![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Academic & Education > Professional & Technical > Security
"Private Security and the Law, 4th Edition," is a unique
resource that provides analysis of practices in the security
industry as they relate to law, regulation, licensure, and
constitutional questions of case and statutory authority.This
bookdescribes the legal requirements facedin the area of private
security.It emphasizes the liability problems common to security
operations, including negligence and tortious liability, civil
actions frequently litigated, and strategies to avoid legal actions
that affect business efficiency.The textalso examines the
constitutional and due-process dimensions of private security both
domestically and internationally, including recent cases and trends
that will set pace for future private security laws and
regulations. As private security becomes more closely involved in
national and international security, cases like Blackwater are
examined. Charles Nemeth takesyou step by step through the analysis
of case law as it applies to situations commonly faced in the
private security practice, providing a solid introduction to the
legal and ethical standards that shape the industry. *Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"
With half of all new businesses failing in the first two years,
every aspect of good business planning must be considered, but loss
prevention is very often overlooked. Most small business owners
grapple with the day to day challenges of sales and marketing,
never realizing that the shadow of shrinkage is expanding daily,
waiting to reveal itself in the annual inventory results. Ravaged
by theft and paperwork losses, the already tight profit margin can
shrink into oblivion. Loss Prevention and the Small Business opens
the eyes of the reader to the reality of shrinkage in all its
guises including shoplifting, fraud, and embezzlement. Armed with
this awareness, the security specialist or owner/manager can
utilize the many strategies to both inhibit losses and aggressively
pursue those persons and processes that cause losses.
No nation - especially the United States - has a coherent
technical and architectural strategy for preventing cyber attack
from crippling essential critical infrastructure services. This
book initiates an intelligent national (and international) dialogue
amongst the general technical community around proper methods for
reducing national risk. This includes controversial themes such as
the deliberate use of deception to trap intruders. It also serves
as an attractive framework for a new national strategy for cyber
security, something that several Presidential administrations have
failed in attempting to create. In addition, nations other than the
US might choose to adopt the framework as well Amoroso offers a
technical, architectural, and management solution to the problem of
protecting national infrastructure. This includes practical and
empirically-based guidance for security engineers, network
operators, software designers, technology managers, application
developers, and even those who simply use computing technology in
their work or home. Each principle is presented as a separate
security strategy, along with pages of compelling examples that
demonstrate use of the principle. A specific set of criteria
requirements allows any organization, such as a government agency,
to integrate the principles into their local environment. This book
takes the national debate on protecting critical infrastructure in
an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.
This brand new edition of "Death Penalty Cases" makes the most
manageable comprehensive resource on the death penalty even better.
It includes the most recent cases, including Kennedy v. Louisiana,
prohibiting the death penalty for child rapists, and Baze v. Rees,
upholding execution by lethal injection. In addition, all of the
cases are now topically organized into five sections: * The
Foundational Cases * Death-Eligibility: Which persons/crimes are
fit for the death penalty? * The Death Penalty Trial *
Post-conviction Review * Execution Issues The introductory essays
on the history, administration, and controversies surrounding
capital punishment have been thoroughly revised. The statistical
appendix has been brought up-to-date, and the statutory appendixhas
beenrestructured. For clarity, accuracy, complete impartiality and
comprehensiveness, there simply is no better resource on capital
punishment available. * Provides the most recent case material--no need to supplement. * Topical organization of cases provides a more logical organization for structuring a course. * Co-authors with different perspectives on the death penalty assures complete impartiality of the material. * Provides the necessary historical background, a clear explanation of the current capital case process, and an impartial description of the controversies surrounding the death penalty * Provides the latest statistics relevant to discussions on the death penalty. * Clearly explains the different ways in which the states process death penalty cases, with excerpts of the most relevant statutes."
