0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (1)
  • R500+ (64)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Security

Security Consulting (Paperback, 4th edition): Charles A. Sennewald Security Consulting (Paperback, 4th edition)
Charles A. Sennewald
R1,172 Discovery Miles 11 720 Ships in 12 - 19 working days

Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, at no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption -- which could bring any business to it's knees --has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in-depth security surveys so businesses will know exactly where security holes are present and where they need improvement to limit their exposure to various threats. The fourth edition of "Security Consulting" introduces security and law enforcement professionals to the career and business of security consulting. It provides new and potential consultants with the practical guidelines needed to start up and maintain a successful independent practice. Updated and expanded information is included on marketing, fees and expenses, forensic consulting, the use of computers, and the need for professional growth.Useful sample forms have been updated in addition tonew promotion opportunities and keys to conducting research on the Web.

- The only book of its kind dedicated to beginning a security consulting practice from the ground-up

- Proven, practical methods to establish and run a security consulting business

- Newchapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet

- The most up-to-date best practices from the IAPSC"

Background Screening and Investigations - Managing Hiring Risk from the HR and Security Perspectives (Paperback): W. Barry... Background Screening and Investigations - Managing Hiring Risk from the HR and Security Perspectives (Paperback)
W. Barry Nixon, Kim Kerr
R1,227 Discovery Miles 12 270 Ships in 12 - 19 working days

Hiring highly qualified people is crucial to every company, and Background Screening and Investigations is an essential guide to succeeding in a turbulent business environment. A crucial part of any hiring process should be employment background screening, pre- and post-hire, which gives hiring personnel a glimpse into a person's past behavior patterns, propensities, and likely future behavior.
Background Screening and Investigations describes all aspects of the employment background screening processes - its history and evolution, the imperative for implementing a screening process, and the creation of a comprehensive policy. Nixon and Kerr show how security and human resources professionals can work together to negotiate legal hurdles and make their background screening process successful.
* Where do HR and security perspectives differ on hot topics like hiring convicted felons, data protection, and sexual predators?
* What does state law allow when screening job candidates?
* How should companies deal with emerging issues like international background investigations and continuous (Infinity) screening of current employees?

Retail Crime, Security, and Loss Prevention - An Encyclopedic Reference (Hardcover): Charles A. Sennewald, John H. Christman Retail Crime, Security, and Loss Prevention - An Encyclopedic Reference (Hardcover)
Charles A. Sennewald, John H. Christman
R2,955 R2,072 Discovery Miles 20 720 Save R883 (30%) Ships in 12 - 19 working days

"Retail Crime, Security, and Loss Prevention" is destined to become the "go to" source of crime- and loss prevention- related information in the retail industry. Written and edited by two nationally recognized retail security experts and enhanced with 63 contributions by others who contribute expertise in specialized areas, this book provides over 150 definitions of loss prevention terms, and discusses topics ranging from accident investigations, counterfeit currency, emergency planning, and workplace violence to vendor frauds. No other single work contains such a wealth of retail security information.
The co-authors are Charles "Chuck" Sennewald, CSC, CPP former Director of Security at The Broadway Department Stores, a major division of Carter Hawley Hale Stores, Inc., founder of the IAPSC and author of numerous security industry books, and John Christman, CPP, former VP and Director of Security for Macy's West. They have put in one book a wealth of information, techniques, procedures and source material relative to retail crime and loss prevention which will prove an invaluable reference work for professionals at all levels within the industry.
* Tables, current industry figures, and statistics fully articulate the impact of loss prevention and theft in the retail setting
* Case examples from the authors' own experience illustrate real-world problems and connect theory to practice
* The most complete book available on retail security

Digital CCTV - A Security Professional's Guide (Hardcover): Emily M. Harwood Digital CCTV - A Security Professional's Guide (Hardcover)
Emily M. Harwood; Contributions by Alan Matchett
R2,174 R1,515 Discovery Miles 15 150 Save R659 (30%) Ships in 12 - 19 working days

