Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Academic & Education > Professional & Technical > Security
The sixth edition of "Security and Loss Prevention "continues the tradition of providing introductory and advanced coverage of the body of knowledge of the security profession. To bridge theory to practice is the book s backbone, and Philip Purpura continues this strong effort with new sidebars and text boxes presenting actual security challenges from real-life situations. Globally recognized and on the ASIS International Certified
Protection Professional reading list, thesixth edition of "Security
and Loss Prevention"enhances its position in the market as a
comprehensive, interdisciplinary, and up-to-date treatment of the
area, connecting the public and private sector and the worlds of
physical security and technological security. Purpura once again
demonstrates why students and professionals alike rely on this
best-selling text as a timely, reliable resource encompassing the
breadth and depth of considerations involved when implementing
general loss prevention concepts and security programs within an
organization.
Investigative Data Mining for Security and Criminal Detection is
the first book to outline how data mining technologies can be used
to combat crime in the 21st century. It introduces security
managers, law enforcement investigators, counter-intelligence
agents, fraud specialists, and information security analysts to the
latest data mining techniques and shows how they can be used as
investigative tools. Readers will learn how to search public and
private databases and networks to flag potential security threats
and root out criminal activities even before they occur. Key Features:
"Effective Physical Security, " Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors work that set the standard: "Handbook of Loss Prevention and Crime Prevention, " Fifth Edition. Designed for easy reference, "Effective Physical Security"
contains important coverage of environmental design, security
surveys, locks, lighting, and CCTV as well as new chapters covering
the latest in the ISO standards for Risk Assessmentand Risk
Management, physical security planning, network systems
infrastructure, and environmental design. This new edition
continues to serve as a valuable reference for experienced security
practitioners as well as students in undergraduate and graduate
security programs.
This textbook offers a technical, architectural, and management
approach to solving the problems of protecting national
infrastructure and includes practical and empirically-based
guidance for students wishing to become security engineers, network
operators, software designers, technology managers, application
developers, Chief Security Officers, etc.. This approach includes
controversial themes such as the deliberate use of deception to
trap intruders. In short, it serves as an attractive framework for
a new national strategy for cyber security. Each principle is
presented as a separate security strategy, along with pages of
compelling examples that demonstrate use of the principle. A
specific set of criteria requirements allows students to understand
how any organization, such as a government agency, integrates the
principles into their local environment. The STUDENT EDITION
features several case studies illustrating actual implementation
scenarios of the principals and requirements discussed in the text.
It also includes helpful pedagogical elements such as chapter
outlines, chapter summaries, learning checklists, and a 2-color
interior. And it boasts a new and complete instructor ancillary
package including test bank, IM, Ppt slides, case study questions,
and more. Provides case studies focusing on cyber security challenges and solutions to display how theory, research, and methods, apply to real-life challenges Utilizes, end-of-chapter case problems that take chapter content and relate it to real security situations and issues Includes instructor slides for each chapter as well as an instructor s manual with sample syllabi and test bank"
"Private Security and the Law, 4th Edition," is a unique
resource that provides analysis of practices in the security
industry as they relate to law, regulation, licensure, and
constitutional questions of case and statutory authority.This
bookdescribes the legal requirements facedin the area of private
security.It emphasizes the liability problems common to security
operations, including negligence and tortious liability, civil
actions frequently litigated, and strategies to avoid legal actions
that affect business efficiency.The textalso examines the
constitutional and due-process dimensions of private security both
domestically and internationally, including recent cases and trends
that will set pace for future private security laws and
regulations. As private security becomes more closely involved in
national and international security, cases like Blackwater are
examined. Charles Nemeth takesyou step by step through the analysis
of case law as it applies to situations commonly faced in the
private security practice, providing a solid introduction to the
legal and ethical standards that shape the industry. *Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"
This brand new edition of "Death Penalty Cases" makes the most
manageable comprehensive resource on the death penalty even better.
