0
Your cart

Your cart is empty

Browse All Departments
Price
  • R500+ (62)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Security

Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition): Philip Walker Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition)
Philip Walker
R1,992 Discovery Miles 19 920 Ships in 10 - 15 working days

In the latest edition, Philip Walker not only tackles the electronic aspect of the design of a security system, but also examines the human factor in such systems. In his own words: 'Electronic aids are added to enable security officers to do their jobs better, but not to do their jobs for them'.
Today, with the escalation of crime and growing concerns for security, there has been a great increase in the number of electronic security systems. Unfortunately, despite improvements in reliability in terms of equipment manufacture, false alarms do still occur, and they waste a large amount of police time; approximately ninety out of one hundred alarms investigated by the police are false. In the light of this, the new edition of Electronic Security Systems couldn't come at a better time, as it deals extensively with methods of reducing false alarms, allowing the police to concentrate on real breeches of security, and thus ultimately to reduce crime.
The extensive and unusual combination of experience that Philip Walker has in the world of electronics, communications and as a security consulting engineer makes him eminently qualified to tackle such subjects.
At only 30, this hardback book is an essential addition to your security collection. It has 320 pages packed with advice and technical knowledge, 40 photographs and 25 line diagrams and a good index.

Comprehensive coverage of electronic security systems
Written by an experienced security professional
Fully updated to examine new equipment with extensive help on avoiding false alarms"

Home Security - Alarms, Sensors and Systems (Paperback, 2nd edition): Vivian Capel Home Security - Alarms, Sensors and Systems (Paperback, 2nd edition)
Vivian Capel
R1,286 Discovery Miles 12 860 Ships in 10 - 15 working days

As crime rates soar every householder looks at ways to protect their home and its contents. This practical guide, in straightforward language, spells out the simple steps you can take to guard your home. It shows how burglars work, and how to thwart them. The selection and installation of alarm systems are described simply. This handy volume may provide the information you need to avoid costly and upsetting break-ins.
As well as describing the bewildering range of security devices on offer, more technical readers may consider their own solutions using descriptions and circuits for two simple tested designs are given, one for the home and one for a foolproof public hall system.
There is a plethora of security devices now on offer. Large sums can be spent on elaborate systems, yet weak links can be left unrecognised - except by the housebreaker Good independent advice is scarce, as most security firms favour their own products. This book explains the pros and cons of alarm systems, including how to avoid faults, and find them if they occur. Friendly security' is particularly featured, and other security devices are given a critical scrutiny.

Explains simply and in straightforward language how to select and install systems
Describes range of security devices on offer
Explains pros and cons of alarm systems and how to avoid faults

Security Consulting (Paperback, 4th edition): Charles A. Sennewald Security Consulting (Paperback, 4th edition)
Charles A. Sennewald
R1,107 Discovery Miles 11 070 Ships in 10 - 15 working days

Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, at no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption -- which could bring any business to it's knees --has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in-depth security surveys so businesses will know exactly where security holes are present and where they need improvement to limit their exposure to various threats. The fourth edition of "Security Consulting" introduces security and law enforcement professionals to the career and business of security consulting. It provides new and potential consultants with the practical guidelines needed to start up and maintain a successful independent practice. Updated and expanded information is included on marketing, fees and expenses, forensic consulting, the use of computers, and the need for professional growth.Useful sample forms have been updated in addition tonew promotion opportunities and keys to conducting research on the Web.

