0
Your cart

Your cart is empty

Browse All Departments
Price
  • R500+ (99)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Security

Security and Loss Prevention - An Introduction (Hardcover, 6th edition): Philip Purpura Security and Loss Prevention - An Introduction (Hardcover, 6th edition)
Philip Purpura
R1,766 Discovery Miles 17 660 Ships in 12 - 17 working days

The sixth edition of "Security and Loss Prevention "continues the tradition of providing introductory and advanced coverage of the body of knowledge of the security profession. To bridge theory to practice is the book s backbone, and Philip Purpura continues this strong effort with new sidebars and text boxes presenting actual security challenges from real-life situations.

Globally recognized and on the ASIS International Certified Protection Professional reading list, thesixth edition of "Security and Loss Prevention"enhances its position in the market as a comprehensive, interdisciplinary, and up-to-date treatment of the area, connecting the public and private sector and the worlds of physical security and technological security. Purpura once again demonstrates why students and professionals alike rely on this best-selling text as a timely, reliable resource encompassing the breadth and depth of considerations involved when implementing general loss prevention concepts and security programs within an organization.
New focus on recent technologies like social networks, digital evidence warrants, and advances in CCTV, and how those apply to security and loss prevention. Incorporates changes in laws, presents various strategies of asset protection, and covers the ever-evolving technology of security and loss prevention.Utilizes end-of-chapter case problems that take the chapters content and relate it to real security situations and issues, offering various perspectives on contemporary security challenges.Includes student study questions and an accompanying Instructor s manual with lecture slides, lesson plans, and an instructor test bank for each chapter."

Investigative Data Mining for Security and Criminal Detection (Paperback): Jesus Mena Investigative Data Mining for Security and Criminal Detection (Paperback)
Jesus Mena
R1,712 R1,588 Discovery Miles 15 880 Save R124 (7%) Ships in 12 - 17 working days

Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest data mining techniques and shows how they can be used as investigative tools. Readers will learn how to search public and private databases and networks to flag potential security threats and root out criminal activities even before they occur.
The groundbreaking book reviews the latest data mining technologies including intelligent agents, link analysis, text mining, decision trees, self-organizing maps, machine learning, and neural networks. Using clear, understandable language, it explains the application of these technologies in such areas as computer and network security, fraud prevention, law enforcement, and national defense. International case studies throughout the book further illustrate how these technologies can be used to aid in crime prevention.
Investigative Data Mining for Security and Criminal Detection will also serve as an indispensable resource for software developers and vendors as they design new products for the law enforcement and intelligence communities.

Key Features:
* Covers cutting-edge data mining technologies available to use in evidence gathering and collection
* Includes numerous case studies, diagrams, and screen captures to illustrate real-world applications of data mining
* Easy-to-read format illustrates current and future data mining uses in preventative law enforcement, criminal profiling, counter-terrorist initiatives, and forensic science
* Introduces cutting-edge technologies in evidence gathering and collection, using clear non-technical language
* Illustrates current and future applications of data mining tools in preventative law enforcement, homeland security, and other areas of crime detection and prevention
* Shows how to construct predictive models for detecting criminal activity and for behavioral profiling of perpetrators
* Features numerous Web links, vendor resources, case studies, and screen captures illustrating the use of artificial intelligence (AI) technologies

Effective Physical Security (Paperback, 4th edition): Lawrence Fennelly Effective Physical Security (Paperback, 4th edition)
Lawrence Fennelly
R1,347 Discovery Miles 13 470 Ships in 12 - 17 working days

"Effective Physical Security, " Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors work that set the standard: "Handbook of Loss Prevention and Crime Prevention, " Fifth Edition.

Designed for easy reference, "Effective Physical Security" contains important coverage of environmental design, security surveys, locks, lighting, and CCTV as well as new chapters covering the latest in the ISO standards for Risk Assessmentand Risk Management, physical security planning, network systems infrastructure, and environmental design. This new edition continues to serve as a valuable reference for experienced security practitioners as well as students in undergraduate and graduate security programs.
Required reading for the ASIS Physical Security Professional Certification (PSP) and recommended reading for the CPP certification Provides detailed coverage of Physical Security in an easily accessible reference format with content divided into three major parts: Design, Equipment, and Operations Each chapter is written by a recognized expert security specialist "