It includes the most recent cases, including Kennedy v. Louisiana,
prohibiting the death penalty for child rapists, and Baze v. Rees,
upholding execution by lethal injection. In addition, all of the
cases are now topically organized into five sections: * The
Foundational Cases * Death-Eligibility: Which persons/crimes are
fit for the death penalty? * The Death Penalty Trial *
Post-conviction Review * Execution Issues The introductory essays
on the history, administration, and controversies surrounding
capital punishment have been thoroughly revised. The statistical
appendix has been brought up-to-date, and the statutory appendixhas
beenrestructured. For clarity, accuracy, complete impartiality and
comprehensiveness, there simply is no better resource on capital
punishment available. * Provides the most recent case material--no need to supplement. * Topical organization of cases provides a more logical organization for structuring a course. * Co-authors with different perspectives on the death penalty assures complete impartiality of the material. * Provides the necessary historical background, a clear explanation of the current capital case process, and an impartial description of the controversies surrounding the death penalty * Provides the latest statistics relevant to discussions on the death penalty. * Clearly explains the different ways in which the states process death penalty cases, with excerpts of the most relevant statutes."
No nation - especially the United States - has a coherent
technical and architectural strategy for preventing cyber attack
from crippling essential critical infrastructure services. This
book initiates an intelligent national (and international) dialogue
amongst the general technical community around proper methods for
reducing national risk. This includes controversial themes such as
the deliberate use of deception to trap intruders. It also serves
as an attractive framework for a new national strategy for cyber
security, something that several Presidential administrations have
failed in attempting to create. In addition, nations other than the
US might choose to adopt the framework as well Amoroso offers a
technical, architectural, and management solution to the problem of
protecting national infrastructure. This includes practical and
empirically-based guidance for security engineers, network
operators, software designers, technology managers, application
developers, and even those who simply use computing technology in
their work or home. Each principle is presented as a separate
security strategy, along with pages of compelling examples that
demonstrate use of the principle. A specific set of criteria
requirements allows any organization, such as a government agency,
to integrate the principles into their local environment. This book
takes the national debate on protecting critical infrastructure in
an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.
"Contemporary Security Management, 3rd Edition "teaches security
professionals how to operate an efficient security department and
how to integrate smoothly with other groups inside and outside
their own organizations. Fay demonstrates the specifics of security
management: * how to organize, plan, develop and manage a security
operation. * how to identify vulnerabilities. * how to determine
the protective resources required to offset threats. * how to
implement all necessary physical and IT security measures. Security
professionals share the responsibility for mitigating damage,
serving as a resource to an Emergency Tactical Center, assisting
the return of business continuity, and liaising with local response
agencies such as police and fire departments, emergency medical
responders, and emergency warning centers. At the organizational
level, the book addresses budgeting, employee performance,
counseling, hiring and termination, employee theft and other
misconduct, and offers sound advice on building constructive
relationships with organizational peers and company
management.
Most employeers are astounded at how easily and quickly their
proprietary information can get out of their control. In a large
number of cases, theft of trade secrets often involves employees
leaving a company to start their own business or work for a direct
competitor.
The need to professionally and successfully conduct computer
forensic investigations of incidents and crimes has never been
greater. This has caused an increased requirement for information
about the creation and management of computer forensic laboratories
and the investigations themselves. This includes a great need for
information on how to cost-effectively establish and manage a
computer forensics laboratory. This book meets that need: a clearly
written, non-technical book on the topic of computer forensics with
emphasis on the establishment and management of a computer
forensics laboratory and its subsequent support to successfully
conducting computer-related crime investigations.