- The only book of its kind dedicated to beginning a security consulting practice from the ground-up

- Proven, practical methods to establish and run a security consulting business

- Newchapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet

- The most up-to-date best practices from the IAPSC"

Securing Intellectual Property - Protecting Trade Secrets and Other Information Assets (Paperback): Information Security Securing Intellectual Property - Protecting Trade Secrets and Other Information Assets (Paperback)
Information Security
R1,352 Discovery Miles 13 520 Ships in 10 - 15 working days

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.
Nearly all books that address the topic of trade secrets have the spy vs. spy perspective. The author approaches the topic from a practical business perspective and not simply creating paranoia for paranoia s sake. The material for this book comes from the author s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managersSample agreements and forms that address specific business needsCoverage of threats ranging from physical security lapses to hackers to social engineering"

Background Screening and Investigations - Managing Hiring Risk from the HR and Security Perspectives (Paperback): W. Barry... Background Screening and Investigations - Managing Hiring Risk from the HR and Security Perspectives (Paperback)
W. Barry Nixon, Kim Kerr
R1,158 Discovery Miles 11 580 Ships in 10 - 15 working days

Hiring highly qualified people is crucial to every company, and Background Screening and Investigations is an essential guide to succeeding in a turbulent business environment. A crucial part of any hiring process should be employment background screening, pre- and post-hire, which gives hiring personnel a glimpse into a person's past behavior patterns, propensities, and likely future behavior.
Background Screening and Investigations describes all aspects of the employment background screening processes - its history and evolution, the imperative for implementing a screening process, and the creation of a comprehensive policy. Nixon and Kerr show how security and human resources professionals can work together to negotiate legal hurdles and make their background screening process successful.
* Where do HR and security perspectives differ on hot topics like hiring convicted felons, data protection, and sexual predators?
* What does state law allow when screening job candidates?
* How should companies deal with emerging issues like international background investigations and continuous (Infinity) screening of current employees?

Retail Crime, Security, and Loss Prevention - An Encyclopedic Reference (Hardcover): Charles A. Sennewald, John H. Christman Retail Crime, Security, and Loss Prevention - An Encyclopedic Reference (Hardcover)
Charles A. Sennewald, John H. Christman
R1,953 Discovery Miles 19 530 Ships in 10 - 15 working days

"Retail Crime, Security, and Loss Prevention" is destined to become the "go to" source of crime- and loss prevention- related information in the retail industry. Written and edited by two nationally recognized retail security experts and enhanced with 63 contributions by others who contribute expertise in specialized areas, this book provides over 150 definitions of loss prevention terms, and discusses topics ranging from accident investigations, counterfeit currency, emergency planning, and workplace violence to vendor frauds. No other single work contains such a wealth of retail security information.
The co-authors are Charles "Chuck" Sennewald, CSC, CPP former Director of Security at The Broadway Department Stores, a major division of Carter Hawley Hale Stores, Inc., founder of the IAPSC and author of numerous security industry books, and John Christman, CPP, former VP and Director of Security for Macy's West. They have put in one book a wealth of information, techniques, procedures and source material relative to retail crime and loss prevention which will prove an invaluable reference work for professionals at all levels within the industry.
* Tables, current industry figures, and statistics fully articulate the impact of loss prevention and theft in the retail setting
* Case examples from the authors' own experience illustrate real-world problems and connect theory to practice
* The most complete book available on retail security

High-Security Mechanical Locks - An Encyclopedic Reference (Hardcover): Graham Pulford High-Security Mechanical Locks - An Encyclopedic Reference (Hardcover)
Graham Pulford
R2,131 Discovery Miles 21 310 Ships in 10 - 15 working days

" High-Security Mechanical Locks " comprehensively surveys and explains the highly technical area of high security locks in a way that is accessible to a wide audience. Well over 100 different locks are presented, organized into 6 basic types. Each chapter introduces the necessary concepts in a historical perspective and further categorizes the locks. This is followed by detailed 'how it works' descriptions with many pictures, diagrams and references. The descriptions are based on actual dissections of the real locks.
The scope is limited to key operated mechanical locks, thus keyless combination locks and digital locks are not covered. The book does not deal with routine locksmithing topics such as installation and servicing of locks. The sensitive area of picking and bypassing of locks is dealt with only at a high level without giving detailed information that would be unacceptable in the wrong hands.
* Comprehensive coverage of over 100 different types of 19th and 20th century key-operated locks, unified in a simple classification scheme
* Detailed operating principles - clear 'how it works' descriptions
* Manipulation resistance rating for each lock on a scale of 1 to 5