The effects of digital technology on the security industry require constant vigilance by security distributors, sales staff, and installation professionals. Today and for the foreseeable future, all security professionals must have at least a basic understanding of digital technology. "Digital CCTV" addresses this new challenge.
Topics convered include compression variables such as Lossless and Lossy, which are explained by reviewing Huffman and Run Length Encoding (RLE), and by relating these forms of compression to ZIP and Stuffit, which are commonly used in personal computers. A review of JPEG, motion JPEG, MPEG and wavelet compression schemes among others, with a comparison of the merits of each, is also provided. As "Digital CCTV" traces the stream of digital video flow from the computer industry through compression, transmission, display and storage, and explains how analog video signal is converted into a digital signal, the reader will learn and understand the mysteries of digital science.
* Explains industry concepts, acronyms and buzzwords acurately and clearly
* Covers history, current complexities, and the future effects of digital science
*Provides practical information about how digital video works, how digital video is stored and transmitted, what digital systems can and cannot accomplish, and what to expect from digital video equipment in modern CCTV systems

Security Design Consulting - The Business Of System Security Design (Hardcover, New): Brian Gouin Security Design Consulting - The Business Of System Security Design (Hardcover, New)
Brian Gouin
R1,523 R1,075 Discovery Miles 10 750 Save R448 (29%) Ships in 12 - 19 working days

A crucial reference for the practicing or aspiring design consultant, "Security Design Consulting" brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, "Security Design Consulting" gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant's important and growing role in an overall security program.
* Focuses on consulting in security design, not security management
* Provides sample service agreements, specifications, and reports to use as models
* Emphasizes the highest technical and ethical standards for this increasingly crucial profession

Biometric Technologies and Verification Systems (Paperback): John Vacca Biometric Technologies and Verification Systems (Paperback)
John Vacca
R1,682 Discovery Miles 16 820 Ships in 12 - 19 working days

" Biometric Technologies and Verification Systems" is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
* Contains elements such as Sidebars, Tips, Notes and URL links
* Heavily illustrated with over 150 illustrations, screen captures, and photographs
* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover): Michael... Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover)
Michael Khairallah
R2,132 R1,485 Discovery Miles 14 850 Save R647 (30%) Ships in 12 - 19 working days

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent "How To" for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
* Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system.
* Builds upon well-known, widely adopted concepts prevalent among security professionals.
* Offers seasoned advice on the competitive biddingprocess as well as on legal issues involved in the selection of applied products.

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,262 Discovery Miles 12 620 Ships in 12 - 19 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Investigative Data Mining for Security and Criminal Detection (Paperback): Jesus Mena Investigative Data Mining for Security and Criminal Detection (Paperback)
Jesus Mena
R1,643 Discovery Miles 16 430 Ships in 12 - 19 working days

Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest data mining techniques and shows how they can be used as investigative tools. Readers will learn how to search public and private databases and networks to flag potential security threats and root out criminal activities even before they occur.
The groundbreaking book reviews the latest data mining technologies including intelligent agents, link analysis, text mining, decision trees, self-organizing maps, machine learning, and neural networks. Using clear, understandable language, it explains the application of these technologies in such areas as computer and network security, fraud prevention, law enforcement, and national defense. International case studies throughout the book further illustrate how these technologies can be used to aid in crime prevention.
Investigative Data Mining for Security and Criminal Detection will also serve as an indispensable resource for software developers and vendors as they design new products for the law enforcement and intelligence communities.

Key Features:
* Covers cutting-edge data mining technologies available to use in evidence gathering and collection
* Includes numerous case studies, diagrams, and screen captures to illustrate real-world applications of data mining
* Easy-to-read format illustrates current and future data mining uses in preventative law enforcement, criminal profiling, counter-terrorist initiatives, and forensic science
* Introduces cutting-edge technologies in evidence gathering and collection, using clear non-technical language
* Illustrates current and future applications of data mining tools in preventative law enforcement, homeland security, and other areas of crime detection and prevention
* Shows how to construct predictive models for detecting criminal activity and for behavioral profiling of perpetrators
* Features numerous Web links, vendor resources, case studies, and screen captures illustrating the use of artificial intelligence (AI) technologies