"Contemporary Security Management, 3rd Edition "teaches security
professionals how to operate an efficient security department and
how to integrate smoothly with other groups inside and outside
their own organizations. Fay demonstrates the specifics of security
management: * how to organize, plan, develop and manage a security
operation. * how to identify vulnerabilities. * how to determine
the protective resources required to offset threats. * how to
implement all necessary physical and IT security measures. Security
professionals share the responsibility for mitigating damage,
serving as a resource to an Emergency Tactical Center, assisting
the return of business continuity, and liaising with local response
agencies such as police and fire departments, emergency medical
responders, and emergency warning centers. At the organizational
level, the book addresses budgeting, employee performance,
counseling, hiring and termination, employee theft and other
misconduct, and offers sound advice on building constructive
relationships with organizational peers and company
management.
The late 1990s mark a turning point for correctional systems in the
United States. For some time, there has been an intensive effort by
corrections to gain the confidence of the public. With increased
urbanization, more timely electronic news media reports, and
renewed emphasis on human rights, corrections has more and more
become the target of a wide variety of attacks. To combat this
backlash, correctional agencies have devised a plan that has worked
very well for law enforcement, a plan best summed up by a single
word: professionalization. This movement has been led by an
articulate and tactful group of correctional officials who have
stressed a new ideology of the correctional officer occupation.
Practical Security Training is designed to help security
departments develop effective security forces from the personnel
screening and selection process to ensuring that proper,
cost-efficient training is conducted. Using the building block and
progressive method approach allows security staff to become
increasingly more effective and more confident. Flexible and
practicle, these tools allow security practitioners to adapt them
as needed in different environments.
This book begins by laying out a history of espionage that clearly
shows that when a new technology or technique becomes available to
the information gatherers in public and private sectors, they can
quickly be adopted for Netspionage use. It then moves on to
describe how the Internet and associated technologies have already
revolutionized the collection and analysis of competitive
information. The convergence of dependency on networked and
exploitation tools (often propagated by "hackers," "cyberpunks,"
and even intelligence agencies) has already resulted in several
incidents that foreshadow the perilous future. Close study of these
incidents demonstrates how difficult yet how important it is to
confront the challenges of "netspionage" and its less intrusive
cousins. The authors present a set of the known incidents and then
outline protective measures that will reduce the potential and
consequences of netspionage.
Most employeers are astounded at how easily and quickly their
proprietary information can get out of their control. In a large
number of cases, theft of trade secrets often involves employees
leaving a company to start their own business or work for a direct
competitor.
Internal loss is one of the most costly forms of loss. Embezzlement
is one of the least detected and prosecuted forms of internal
theft. Preventing Corporate Embezzlement is a professional
reference that offers solutions. Managers, auditors and others
charged with protecting assets must achieve a heightened awareness
of embezzlement. They need to recognize and understand the
opportunities, methods, and varieties of embezzlement, as well as
establish internal controls that will prevent and detect
embezzlement.
Intruder Alarms provides a definitive and fully up-to-date guide to
the specification, systems design, integration, installation and
maintenance of intruder alarm systems. It has been written to be
the essential handbook for installation engineers and security
professionals working in this rapidly expanding and developing
area.
Security Investigations is a comprehensive book that covers the
full spectrum of investigative issues. It contains practical
self-evaluation exercises that can be applied in both a formal or
informal training environment. Corporate security supervisors will
find it helpful in establishing policies and procedures for
conducting investigations. It is a guide also for those responsible
for the security function without prior experience. ie. Director of
Human Resources. Forms in the book will assist an organization in
standardizing the means to conduct investigations as well as
reporting the outcome in a way that ensures that nothing was missed
during the investigation. The real worth of an investigator is
their ability to adapt to ever changing circumstances. This text
gives the investigator a quick reference manual that can be used
to: develop the investigation plan, take effective and accurate
field notes, conduct an interview, perform surveillance and finally
write the report, all within the legal guidelines outlined in the
book. As an additional bonus to the reader, the book will include
information on how to select and use the proper surveillance
equipment.
The idea of espionage has always carried a certain mystique, having
grown its roots in the political and national defense spheres.