Digital CCTV - A Security Professional's Guide (Hardcover): Emily M. Harwood Digital CCTV - A Security Professional's Guide (Hardcover)
Emily M. Harwood; Contributions by Alan Matchett
R1,429 Discovery Miles 14 290 Ships in 10 - 15 working days

The effects of digital technology on the security industry require constant vigilance by security distributors, sales staff, and installation professionals. Today and for the foreseeable future, all security professionals must have at least a basic understanding of digital technology. "Digital CCTV" addresses this new challenge.
Topics convered include compression variables such as Lossless and Lossy, which are explained by reviewing Huffman and Run Length Encoding (RLE), and by relating these forms of compression to ZIP and Stuffit, which are commonly used in personal computers. A review of JPEG, motion JPEG, MPEG and wavelet compression schemes among others, with a comparison of the merits of each, is also provided. As "Digital CCTV" traces the stream of digital video flow from the computer industry through compression, transmission, display and storage, and explains how analog video signal is converted into a digital signal, the reader will learn and understand the mysteries of digital science.
* Explains industry concepts, acronyms and buzzwords acurately and clearly
* Covers history, current complexities, and the future effects of digital science
*Provides practical information about how digital video works, how digital video is stored and transmitted, what digital systems can and cannot accomplish, and what to expect from digital video equipment in modern CCTV systems

Biometric Technologies and Verification Systems (Paperback): John Vacca Biometric Technologies and Verification Systems (Paperback)
John Vacca
R1,586 Discovery Miles 15 860 Ships in 10 - 15 working days

" Biometric Technologies and Verification Systems" is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
* Contains elements such as Sidebars, Tips, Notes and URL links
* Heavily illustrated with over 150 illustrations, screen captures, and photographs
* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover): Michael... Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover)
Michael Khairallah
R1,400 Discovery Miles 14 000 Ships in 10 - 15 working days

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent "How To" for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
* Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system.
* Builds upon well-known, widely adopted concepts prevalent among security professionals.
* Offers seasoned advice on the competitive biddingprocess as well as on legal issues involved in the selection of applied products.

Risk Management for Computer Security - Protecting Your Network and Information Assets (Paperback): Andy Jones, Debi Ashenden Risk Management for Computer Security - Protecting Your Network and Information Assets (Paperback)
Andy Jones, Debi Ashenden
R1,572 Discovery Miles 15 720 Ships in 18 - 22 working days

The information systems security (InfoSec) profession remains one of the fastest growing professions in the world today. With the advent of the Internet and its use as a method of conducting business, even more emphasis is being placed on InfoSec. However, there is an expanded field of threats that must be addressed by today's InfoSec and information assurance (IA) professionals.
Operating within a global business environment with elements of a virtual workforce can create problems not experienced in the past. How do you assess the risk to the organization when information can be accessed, remotely, by employees in the field or while they are traveling internationally? How do you assess the risk to employees who are not working on company premises and are often thousands of miles from the office? How do you assess the risk to your organization and its assets when you have offices or facilities in a nation whose government may be supporting the theft of the corporate "crown jewels" in order to assist their own nationally owned or supported corporations? If your risk assessment and management program is to be effective, then these issues must be assessed.
Personnel involved in the risk assessment and management process face a much more complex environment today than they have ever encountered before.
This book covers more than just the fundamental elements that make up a good risk program. It provides an integrated "how to" approach to implementing a corporate program, complete with tested methods and processes; flowcharts; and checklists that can be used by the reader and immediately implemented into a computer and overall corporate security program. The challenges are many and this book will help professionals in meeting their challenges as we progress through the 21st Century.
*Presents material in an engaging, easy-to-follow manner that will appeal to both advanced INFOSEC career professionals and network administrators entering the information security profession
*Addresses the needs of both the individuals who are new to the subject as well as of experienced professionals
*Provides insight into the factors that need to be considered & fully explains the numerous methods, processes & procedures of risk management