The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program... The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program (Hardcover)
Gerald L. Kovacich, Edward Halibozek
R2,535 R1,763 Discovery Miles 17 630 Save R772 (30%) Ships in 12 - 19 working days

Kovacich and Halibozek offer you the benefit of more than 55 years of combined experience in government and corporate security. Throughout the book, the authors use a fictional global corporation as a model to provide continual real-world challenges and solutions. New and experienced managers alike will find a wealth of information and practical advice to help you develop strategic and tactical plans and manage your daily operations.
* Contains real case examples to illustrate practical application of concepts
* Thoroughly covers the integration of physical, computer and information security goals for complete security awareness
* A handy reference for managers to quickly find and implement the security solutions they need

CCTV for Security Professionals (Hardcover): Alan Matchett CCTV for Security Professionals (Hardcover)
Alan Matchett
R2,845 R1,974 Discovery Miles 19 740 Save R871 (31%) Ships in 12 - 19 working days

CCTV for Security Professionals provides the information necessary to design the ideal CCTV system. The chapters are stand-alone sources of information on their subjects and are presented in logical sequence to guide the reader from basic principles to more complex for a complete system understanding.
In his straight-forward and informative text, Alan Matchett approaches the camera systems from the user's point of view, providing the security manager with the knowledge to discuss the system, its desired features, and the areas of design concern within the context of an organization's business model. This can prove to be invaluable when evaluating an existing system, the use and components of a given system, or in evaluating a system design proposed by a vendor.
Installers and service personnel will benefit from the functions and possibilities that are available with the various components and by gaining an understanding of their customers' needs. Newer technicians will learn how to set up the system properly, and can familiarize themselves with the technologies that go into a CCTV system.
Security equipment sales personnel will also gain a better knowledge of the customer's needs as well as learn to determine exactly what questions they should be asking the customer and what the customer's responses mean. In this manner, the book will offer invaluable tips to ensure customers get exactly what they expect in a system.
* Provides a detailed explanation of CCTV components and the technology behind analog and digital CCTV systems.
* Establishes a "common language" for security professionals, CCTV system designers and sales personnel to use as a basis for system design.
* Provides a clear explanation of the design process and design principles.

Criminal Investigation - Law and Practice (Paperback, 2nd edition): Michael F. Brown Criminal Investigation - Law and Practice (Paperback, 2nd edition)
Michael F. Brown
R1,884 Discovery Miles 18 840 Ships in 12 - 19 working days

This textbook provides students and law enforcement officers with the fundamentals of the criminal investigation process, from arrival on the scene to trial procedures. Written in a clear and simple style, Criminal Investigation: Law and Practice surpasses traditional texts by presenting a unique combination of legal, technical, and procedural aspects of the criminal investigation. The hands-on approach taken by the author helps to increase the learning experience.
Criminal Investigation: Law and Practice, Second Edition, has been written to provide future law enforcement officers with a basic understanding of the investigative process. It merges two areas that are crucial to the successful completion of an investigation: the law, both criminal and procedural, and criminal investigative techniques. It is writen to provide the student investigator with the information needed to complete and investigation that can result in a successful prosecution.
- comprehensive coverage of the criminal investigation, from arrival on the scene to trial procedures
-unique combination of legal, technical, and procedural aspects of criminal investigation
-many updated cases, many personally experienced by the author.

Physical Security 150 Things You Should Know (Paperback): Lawrence Fennelly, Louis Tyska Physical Security 150 Things You Should Know (Paperback)
Lawrence Fennelly, Louis Tyska
R1,439 Discovery Miles 14 390 Ships in 12 - 19 working days

Physical Security 150 Things You Should Know is a comprehensive reference for the security professional. This book covers all aspects of security operations, from lighting and fencing to tracking systems and crime risk management. The "150 Things" offered by Tyska and Fennelly will help professionals in the field build a well-trained, alert, and conscientious security staff.