Cyber Attacks - Protecting National Infrastructure, STUDENT EDITION (Hardcover, Student Edition): Edward Amoroso Cyber Attacks - Protecting National Infrastructure, STUDENT EDITION (Hardcover, Student Edition)
Edward Amoroso
R1,496 Discovery Miles 14 960 Ships in 12 - 17 working days

This textbook offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure and includes practical and empirically-based guidance for students wishing to become security engineers, network operators, software designers, technology managers, application developers, Chief Security Officers, etc.. This approach includes controversial themes such as the deliberate use of deception to trap intruders. In short, it serves as an attractive framework for a new national strategy for cyber security. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows students to understand how any organization, such as a government agency, integrates the principles into their local environment. The STUDENT EDITION features several case studies illustrating actual implementation scenarios of the principals and requirements discussed in the text. It also includes helpful pedagogical elements such as chapter outlines, chapter summaries, learning checklists, and a 2-color interior. And it boasts a new and complete instructor ancillary package including test bank, IM, Ppt slides, case study questions, and more.

Provides case studies focusing on cyber security challenges and solutions to display how theory, research, and methods, apply to real-life challenges

Utilizes, end-of-chapter case problems that take chapter content and relate it to real security situations and issues

Includes instructor slides for each chapter as well as an instructor s manual with sample syllabi and test bank"

Private Security and the Law (Hardcover, 4th edition): Charles Nemeth Private Security and the Law (Hardcover, 4th edition)
Charles Nemeth
R1,564 R1,476 Discovery Miles 14 760 Save R88 (6%) Ships in 12 - 17 working days

"Private Security and the Law, 4th Edition," is a unique resource that provides analysis of practices in the security industry as they relate to law, regulation, licensure, and constitutional questions of case and statutory authority.This bookdescribes the legal requirements facedin the area of private security.It emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency.The textalso examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that will set pace for future private security laws and regulations. As private security becomes more closely involved in national and international security, cases like Blackwater are examined. Charles Nemeth takesyou step by step through the analysis of case law as it applies to situations commonly faced in the private security practice, providing a solid introduction to the legal and ethical standards that shape the industry.

*Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"

Death Penalty Cases - Leading U.S. Supreme Court Cases on Capital Punishment (Paperback, 3rd edition): Barry Latzer Death Penalty Cases - Leading U.S. Supreme Court Cases on Capital Punishment (Paperback, 3rd edition)
Barry Latzer
R1,019 Discovery Miles 10 190 Ships in 12 - 17 working days

This brand new edition of "Death Penalty Cases" makes the most manageable comprehensive resource on the death penalty even better. It includes the most recent cases, including Kennedy v. Louisiana, prohibiting the death penalty for child rapists, and Baze v. Rees, upholding execution by lethal injection. In addition, all of the cases are now topically organized into five sections: * The Foundational Cases * Death-Eligibility: Which persons/crimes are fit for the death penalty? * The Death Penalty Trial * Post-conviction Review * Execution Issues The introductory essays on the history, administration, and controversies surrounding capital punishment have been thoroughly revised. The statistical appendix has been brought up-to-date, and the statutory appendixhas beenrestructured. For clarity, accuracy, complete impartiality and comprehensiveness, there simply is no better resource on capital punishment available.

* Provides the most recent case material--no need to supplement. * Topical organization of cases provides a more logical organization for structuring a course. * Co-authors with different perspectives on the death penalty assures complete impartiality of the material. * Provides the necessary historical background, a clear explanation of the current capital case process, and an impartial description of the controversies surrounding the death penalty * Provides the latest statistics relevant to discussions on the death penalty. * Clearly explains the different ways in which the states process death penalty cases, with excerpts of the most relevant statutes."

Cyber Attacks - Protecting National Infrastructure (Hardcover): Edward Amoroso Cyber Attacks - Protecting National Infrastructure (Hardcover)
Edward Amoroso
R1,237 Discovery Miles 12 370 Ships in 12 - 17 working days

No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction.

* Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.

