or update
security policies, plans, or procedures, this book will be a highly
valuable resource. The samples cover the key concepts of
organizational protection. Putting the samples to use, either as
presented or as drafting guides, can eliminate many hours of
tedious research and writing.
This book describes the risk management methodology as a specific
process, a theory, or a procedure for determining your assets,
vulnerabilities, and threats and how security professionals can
protect them. Risk management is essentially a process methodology that will
provide a cost-benefit payback factor to senior management.
This is a no-nonsense, practical book for helping organizations rid
their workplaces of drug abuse and its serious and costly
consequences. The book draws upon the collective experiences of
hundreds of organizations that have said "no more, not here" and
have grown stronger as a result. The path to a drug-free working
environment is straight but narrow. The Drug-Free Workplace:
Private Security Law: Case Studies is uniquely designed for the
special needs of private security practitioners, students, and
instructors. Part One of the book encompasses negligence,
intentional torts, agency contracts, alarms, and damages. Part Two
covers authority of the private citizen, deprivation of rights, and
entrapment.
This is a truly unique collection of 39 articles written by
authorities or based on authoritative research. It goes beyond
locks, lighting, and alarms to offer provocative viewpoints on a
variety of security topics. The book looks beyond everyday applications and routines to an
understanding of the social significance of careers in security. It
will be of interest to practitioners in all sectors as well as
students at all levels.
"Effective Physical Security, " Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors work that set the standard: "Handbook of Loss Prevention and Crime Prevention, " Fifth Edition. Designed for easy reference, "Effective Physical Security"
contains important coverage of environmental design, security
surveys, locks, lighting, and CCTV as well as new chapters covering
the latest in the ISO standards for Risk Assessmentand Risk
Management, physical security planning, network systems
infrastructure, and environmental design. This new edition
continues to serve as a valuable reference for experienced security
practitioners as well as students in undergraduate and graduate
security programs.
This textbook offers a technical, architectural, and management
approach to solving the problems of protecting national
infrastructure and includes practical and empirically-based
guidance for students wishing to become security engineers, network
operators, software designers, technology managers, application
developers, Chief Security Officers, etc.. This approach includes
controversial themes such as the deliberate use of deception to
trap intruders. In short, it serves as an attractive framework for
a new national strategy for cyber security. Each principle is
presented as a separate security strategy, along with pages of
compelling examples that demonstrate use of the principle. A
specific set of criteria requirements allows students to understand
how any organization, such as a government agency, integrates the
principles into their local environment. The STUDENT EDITION
features several case studies illustrating actual implementation
scenarios of the principals and requirements discussed in the text.
It also includes helpful pedagogical elements such as chapter
outlines, chapter summaries, learning checklists, and a 2-color
interior. And it boasts a new and complete instructor ancillary
package including test bank, IM, Ppt slides, case study questions,
and more. Provides case studies focusing on cyber security challenges and solutions to display how theory, research, and methods, apply to real-life challenges Utilizes, end-of-chapter case problems that take chapter content and relate it to real security situations and issues Includes instructor slides for each chapter as well as an instructor s manual with sample syllabi and test bank"
"Private Security and the Law, 4th Edition," is a unique
resource that provides analysis of practices in the security
industry as they relate to law, regulation, licensure, and
constitutional questions of case and statutory authority.This
bookdescribes the legal requirements facedin the area of private
security.It emphasizes the liability problems common to security
operations, including negligence and tortious liability, civil
actions frequently litigated, and strategies to avoid legal actions
that affect business efficiency.The textalso examines the
constitutional and due-process dimensions of private security both
domestically and internationally, including recent cases and trends
that will set pace for future private security laws and
regulations. As private security becomes more closely involved in
national and international security, cases like Blackwater are
examined. Charles Nemeth takesyou step by step through the analysis
of case law as it applies to situations commonly faced in the
private security practice, providing a solid introduction to the
legal and ethical standards that shape the industry. *Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"
With half of all new businesses failing in the first two years,
every aspect of good business planning must be considered, but loss
prevention is very often overlooked. Most small business owners
grapple with the day to day challenges of sales and marketing,
never realizing that the shadow of shrinkage is expanding daily,
waiting to reveal itself in the annual inventory results. Ravaged
by theft and paperwork losses, the already tight profit margin can
shrink into oblivion. Loss Prevention and the Small Business opens
the eyes of the reader to the reality of shrinkage in all its
guises including shoplifting, fraud, and embezzlement. Armed with
this awareness, the security specialist or owner/manager can
utilize the many strategies to both inhibit losses and aggressively
pursue those persons and processes that cause losses.
|
You may like...
Modeling and Simulation of Invasive…
Sascha Roloff, Frank Hannig, …
Hardcover
R2,653
Discovery Miles 26 530
Cambridge IGCSE and O Level Computer…
David Watson, Helen Williams
Paperback
R430
Discovery Miles 4 300
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, …
Paperback
R2,281
Discovery Miles 22 810
Architectural Design - Conception and…
Chris A. Vissers, Luis Ferreira Pires, …
Hardcover
Progress in Computing: Key Stage 3
George Rouse, Lorne Pearcey, …
Paperback
R983
Discovery Miles 9 830
Service Orchestration as Organization…
Malinda Kapuruge, Jun Han, …
Paperback
R1,309
Discovery Miles 13 090
High-Performance Computing on the Intel…
Endong Wang, Qing Zhang, …
Hardcover
|