Format is unique in that it identifies subjects, then discusses and highlights specifics in terms of concerns and knowledge the security professional requires
Quick and easy reference
Covers basics of physical security - both high and low tech

Public Safety and Security Administration (Paperback): P J. Ortmeier Public Safety and Security Administration (Paperback)
P J. Ortmeier
R1,521 Discovery Miles 15 210 Ships in 12 - 19 working days

This book addresses public safety and security from a holistic and visionary perspective. For the first time, safety and security organizations, as well as their administration, are brought together into an integrated work.
The protection of persons and property involves many public agencies and priivate organizations. Entities from the criminal jutics system (law enforcement, courts, corrections) as well as the fire service, private security and hazardous materials all contribute to public safety and security. This book addresses these entities, as well as safety and security issues, from a holistic and visionary perspective. It addresses criminal and non-criminal safety and security concerns, provides an overview of each entity (component) of the system of public safety and security, presents an overview of the administration process involved in planning, organizing, managing and evaluating public safety and security organizations and describes collateral functions of investigations, documentation and report writing.
Public safety and security organizations should not work in isolation. Rather, they should collaborate to protect persons and property. This book represents the first time all the public safety and security entities have been addressed in one text.

Focuses on the theories, concepts, practices and problems related to the present and future of public safety and security
Examines different strategies for problem solving which personnel working in the field may utilize
Synthesizes college-level lectures prepared, presented, and updated by the author over the past twenty years

Investigations 150 Things You Should Know (Paperback): Lawrence Fennelly, Louis Tyska Investigations 150 Things You Should Know (Paperback)
Lawrence Fennelly, Louis Tyska
R1,128 Discovery Miles 11 280 Ships in 12 - 19 working days

By covering the essential tips and techniques for investigators, Investigations: 150 Things You Should Know becomes a useful reference. By further covering the legal guidelines that investigators must follow, it becomes indispensable. Through anecdotes, case studies, and documented procedures the authors of this book have amassed the most complete collection of investigative information available.
This ready reference is for anyone interested in investigations. Readers in and out of the law enforcement field will find this book easy to use and understand when seeking explanations about a wide variety of investigative topics including: constitutional law, documentary evidence, interviewing and interrogating, and surveillance.

Comprehensive overview of investigation
Easily readable and accessible information supplies all the necessary elements for the beginner or expert investigator
Further investigative resources are listed in valuable appendices

Model Security Policies, Plans and Procedures (Paperback): John Fay Model Security Policies, Plans and Procedures (Paperback)
John Fay
R1,776 Discovery Miles 17 760 Ships in 12 - 19 working days

Model Security Policies, Plans, and Procedures contains sample security policy, planning, and procedural documents drawn from the proven experiences of hundreds of America's most successful corporations. If your job requires you to develop or update security policies, plans, or procedures, this book will be a highly valuable resource. The samples cover the key concepts of organizational protection. Putting the samples to use, either as presented or as drafting guides, can eliminate many hours of tedious research and writing.

Offers a practical mode of reference for security professionalsContains sample plans, policies and procedures

Risk Management for Security Professionals (Hardcover): Carl Roper Risk Management for Security Professionals (Hardcover)
Carl Roper
R2,832 R1,962 Discovery Miles 19 620 Save R870 (31%) Ships in 12 - 19 working days

This book describes the risk management methodology as a specific process, a theory, or a procedure for determining your assets, vulnerabilities, and threats and how security professionals can protect them.
Risk Management for Security Professionals is a practical handbook for security managers who need to learn risk management skills. It goes beyond the physical security realm to encompass all risks to which a company may be exposed. Risk Management as presented in this book has several goals:
Provides standardized common approach to risk management through a framework that effectively links security strategies and related costs to realistic threat assessment and risk levels
Offers flexible yet structured framework that can be applied to the risk assessment and decision support process in support of your business or organization
Increases awareness in terms of potential loss impacts, threats and vulnerabilities to organizational assets
Ensures that various security recommendations are based on an integrated assessment of loss impacts, threats, vulnerabilities and resource constraints

Risk management is essentially a process methodology that will provide a cost-benefit payback factor to senior management.
Provides a stand-alone guide to the risk management process
Helps security professionals learn the risk countermeasures and their pros and cons
Addresses a systematic approach to logical decision-making about the allocation of scarce security resources

Private Security Law - Case Studies (Hardcover): David Maxwell Private Security Law - Case Studies (Hardcover)
David Maxwell
R2,071 R1,449 Discovery Miles 14 490 Save R622 (30%) Ships in 12 - 19 working days