Contemporary Security Management (Hardcover, 3rd edition): John Fay Contemporary Security Management (Hardcover, 3rd edition)
John Fay
R1,515 Discovery Miles 15 150 Ships in 12 - 17 working days

"Contemporary Security Management, 3rd Edition "teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management.
Comprehensive introduction to security and IT security management principlesDiscussion of both public and private sector roles, as well as the increasingly common privatizing of government functionsNew experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter

Securing Intellectual Property - Protecting Trade Secrets and Other Information Assets (Paperback): Information Security Securing Intellectual Property - Protecting Trade Secrets and Other Information Assets (Paperback)
Information Security
R1,383 Discovery Miles 13 830 Ships in 12 - 17 working days

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.
Nearly all books that address the topic of trade secrets have the spy vs. spy perspective. The author approaches the topic from a practical business perspective and not simply creating paranoia for paranoia s sake. The material for this book comes from the author s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managersSample agreements and forms that address specific business needsCoverage of threats ranging from physical security lapses to hackers to social engineering"

Building a Digital Forensic Laboratory - Establishing and Managing a Successful Facility (Paperback): Andrew Jones, Craig Valli Building a Digital Forensic Laboratory - Establishing and Managing a Successful Facility (Paperback)
Andrew Jones, Craig Valli
R1,694 Discovery Miles 16 940 Ships in 12 - 17 working days

The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the investigations themselves. This includes a great need for information on how to cost-effectively establish and manage a computer forensics laboratory. This book meets that need: a clearly written, non-technical book on the topic of computer forensics with emphasis on the establishment and management of a computer forensics laboratory and its subsequent support to successfully conducting computer-related crime investigations.
* Provides guidance on creating and managing a computer forensics lab
* Covers the regulatory and legislative environment in the US and Europe
* Meets the needs of IT professionals and law enforcement as well as consultants

High-Rise Security and Fire Life Safety (Hardcover, 3rd edition): Geoff Craighead High-Rise Security and Fire Life Safety (Hardcover, 3rd edition)
Geoff Craighead
R2,875 Discovery Miles 28 750 Ships in 12 - 17 working days

"High-Rise Security and Fire Life Safety, 3e, " is a comprehensive reference for managing security and fire life safety operations within high-rise buildings. It spells out the unique characteristics of skyscrapers from a security and fire life safety perspective, details the type of security and life safety systems commonly found in them, outlines how to conduct risk assessments, and explains security policies and procedures designed to protect life and property. Craighead also provides guidelines for managing security and life safety functions, including the development of response plans for building emergencies. This latest edition clearly separates out the different types of skyscrapers, from office buildings to hotels to condominiums to mixed-use buildings, and explains how different patterns of use and types of tenancy impact building security and life safety.

New to this edition:

Differentiates security and fire life safety issues specific to:

Office towers

Hotels

Residential and apartment buildings

Mixed-use buildings

Updated fire and life safety standards and guidelines Includes a CD-ROM with electronic versions of sample survey checklists, a sample building emergency management plan, and other security and fire life safety resources.

Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition): Philip Walker Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition)
Philip Walker
R2,048 Discovery Miles 20 480 Ships in 12 - 17 working days

In the latest edition, Philip Walker not only tackles the electronic aspect of the design of a security system, but also examines the human factor in such systems. In his own words: 'Electronic aids are added to enable security officers to do their jobs better, but not to do their jobs for them'.
Today, with the escalation of crime and growing concerns for security, there has been a great increase in the number of electronic security systems. Unfortunately, despite improvements in reliability in terms of equipment manufacture, false alarms do still occur, and they waste a large amount of police time; approximately ninety out of one hundred alarms investigated by the police are false. In the light of this, the new edition of Electronic Security Systems couldn't come at a better time, as it deals extensively with methods of reducing false alarms, allowing the police to concentrate on real breeches of security, and thus ultimately to reduce crime.
The extensive and unusual combination of experience that Philip Walker has in the world of electronics, communications and as a security consulting engineer makes him eminently qualified to tackle such subjects.
At only 30, this hardback book is an essential addition to your security collection. It has 320 pages packed with advice and technical knowledge, 40 photographs and 25 line diagrams and a good index.