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,191 Discovery Miles 11 910 Ships in 10 - 15 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Investigative Data Mining for Security and Criminal Detection (Paperback): Jesus Mena Investigative Data Mining for Security and Criminal Detection (Paperback)
Jesus Mena
R1,549 Discovery Miles 15 490 Ships in 10 - 15 working days

Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest data mining techniques and shows how they can be used as investigative tools. Readers will learn how to search public and private databases and networks to flag potential security threats and root out criminal activities even before they occur.
The groundbreaking book reviews the latest data mining technologies including intelligent agents, link analysis, text mining, decision trees, self-organizing maps, machine learning, and neural networks. Using clear, understandable language, it explains the application of these technologies in such areas as computer and network security, fraud prevention, law enforcement, and national defense. International case studies throughout the book further illustrate how these technologies can be used to aid in crime prevention.
Investigative Data Mining for Security and Criminal Detection will also serve as an indispensable resource for software developers and vendors as they design new products for the law enforcement and intelligence communities.

Key Features:
* Covers cutting-edge data mining technologies available to use in evidence gathering and collection
* Includes numerous case studies, diagrams, and screen captures to illustrate real-world applications of data mining
* Easy-to-read format illustrates current and future data mining uses in preventative law enforcement, criminal profiling, counter-terrorist initiatives, and forensic science
* Introduces cutting-edge technologies in evidence gathering and collection, using clear non-technical language
* Illustrates current and future applications of data mining tools in preventative law enforcement, homeland security, and other areas of crime detection and prevention
* Shows how to construct predictive models for detecting criminal activity and for behavioral profiling of perpetrators
* Features numerous Web links, vendor resources, case studies, and screen captures illustrating the use of artificial intelligence (AI) technologies

The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program... The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program (Hardcover)
Gerald L. Kovacich, Edward Halibozek
R1,663 Discovery Miles 16 630 Ships in 10 - 15 working days

Kovacich and Halibozek offer you the benefit of more than 55 years of combined experience in government and corporate security. Throughout the book, the authors use a fictional global corporation as a model to provide continual real-world challenges and solutions. New and experienced managers alike will find a wealth of information and practical advice to help you develop strategic and tactical plans and manage your daily operations.
* Contains real case examples to illustrate practical application of concepts
* Thoroughly covers the integration of physical, computer and information security goals for complete security awareness
* A handy reference for managers to quickly find and implement the security solutions they need

CCTV for Security Professionals (Hardcover): Alan Matchett CCTV for Security Professionals (Hardcover)
Alan Matchett
R1,861 Discovery Miles 18 610 Ships in 10 - 15 working days

CCTV for Security Professionals provides the information necessary to design the ideal CCTV system. The chapters are stand-alone sources of information on their subjects and are presented in logical sequence to guide the reader from basic principles to more complex for a complete system understanding.
In his straight-forward and informative text, Alan Matchett approaches the camera systems from the user's point of view, providing the security manager with the knowledge to discuss the system, its desired features, and the areas of design concern within the context of an organization's business model. This can prove to be invaluable when evaluating an existing system, the use and components of a given system, or in evaluating a system design proposed by a vendor.
Installers and service personnel will benefit from the functions and possibilities that are available with the various components and by gaining an understanding of their customers' needs. Newer technicians will learn how to set up the system properly, and can familiarize themselves with the technologies that go into a CCTV system.
Security equipment sales personnel will also gain a better knowledge of the customer's needs as well as learn to determine exactly what questions they should be asking the customer and what the customer's responses mean. In this manner, the book will offer invaluable tips to ensure customers get exactly what they expect in a system.
* Provides a detailed explanation of CCTV components and the technology behind analog and digital CCTV systems.
* Establishes a "common language" for security professionals, CCTV system designers and sales personnel to use as a basis for system design.
* Provides a clear explanation of the design process and design principles.