"High-Rise Security and Fire Life Safety, 3e, " is a comprehensive
reference for managing security and fire life safety operations
within high-rise buildings. It spells out the unique
characteristics of skyscrapers from a security and fire life safety
perspective, details the type of security and life safety systems
commonly found in them, outlines how to conduct risk assessments,
and explains security policies and procedures designed to protect
life and property. Craighead also provides guidelines for managing
security and life safety functions, including the development of
response plans for building emergencies. This latest edition
clearly separates out the different types of skyscrapers, from
office buildings to hotels to condominiums to mixed-use buildings,
and explains how different patterns of use and types of tenancy
impact building security and life safety. New to this edition: Differentiates security and fire life safety issues specific to: Office towers Hotels Residential and apartment buildings Mixed-use buildings Updated fire and life safety standards and guidelines Includes a CD-ROM with electronic versions of sample survey checklists, a sample building emergency management plan, and other security and fire life safety resources.
In the latest edition, Philip Walker not only tackles the
electronic aspect of the design of a security system, but also
examines the human factor in such systems. In his own words:
'Electronic aids are added to enable security officers to do their
jobs better, but not to do their jobs for them'.
As crime rates soar every householder looks at ways to protect
their home and its contents. This practical guide, in
straightforward language, spells out the simple steps you can take
to guard your home. It shows how burglars work, and how to thwart
them. The selection and installation of alarm systems are described
simply. This handy volume may provide the information you need to
avoid costly and upsetting break-ins.
Since 9/11, business and industry has paid close attention to
security within their own organizations. In fact, at no other time
in modern history has business and industry been more concerned
with security issues. A new concern for security measures to combat
potential terrorism, sabotage, theft and disruption -- which could
bring any business to it's knees --has swept the nation. This has
opened up a huge opportunity for private investigators and security
professionals as consultants. Many retiring law enforcement and
security management professionals look to enter the private
security consulting market. Security consulting often involves
conducting in-depth security surveys so businesses will know
exactly where security holes are present and where they need
improvement to limit their exposure to various threats. The fourth
edition of "Security Consulting" introduces security and law
enforcement professionals to the career and business of security
consulting. It provides new and potential consultants with the
practical guidelines needed to start up and maintain a successful
independent practice. Updated and expanded information is included
on marketing, fees and expenses, forensic consulting, the use of
computers, and the need for professional growth.Useful sample forms
have been updated in addition tonew promotion opportunities and
keys to conducting research on the Web. - The only book of its kind dedicated to beginning a security consulting practice from the ground-up - Proven, practical methods to establish and run a security consulting business - Newchapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet - The most up-to-date best practices from the IAPSC"
Hiring highly qualified people is crucial to every company, and
Background Screening and Investigations is an essential guide to
succeeding in a turbulent business environment. A crucial part of
any hiring process should be employment background screening, pre-
and post-hire, which gives hiring personnel a glimpse into a
person's past behavior patterns, propensities, and likely future
behavior.
"Retail Crime, Security, and Loss Prevention" is destined to become
the "go to" source of crime- and loss prevention- related
information in the retail industry. Written and edited by two
nationally recognized retail security experts and enhanced with 63
contributions by others who contribute expertise in specialized
areas, this book provides over 150 definitions of loss prevention
terms, and discusses topics ranging from accident investigations,
counterfeit currency, emergency planning, and workplace violence to
vendor frauds. No other single work contains such a wealth of
retail security information.
" High-Security Mechanical Locks " comprehensively surveys and
explains the highly technical area of high security locks in a way
that is accessible to a wide audience. Well over 100 different
locks are presented, organized into 6 basic types. Each chapter
introduces the necessary concepts in a historical perspective and
further categorizes the locks. This is followed by detailed 'how it
works' descriptions with many pictures, diagrams and references.
The descriptions are based on actual dissections of the real locks.
The effects of digital technology on the security industry require
constant vigilance by security distributors, sales staff, and
installation professionals. Today and for the foreseeable future,
all security professionals must have at least a basic understanding
of digital technology. "Digital CCTV" addresses this new challenge.