Private Security Law: Case Studies is uniquely designed for the special needs of private security practitioners, students, and instructors. Part One of the book encompasses negligence, intentional torts, agency contracts, alarms, and damages. Part Two covers authority of the private citizen, deprivation of rights, and entrapment.
The factual cases presented in this book touch on the everyday duties of persons associated with the private security industry. Private Security Law: Case Studies provides a basic orientation to problems capable of inciting litigation. The information presented through case laws comes from cases chosen for their factual, realistic, and practical connection to the private security industry. This focused approach addresses specific problem areas of the industry and provides information necessary to a security manager to avert future loss.
Specially designed for private security practitioners, instructors, and students.
Examines cases that are practical, realistic and relevant to specific areas of private security.
Provides the information security managers need to avoid future problems.

Effective Physical Security (Paperback, 4th edition): Lawrence Fennelly Effective Physical Security (Paperback, 4th edition)
Lawrence Fennelly
R1,396 Discovery Miles 13 960 Ships in 12 - 19 working days

"Effective Physical Security, " Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors work that set the standard: "Handbook of Loss Prevention and Crime Prevention, " Fifth Edition.

Designed for easy reference, "Effective Physical Security" contains important coverage of environmental design, security surveys, locks, lighting, and CCTV as well as new chapters covering the latest in the ISO standards for Risk Assessmentand Risk Management, physical security planning, network systems infrastructure, and environmental design. This new edition continues to serve as a valuable reference for experienced security practitioners as well as students in undergraduate and graduate security programs.
Required reading for the ASIS Physical Security Professional Certification (PSP) and recommended reading for the CPP certification Provides detailed coverage of Physical Security in an easily accessible reference format with content divided into three major parts: Design, Equipment, and Operations Each chapter is written by a recognized expert security specialist "

Cyber Attacks - Protecting National Infrastructure, STUDENT EDITION (Hardcover, Student Edition): Edward Amoroso Cyber Attacks - Protecting National Infrastructure, STUDENT EDITION (Hardcover, Student Edition)
Edward Amoroso
R1,549 Discovery Miles 15 490 Ships in 12 - 19 working days

This textbook offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure and includes practical and empirically-based guidance for students wishing to become security engineers, network operators, software designers, technology managers, application developers, Chief Security Officers, etc.. This approach includes controversial themes such as the deliberate use of deception to trap intruders. In short, it serves as an attractive framework for a new national strategy for cyber security. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows students to understand how any organization, such as a government agency, integrates the principles into their local environment. The STUDENT EDITION features several case studies illustrating actual implementation scenarios of the principals and requirements discussed in the text. It also includes helpful pedagogical elements such as chapter outlines, chapter summaries, learning checklists, and a 2-color interior. And it boasts a new and complete instructor ancillary package including test bank, IM, Ppt slides, case study questions, and more.

Provides case studies focusing on cyber security challenges and solutions to display how theory, research, and methods, apply to real-life challenges

Utilizes, end-of-chapter case problems that take chapter content and relate it to real security situations and issues

Includes instructor slides for each chapter as well as an instructor s manual with sample syllabi and test bank"

Private Security and the Law (Hardcover, 4th edition): Charles Nemeth Private Security and the Law (Hardcover, 4th edition)
Charles Nemeth
R1,527 Discovery Miles 15 270 Ships in 12 - 19 working days

"Private Security and the Law, 4th Edition," is a unique resource that provides analysis of practices in the security industry as they relate to law, regulation, licensure, and constitutional questions of case and statutory authority.This bookdescribes the legal requirements facedin the area of private security.It emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency.The textalso examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that will set pace for future private security laws and regulations. As private security becomes more closely involved in national and international security, cases like Blackwater are examined. Charles Nemeth takesyou step by step through the analysis of case law as it applies to situations commonly faced in the private security practice, providing a solid introduction to the legal and ethical standards that shape the industry.

*Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"

Cyber Attacks - Protecting National Infrastructure (Hardcover): Edward Amoroso Cyber Attacks - Protecting National Infrastructure (Hardcover)
Edward Amoroso
R1,284 Discovery Miles 12 840 Ships in 12 - 19 working days

No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction.

* Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.

Death Penalty Cases - Leading U.S. Supreme Court Cases on Capital Punishment (Paperback, 3rd edition): Barry Latzer Death Penalty Cases - Leading U.S. Supreme Court Cases on Capital Punishment (Paperback, 3rd edition)
Barry Latzer
R1,060 Discovery Miles 10 600 Ships in 12 - 19 working days

This brand new edition of "Death Penalty Cases" makes the most manageable comprehensive resource on the death penalty even better. It includes the most recent cases, including Kennedy v. Louisiana, prohibiting the death penalty for child rapists, and Baze v. Rees, upholding execution by lethal injection. In addition, all of the cases are now topically organized into five sections: * The Foundational Cases * Death-Eligibility: Which persons/crimes are fit for the death penalty? * The Death Penalty Trial * Post-conviction Review * Execution Issues The introductory essays on the history, administration, and controversies surrounding capital punishment have been thoroughly revised. The statistical appendix has been brought up-to-date, and the statutory appendixhas beenrestructured. For clarity, accuracy, complete impartiality and comprehensiveness, there simply is no better resource on capital punishment available.

* Provides the most recent case material--no need to supplement. * Topical organization of cases provides a more logical organization for structuring a course. * Co-authors with different perspectives on the death penalty assures complete impartiality of the material. * Provides the necessary historical background, a clear explanation of the current capital case process, and an impartial description of the controversies surrounding the death penalty * Provides the latest statistics relevant to discussions on the death penalty. * Clearly explains the different ways in which the states process death penalty cases, with excerpts of the most relevant statutes."

Contemporary Security Management (Hardcover, 3rd edition): John Fay Contemporary Security Management (Hardcover, 3rd edition)
John Fay
R1,568 Discovery Miles 15 680 Ships in 12 - 19 working days

"Contemporary Security Management, 3rd Edition "teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management.
Comprehensive introduction to security and IT security management principlesDiscussion of both public and private sector roles, as well as the increasingly common privatizing of government functionsNew experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter

Securing Intellectual Property - Protecting Trade Secrets and Other Information Assets (Paperback): Information Security Securing Intellectual Property - Protecting Trade Secrets and Other Information Assets (Paperback)
Information Security
R1,433 Discovery Miles 14 330 Ships in 12 - 19 working days

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.
Nearly all books that address the topic of trade secrets have the spy vs. spy perspective. The author approaches the topic from a practical business perspective and not simply creating paranoia for paranoia s sake. The material for this book comes from the author s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managersSample agreements and forms that address specific business needsCoverage of threats ranging from physical security lapses to hackers to social engineering"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Real Writing - Modernizing the Old…
Mitchell Nobis, Daniel Laird, … Hardcover R1,933 Discovery Miles 19 330
The Nuclear Overhauser Effect in…
D. Neuhaus Hardcover R7,118 Discovery Miles 71 180
Why Kids Can't Read - Continuing to…
Patrick R. Riccards, Phyllis Blaunstein, … Paperback R1,314 Discovery Miles 13 140
Building and Maintaining Award-Winning…
Matthew J. Mio, Mark a. Benvenuto Hardcover R4,262 Discovery Miles 42 620
Computational Studies in Organometallic…
Stuart A. Macgregor, Odile Eisenstein Hardcover R6,303 Discovery Miles 63 030
The Struggling Reader - Interventions…
J. David Cooper, David J. Chard, … Paperback R631 R585 Discovery Miles 5 850
Literacy in Teacher Preparation and…
Patrick M. Jenlink Hardcover R3,000 Discovery Miles 30 000
Comprehension Ninja for Ages 8-9…
Andrew Jennings, Adam Bushnell Paperback R861 R684 Discovery Miles 6 840
Optical Spectra and Chemical Bonding in…
Thomas Schoenherr Hardcover R8,319 Discovery Miles 83 190
The Chemical Bond - A Fundamental…
Tadamasa Shida Hardcover R4,475 Discovery Miles 44 750

 

Partners