Criminal Investigation - Law and Practice (Paperback, 2nd edition): Michael F. Brown Criminal Investigation - Law and Practice (Paperback, 2nd edition)
Michael F. Brown
R1,776 Discovery Miles 17 760 Ships in 10 - 15 working days

This textbook provides students and law enforcement officers with the fundamentals of the criminal investigation process, from arrival on the scene to trial procedures. Written in a clear and simple style, Criminal Investigation: Law and Practice surpasses traditional texts by presenting a unique combination of legal, technical, and procedural aspects of the criminal investigation. The hands-on approach taken by the author helps to increase the learning experience.
Criminal Investigation: Law and Practice, Second Edition, has been written to provide future law enforcement officers with a basic understanding of the investigative process. It merges two areas that are crucial to the successful completion of an investigation: the law, both criminal and procedural, and criminal investigative techniques. It is writen to provide the student investigator with the information needed to complete and investigation that can result in a successful prosecution.
- comprehensive coverage of the criminal investigation, from arrival on the scene to trial procedures
-unique combination of legal, technical, and procedural aspects of criminal investigation
-many updated cases, many personally experienced by the author.

Physical Security 150 Things You Should Know (Paperback): Lawrence Fennelly, Louis Tyska Physical Security 150 Things You Should Know (Paperback)
Lawrence Fennelly, Louis Tyska
R1,357 Discovery Miles 13 570 Ships in 10 - 15 working days

Physical Security 150 Things You Should Know is a comprehensive reference for the security professional. This book covers all aspects of security operations, from lighting and fencing to tracking systems and crime risk management. The "150 Things" offered by Tyska and Fennelly will help professionals in the field build a well-trained, alert, and conscientious security staff.


Format is unique in that it identifies subjects, then discusses and highlights specifics in terms of concerns and knowledge the security professional requires
Quick and easy reference
Covers basics of physical security - both high and low tech

Surviving in the Security Alarm Business (Paperback): Lou Sepulveda Surviving in the Security Alarm Business (Paperback)
Lou Sepulveda
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

In the very competitive security alarm business, companies are finding themselves more and more burdened with the responsibility of preparing corporate mission statements, paradigm analyses, and corporate reengineering plans. Surviving in the Security Alarm Business will help explain their importance, how to perform them, and what the expected result will be.

Teaches alarm professionals how to recreate their business "from scratch" for greater selling success
Illustrates how to do business in the future in response to market changes and trends
Suggests techniques for willing recurring revenue rather than single-sale profit

Public Safety and Security Administration (Paperback): P J. Ortmeier Public Safety and Security Administration (Paperback)
P J. Ortmeier
R1,435 Discovery Miles 14 350 Ships in 10 - 15 working days

This book addresses public safety and security from a holistic and visionary perspective. For the first time, safety and security organizations, as well as their administration, are brought together into an integrated work.
The protection of persons and property involves many public agencies and priivate organizations. Entities from the criminal jutics system (law enforcement, courts, corrections) as well as the fire service, private security and hazardous materials all contribute to public safety and security. This book addresses these entities, as well as safety and security issues, from a holistic and visionary perspective. It addresses criminal and non-criminal safety and security concerns, provides an overview of each entity (component) of the system of public safety and security, presents an overview of the administration process involved in planning, organizing, managing and evaluating public safety and security organizations and describes collateral functions of investigations, documentation and report writing.
Public safety and security organizations should not work in isolation. Rather, they should collaborate to protect persons and property. This book represents the first time all the public safety and security entities have been addressed in one text.