Comprehensive coverage of electronic security systems
Written by an experienced security professional
Fully updated to examine new equipment with extensive help on avoiding false alarms"

Home Security - Alarms, Sensors and Systems (Paperback, 2nd edition): Vivian Capel Home Security - Alarms, Sensors and Systems (Paperback, 2nd edition)
Vivian Capel
R1,407 R1,313 Discovery Miles 13 130 Save R94 (7%) Ships in 12 - 17 working days

As crime rates soar every householder looks at ways to protect their home and its contents. This practical guide, in straightforward language, spells out the simple steps you can take to guard your home. It shows how burglars work, and how to thwart them. The selection and installation of alarm systems are described simply. This handy volume may provide the information you need to avoid costly and upsetting break-ins.
As well as describing the bewildering range of security devices on offer, more technical readers may consider their own solutions using descriptions and circuits for two simple tested designs are given, one for the home and one for a foolproof public hall system.
There is a plethora of security devices now on offer. Large sums can be spent on elaborate systems, yet weak links can be left unrecognised - except by the housebreaker Good independent advice is scarce, as most security firms favour their own products. This book explains the pros and cons of alarm systems, including how to avoid faults, and find them if they occur. Friendly security' is particularly featured, and other security devices are given a critical scrutiny.

Explains simply and in straightforward language how to select and install systems
Describes range of security devices on offer
Explains pros and cons of alarm systems and how to avoid faults

Security Consulting (Paperback, 4th edition): Charles A. Sennewald Security Consulting (Paperback, 4th edition)
Charles A. Sennewald
R1,128 Discovery Miles 11 280 Ships in 12 - 17 working days

Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, at no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption -- which could bring any business to it's knees --has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in-depth security surveys so businesses will know exactly where security holes are present and where they need improvement to limit their exposure to various threats. The fourth edition of "Security Consulting" introduces security and law enforcement professionals to the career and business of security consulting. It provides new and potential consultants with the practical guidelines needed to start up and maintain a successful independent practice. Updated and expanded information is included on marketing, fees and expenses, forensic consulting, the use of computers, and the need for professional growth.Useful sample forms have been updated in addition tonew promotion opportunities and keys to conducting research on the Web.

- The only book of its kind dedicated to beginning a security consulting practice from the ground-up

- Proven, practical methods to establish and run a security consulting business

- Newchapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet

- The most up-to-date best practices from the IAPSC"

Background Screening and Investigations - Managing Hiring Risk from the HR and Security Perspectives (Paperback): W. Barry... Background Screening and Investigations - Managing Hiring Risk from the HR and Security Perspectives (Paperback)
W. Barry Nixon, Kim Kerr
R1,256 R1,182 Discovery Miles 11 820 Save R74 (6%) Ships in 12 - 17 working days

Hiring highly qualified people is crucial to every company, and Background Screening and Investigations is an essential guide to succeeding in a turbulent business environment. A crucial part of any hiring process should be employment background screening, pre- and post-hire, which gives hiring personnel a glimpse into a person's past behavior patterns, propensities, and likely future behavior.
Background Screening and Investigations describes all aspects of the employment background screening processes - its history and evolution, the imperative for implementing a screening process, and the creation of a comprehensive policy. Nixon and Kerr show how security and human resources professionals can work together to negotiate legal hurdles and make their background screening process successful.
* Where do HR and security perspectives differ on hot topics like hiring convicted felons, data protection, and sexual predators?
* What does state law allow when screening job candidates?
* How should companies deal with emerging issues like international background investigations and continuous (Infinity) screening of current employees?

Retail Crime, Security, and Loss Prevention - An Encyclopedic Reference (Hardcover): Charles A. Sennewald, John H. Christman Retail Crime, Security, and Loss Prevention - An Encyclopedic Reference (Hardcover)
Charles A. Sennewald, John H. Christman
R2,008 Discovery Miles 20 080 Ships in 12 - 17 working days

"Retail Crime, Security, and Loss Prevention" is destined to become the "go to" source of crime- and loss prevention- related information in the retail industry. Written and edited by two nationally recognized retail security experts and enhanced with 63 contributions by others who contribute expertise in specialized areas, this book provides over 150 definitions of loss prevention terms, and discusses topics ranging from accident investigations, counterfeit currency, emergency planning, and workplace violence to vendor frauds. No other single work contains such a wealth of retail security information.
The co-authors are Charles "Chuck" Sennewald, CSC, CPP former Director of Security at The Broadway Department Stores, a major division of Carter Hawley Hale Stores, Inc., founder of the IAPSC and author of numerous security industry books, and John Christman, CPP, former VP and Director of Security for Macy's West. They have put in one book a wealth of information, techniques, procedures and source material relative to retail crime and loss prevention which will prove an invaluable reference work for professionals at all levels within the industry.
* Tables, current industry figures, and statistics fully articulate the impact of loss prevention and theft in the retail setting
* Case examples from the authors' own experience illustrate real-world problems and connect theory to practice
* The most complete book available on retail security