A crucial reference for the practicing or aspiring design
consultant, "Security Design Consulting" brings you step by step
through the process of becoming a security consultant, describing
how to start the business, market services, write proposals,
determine fees, and write a report. Specific elements of
assessment, design and project management services as well as
acquiring product and industry knowledge are all covered in detail.
Concentrating on client-focused marketing and sales strategies as
well as the crucial elements of preparing, running, and succeeding
at the security consulting business, "Security Design Consulting"
gives the reader a working knowledge of all the steps necessary to
be a successful security design consultant and a smarter business
owner. Security directors, architects and security management
consultants will also find this reference invaluable in
understanding the security design consultant's important and
growing role in an overall security program.
" Biometric Technologies and Verification Systems" is organized
into nine parts composed of 30 chapters, including an extensive
glossary of biometric terms and acronyms. It discusses the current
state-of-the-art in biometric verification/authentication,
identification and system design principles. It also provides a
step-by-step discussion of how biometrics works; how biometric data
in human beings can be collected and analyzed in a number of ways;
how biometrics are currently being used as a method of personal
identification in which people are recognized by their own unique
corporal or behavioral characteristics; and how to create detailed
menus for designing a biometric verification system.
A practical reference written to assist the security professional
in clearly identifying what systems are required to meet security
needs as defined by a threat analysis and vulnerability assessment.
All of the elements necessary to conduct a detailed survey of a
facility and the methods used to document the findings of that
survey are covered. Once the required systems are determined, the
chapters following present how to assemble and evaluate bids for
the acquisition of the required systems in a manner that will meet
the most rigorous standards established for competitive bidding.
The book also provides recommended approaches for system/user
implementation, giving checklists and examples for developing
management controls using the installed systems. This book was
developed after a careful examination of the approved reference
material available from the American Society for Industrial
Security (ASIS International) for the certification of Physical
Security Professionals (PSP). It is intended to fill voids left by
the currently approved reference material to perform implementation
of systems suggested in the existing reference texts. This book is
an excellent "How To" for the aspiring security professional who
wishes to take on the responsibilities of security system
implementation, or the security manager who wants to do a
professional job of system acquisition without hiring a
professional consultant.
Trojans, Worms, and Spyware provides practical, easy to understand,
and readily usable advice to help organizations to improve their
security and reduce the possible risks of malicious code attacks.
Despite the global downturn, information systems security remains
one of the more in-demand professions in the world today. With the
widespread use of the Internet as a business tool, more emphasis is
being placed on information security than ever before. To
successfully deal with this increase in dependence and the ever
growing threat of virus and worm attacks, Information security and
information assurance (IA) professionals need a jargon-free book
that addresses the practical aspects of meeting new security
requirements.
Kovacich and Halibozek offer you the benefit of more than 55 years
of combined experience in government and corporate security.
Throughout the book, the authors use a fictional global corporation
as a model to provide continual real-world challenges and
solutions. New and experienced managers alike will find a wealth of
information and practical advice to help you develop strategic and
tactical plans and manage your daily operations.
CCTV for Security Professionals provides the information necessary
to design the ideal CCTV system. The chapters are stand-alone
sources of information on their subjects and are presented in
logical sequence to guide the reader from basic principles to more
complex for a complete system understanding.
This textbook provides students and law enforcement officers with
the fundamentals of the criminal investigation process, from
arrival on the scene to trial procedures. Written in a clear and
simple style, Criminal Investigation: Law and Practice surpasses
traditional texts by presenting a unique combination of legal,
technical, and procedural aspects of the criminal investigation.
The hands-on approach taken by the author helps to increase the
learning experience. |
You may like...
Physical Security 150 Things You Should…
Lawrence Fennelly, Louis Tyska
Paperback
Investigations 150 Things You Should…
Lawrence Fennelly, Louis Tyska
Paperback
Introduction to Security
Robert Fischer, Edward Halibozek, …
Hardcover
R1,633
Discovery Miles 16 330
|