Focuses on the theories, concepts, practices and problems related to the present and future of public safety and security
Examines different strategies for problem solving which personnel working in the field may utilize
Synthesizes college-level lectures prepared, presented, and updated by the author over the past twenty years

Model Security Policies, Plans and Procedures (Paperback): John Fay Model Security Policies, Plans and Procedures (Paperback)
John Fay
R1,675 Discovery Miles 16 750 Ships in 10 - 15 working days

Model Security Policies, Plans, and Procedures contains sample security policy, planning, and procedural documents drawn from the proven experiences of hundreds of America's most successful corporations. If your job requires you to develop or update security policies, plans, or procedures, this book will be a highly valuable resource. The samples cover the key concepts of organizational protection. Putting the samples to use, either as presented or as drafting guides, can eliminate many hours of tedious research and writing.

Offers a practical mode of reference for security professionalsContains sample plans, policies and procedures

Risk Management for Security Professionals (Hardcover): Carl Roper Risk Management for Security Professionals (Hardcover)
Carl Roper
R1,849 Discovery Miles 18 490 Ships in 10 - 15 working days

This book describes the risk management methodology as a specific process, a theory, or a procedure for determining your assets, vulnerabilities, and threats and how security professionals can protect them.
Risk Management for Security Professionals is a practical handbook for security managers who need to learn risk management skills. It goes beyond the physical security realm to encompass all risks to which a company may be exposed. Risk Management as presented in this book has several goals:
Provides standardized common approach to risk management through a framework that effectively links security strategies and related costs to realistic threat assessment and risk levels
Offers flexible yet structured framework that can be applied to the risk assessment and decision support process in support of your business or organization
Increases awareness in terms of potential loss impacts, threats and vulnerabilities to organizational assets
Ensures that various security recommendations are based on an integrated assessment of loss impacts, threats, vulnerabilities and resource constraints

Risk management is essentially a process methodology that will provide a cost-benefit payback factor to senior management.
Provides a stand-alone guide to the risk management process
Helps security professionals learn the risk countermeasures and their pros and cons
Addresses a systematic approach to logical decision-making about the allocation of scarce security resources

The Drug Free Workplace - How to Get There and Stay There (Paperback): John Fay The Drug Free Workplace - How to Get There and Stay There (Paperback)
John Fay
R1,810 Discovery Miles 18 100 Ships in 10 - 15 working days

This is a no-nonsense, practical book for helping organizations rid their workplaces of drug abuse and its serious and costly consequences. The book draws upon the collective experiences of hundreds of organizations that have said "no more, not here" and have grown stronger as a result. The path to a drug-free working environment is straight but narrow. The Drug-Free Workplace:
How to Get There and Stay There delineates the path, always with a view toward avoiding missteps that can lead to trouble.
Bringing a workplace back to safety and profitability is a collaborative and multi-disciplinary effort. Participation necessarily involves professionals from security, safety, human resources, and health. Central to the effort is an enlightened management. Every specialist and manager committed to developing and maintaining a drug-free workplace will find in the pages of this book a wealth of sensible, meaningful information.
A drug-free workplace program cuts costs, increases productivity, reduces loss and wastage, avoids accidents, and literally saves careers, families, and lives. Much is at stake, making the drug-free program deserving of thoughtful deliberation, considerable planning, and careful implementation. Preliminary to the process is understanding the key tasks. All of the tasks are spelled out in this book.



Offers organizations a clear course to enact drug policiesTeaches the ramifications of testing and investigating drug use and abuseAddresses liability issues to keep buisness owners, security managers, and their companies out of court

Private Security Law - Case Studies (Hardcover): David Maxwell Private Security Law - Case Studies (Hardcover)
David Maxwell
R1,367 Discovery Miles 13 670 Ships in 10 - 15 working days

Private Security Law: Case Studies is uniquely designed for the special needs of private security practitioners, students, and instructors. Part One of the book encompasses negligence, intentional torts, agency contracts, alarms, and damages. Part Two covers authority of the private citizen, deprivation of rights, and entrapment.
The factual cases presented in this book touch on the everyday duties of persons associated with the private security industry. Private Security Law: Case Studies provides a basic orientation to problems capable of inciting litigation. The information presented through case laws comes from cases chosen for their factual, realistic, and practical connection to the private security industry. This focused approach addresses specific problem areas of the industry and provides information necessary to a security manager to avert future loss.
Specially designed for private security practitioners, instructors, and students.
Examines cases that are practical, realistic and relevant to specific areas of private security.
Provides the information security managers need to avoid future problems.