High-Security Mechanical Locks - An Encyclopedic Reference (Hardcover): Graham Pulford High-Security Mechanical Locks - An Encyclopedic Reference (Hardcover)
Graham Pulford
R2,193 Discovery Miles 21 930 Ships in 12 - 17 working days

" High-Security Mechanical Locks " comprehensively surveys and explains the highly technical area of high security locks in a way that is accessible to a wide audience. Well over 100 different locks are presented, organized into 6 basic types. Each chapter introduces the necessary concepts in a historical perspective and further categorizes the locks. This is followed by detailed 'how it works' descriptions with many pictures, diagrams and references. The descriptions are based on actual dissections of the real locks.
The scope is limited to key operated mechanical locks, thus keyless combination locks and digital locks are not covered. The book does not deal with routine locksmithing topics such as installation and servicing of locks. The sensitive area of picking and bypassing of locks is dealt with only at a high level without giving detailed information that would be unacceptable in the wrong hands.
* Comprehensive coverage of over 100 different types of 19th and 20th century key-operated locks, unified in a simple classification scheme
* Detailed operating principles - clear 'how it works' descriptions
* Manipulation resistance rating for each lock on a scale of 1 to 5

Digital CCTV - A Security Professional's Guide (Hardcover): Emily M. Harwood Digital CCTV - A Security Professional's Guide (Hardcover)
Emily M. Harwood; Contributions by Alan Matchett
R1,462 Discovery Miles 14 620 Ships in 12 - 17 working days

The effects of digital technology on the security industry require constant vigilance by security distributors, sales staff, and installation professionals. Today and for the foreseeable future, all security professionals must have at least a basic understanding of digital technology. "Digital CCTV" addresses this new challenge.
Topics convered include compression variables such as Lossless and Lossy, which are explained by reviewing Huffman and Run Length Encoding (RLE), and by relating these forms of compression to ZIP and Stuffit, which are commonly used in personal computers. A review of JPEG, motion JPEG, MPEG and wavelet compression schemes among others, with a comparison of the merits of each, is also provided. As "Digital CCTV" traces the stream of digital video flow from the computer industry through compression, transmission, display and storage, and explains how analog video signal is converted into a digital signal, the reader will learn and understand the mysteries of digital science.
* Explains industry concepts, acronyms and buzzwords acurately and clearly
* Covers history, current complexities, and the future effects of digital science
*Provides practical information about how digital video works, how digital video is stored and transmitted, what digital systems can and cannot accomplish, and what to expect from digital video equipment in modern CCTV systems

Security Design Consulting - The Business Of System Security Design (Hardcover, New): Brian Gouin Security Design Consulting - The Business Of System Security Design (Hardcover, New)
Brian Gouin
R1,033 Discovery Miles 10 330 Ships in 12 - 17 working days

A crucial reference for the practicing or aspiring design consultant, "Security Design Consulting" brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, "Security Design Consulting" gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant's important and growing role in an overall security program.
* Focuses on consulting in security design, not security management
* Provides sample service agreements, specifications, and reports to use as models
* Emphasizes the highest technical and ethical standards for this increasingly crucial profession

Biometric Technologies and Verification Systems (Paperback): John Vacca Biometric Technologies and Verification Systems (Paperback)
John Vacca
R1,752 R1,627 Discovery Miles 16 270 Save R125 (7%) Ships in 12 - 17 working days

" Biometric Technologies and Verification Systems" is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
* Contains elements such as Sidebars, Tips, Notes and URL links
* Heavily illustrated with over 150 illustrations, screen captures, and photographs
* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover): Michael... Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover)
Michael Khairallah
R1,433 Discovery Miles 14 330 Ships in 12 - 17 working days

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent "How To" for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
* Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system.
* Builds upon well-known, widely adopted concepts prevalent among security professionals.
* Offers seasoned advice on the competitive biddingprocess as well as on legal issues involved in the selection of applied products.

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,295 R1,215 Discovery Miles 12 150 Save R80 (6%) Ships in 12 - 17 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program... The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program (Hardcover)
Gerald L. Kovacich, Edward Halibozek
R1,705 Discovery Miles 17 050 Ships in 12 - 17 working days

Kovacich and Halibozek offer you the benefit of more than 55 years of combined experience in government and corporate security. Throughout the book, the authors use a fictional global corporation as a model to provide continual real-world challenges and solutions. New and experienced managers alike will find a wealth of information and practical advice to help you develop strategic and tactical plans and manage your daily operations.
* Contains real case examples to illustrate practical application of concepts
* Thoroughly covers the integration of physical, computer and information security goals for complete security awareness
* A handy reference for managers to quickly find and implement the security solutions they need

CCTV for Security Professionals (Hardcover): Alan Matchett CCTV for Security Professionals (Hardcover)
Alan Matchett
R1,911 Discovery Miles 19 110 Ships in 12 - 17 working days

CCTV for Security Professionals provides the information necessary to design the ideal CCTV system. The chapters are stand-alone sources of information on their subjects and are presented in logical sequence to guide the reader from basic principles to more complex for a complete system understanding.
In his straight-forward and informative text, Alan Matchett approaches the camera systems from the user's point of view, providing the security manager with the knowledge to discuss the system, its desired features, and the areas of design concern within the context of an organization's business model. This can prove to be invaluable when evaluating an existing system, the use and components of a given system, or in evaluating a system design proposed by a vendor.
Installers and service personnel will benefit from the functions and possibilities that are available with the various components and by gaining an understanding of their customers' needs. Newer technicians will learn how to set up the system properly, and can familiarize themselves with the technologies that go into a CCTV system.
Security equipment sales personnel will also gain a better knowledge of the customer's needs as well as learn to determine exactly what questions they should be asking the customer and what the customer's responses mean. In this manner, the book will offer invaluable tips to ensure customers get exactly what they expect in a system.
* Provides a detailed explanation of CCTV components and the technology behind analog and digital CCTV systems.
* Establishes a "common language" for security professionals, CCTV system designers and sales personnel to use as a basis for system design.
* Provides a clear explanation of the design process and design principles.

Criminal Investigation - Law and Practice (Paperback, 2nd edition): Michael F. Brown Criminal Investigation - Law and Practice (Paperback, 2nd edition)
Michael F. Brown
R1,823 Discovery Miles 18 230 Ships in 12 - 17 working days

This textbook provides students and law enforcement officers with the fundamentals of the criminal investigation process, from arrival on the scene to trial procedures. Written in a clear and simple style, Criminal Investigation: Law and Practice surpasses traditional texts by presenting a unique combination of legal, technical, and procedural aspects of the criminal investigation. The hands-on approach taken by the author helps to increase the learning experience.
Criminal Investigation: Law and Practice, Second Edition, has been written to provide future law enforcement officers with a basic understanding of the investigative process. It merges two areas that are crucial to the successful completion of an investigation: the law, both criminal and procedural, and criminal investigative techniques. It is writen to provide the student investigator with the information needed to complete and investigation that can result in a successful prosecution.
- comprehensive coverage of the criminal investigation, from arrival on the scene to trial procedures
-unique combination of legal, technical, and procedural aspects of criminal investigation
-many updated cases, many personally experienced by the author.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Physical Security 150 Things You Should…
Lawrence Fennelly, Louis Tyska Paperback R1,491 R1,388 Discovery Miles 13 880
Public Safety and Security…
P J. Ortmeier Paperback R1,468 Discovery Miles 14 680
Model Security Policies, Plans and…
John Fay Paperback R1,857 R1,718 Discovery Miles 17 180
Investigations 150 Things You Should…
Lawrence Fennelly, Louis Tyska Paperback R1,149 R1,084 Discovery Miles 10 840
Risk Management for Security…
Carl Roper Hardcover R1,899 Discovery Miles 18 990
FINDsomeone.com
R.Scott Grasser Paperback R1,197 R1,125 Discovery Miles 11 250
Private Security Law - Case Studies
David Maxwell Hardcover R1,399 Discovery Miles 13 990
Design and Evaluation of Physical…
Mary Lynn Garcia Paperback R1,573 Discovery Miles 15 730
Introduction to Security
Robert Fischer, Edward Halibozek, … Hardcover R1,633 Discovery Miles 16 330
Handbook of Loss Prevention and Crime…
Lawrence Fennelly Hardcover R1,996 Discovery Miles 19 960

 

Partners