Issues in Security Management - Thinking Critically About Security (Paperback): Robert Robinson Issues in Security Management - Thinking Critically About Security (Paperback)
Robert Robinson
R1,735 Discovery Miles 17 350 Ships in 10 - 15 working days

This is a truly unique collection of 39 articles written by authorities or based on authoritative research. It goes beyond locks, lighting, and alarms to offer provocative viewpoints on a variety of security topics.
Contributors to this book are knowledgeable and practical individuals who are aware of the impact of their work on society. They have extensive and specialized experience in their respective sectors including corporate, retail, college, hospital, art gallery, and within the community at large. They are knowledgeable about technical and legal aspects of CCTV, electronic counter-intelligence, computers, fire safety, violent employees, terrorism and the future of policing. In addition, they are concerned about the right to privacy, the influence of gambling on employee theft, privatization of correctional services, the place of women in security work, security audit anxiety, and crime control/prevention.

The book looks beyond everyday applications and routines to an understanding of the social significance of careers in security. It will be of interest to practitioners in all sectors as well as students at all levels.
Goes beyond the usual nuts and bolts security book
An important, horizon-broadening supplement to the basic texts
Appeals to everybody in the security field from students to practitioners

Effective Physical Security (Paperback, 4th edition): Lawrence Fennelly Effective Physical Security (Paperback, 4th edition)
Lawrence Fennelly
R1,317 Discovery Miles 13 170 Ships in 10 - 15 working days

"Effective Physical Security, " Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors work that set the standard: "Handbook of Loss Prevention and Crime Prevention, " Fifth Edition.

Designed for easy reference, "Effective Physical Security" contains important coverage of environmental design, security surveys, locks, lighting, and CCTV as well as new chapters covering the latest in the ISO standards for Risk Assessmentand Risk Management, physical security planning, network systems infrastructure, and environmental design. This new edition continues to serve as a valuable reference for experienced security practitioners as well as students in undergraduate and graduate security programs.
Required reading for the ASIS Physical Security Professional Certification (PSP) and recommended reading for the CPP certification Provides detailed coverage of Physical Security in an easily accessible reference format with content divided into three major parts: Design, Equipment, and Operations Each chapter is written by a recognized expert security specialist "

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Beginning AutoCAD (R) 2022 Exercise…
Cheryl Shrock Paperback R1,715 Discovery Miles 17 150
Safety Management In An Organisational…
Portia Nkuna Paperback R331 Discovery Miles 3 310
Eye Tracking the User Experience - A…
Aga Bojko Paperback R1,430 Discovery Miles 14 300
The Shepherd And The Beast - The Hero's…
Tramayne Monaghan Paperback R265 R237 Discovery Miles 2 370
The Human Cloud - How Today's…
Matthew Mottola, Matthew Douglas Coatney Paperback R540 R444 Discovery Miles 4 440
Photoshop - Real life Project Examples…
John Slavio Hardcover R727 Discovery Miles 7 270
Conversations with Things - UX Design…
Diana Deibel, Rebecca Evanhoe Paperback R1,072 Discovery Miles 10 720
Wordpress for Beginners - How to Quickly…
Lee Sebastian Paperback R432 Discovery Miles 4 320
Habits of a Champion Team - The Formula…
Dana Cavalea Hardcover R630 R569 Discovery Miles 5 690
Tapping into the Crowd - How to create…
An Coppens Paperback R354 Discovery Miles 3 540

 

Partners