Today, espionage must be taken seriously in the business arena as
well. Having company secrets stolen by competitors is costly and
can be lethal. Counterespionage for American Business is a how-to
manual for security professionals that teaches secret methods
counterespionage experts have been using for years to protect
business information
The Security Handbook, Second Edition is a user-friendly guide for
security officers and guards, covering everything from introductory
information to advanced topics. Whether looking for entry into the
profession or development within the security industry, this book
offers the practical information, training, and need-to-know
techniques for the realization of professional goals.
The high-technology crime investigator's profession is one of the
fastest growing professions in the world today, as information
security issues and crimes related to them are growing in number
and magnitude at an ever-increasing pace. "High-Technology Crime
Investigator's Handbook, Second Edition," informs professionals of
the potential risks of computer crimes, and serves as a guide to
establishing and managing a high-technology crime investigative
program. Each chapter is updated with the latest information and
guidance, including added coverage of computer forensics and
additional metrics to measure organizational performance. In
addition, nine new chapters cover emerging trends in the field, and
offer invaluable guidance on becoming a successful high-technology
crime investigator.
Criminology and Criminal Justice describes and discusses
criminology and criminal justice as social foci and as academic
disciplines. Its comparative and contrasting nature allows readers
to gain a better understanding of both topics as separate entities,
but also how they are more intertwined than most might recognize.
The book covers the most important aspects of these disciplines,
beginning with laying the groundwork of nature and content and
ending with a look into the future. At the book's conclusion, the
reader should better understand the similarities and differences of
the two, as well as recognize their singularly distinctive traits.
Discussion questions are included at the end of each chapter to
facilitate critical thinking.
Premises Security: A Guide for Attorneys and Security Professionals
guides the security professional through the ins and outs of
premises security liability. Premises security litigation claims
represent a serious financial threat to owners and occupiers of
property. This book provides an overview of risk assessment
techniques, identification of reasonable security measures, legal
issues and litigation strategies.
Written by two INFOSEC experts, this book provides a systematic and
practical approach for establishing, managing and operating a
comprehensive Information Assurance program. It is designed to
provide ISSO managers, security managers, and INFOSEC professionals
with an understanding of the essential issues required to develop
and apply a targeted information security posture to both public
and private corporations and government run agencies. The authors lay out a detailed strategy for defining information
security, establishing IA goals, providing training for security
awareness, and conducting airtight incident response to system
compromise. Such topics as defense in depth, configuration
management, IA legal issues, and the importance of establishing an
IT baseline are covered in-depth from an organizational and
managerial decision-making perspective.
I-Way Robbery is for security, investigative, law enforcement, and
other criminal justice professionals, offering a unique look at the
Internet as the new crime environment for the 21st century. The
book provides an overview of the Internet, its impact on nations,
societies, criminals, security officers, and law enforcement
professionals, and includes recommended basic, protective measures.
I-Way Robbery: Crime on the Internet, uniquely approaches the
much talked about topic of Internet Crime and security. It is
written for anyone who wants a basic understanding of the Internet
crime environment now and into the 21st Century. It covers related
Internet business, government, global, laws, politics and privacy
issues; techniques being used to commit crimes; what can be done
about it; and what challenges the future may hold including topics
such as information warfare.
This unique and comprehensive reference for security professionals
will teach self-defense tactics and the legality of using them in
various circumstances
Understanding Crime Prevention, Second Edition is a revamping of a
popular classic written by NCPI, the primary training school for
crime prevention officers in the country. It is a basic
introduction to the concepts of crime prevention and security
techniques and equipment which aid the crime prevention effort. The
fundamental material has been updated with current and contemporary
examples.
Women in Public and Private Law Enforcement is hands-down the most
comprehensive examination of women in law enforcement to date. Most
importantly, it fills the current void that exists for texts on
this important and growing area of law enforcement. Both public and
private sector law enforcement are covered including policing and
private security. For policing this includes not only municipal
policing, but also state and federal law enforcement. For the
security industry, coverage includes not only private security
guards but also various other occupations that may be included
under private security such as protection specialists. The book's primary focus is on gender with limited attention
paid to race and ethnicity. Some comparisons are made when
appropriate, but the ultimate goal is to provide the reader the
most comprehensive analysis with respect to gender. Finally, the
authors provide women in law enforcement today with detailed
analysis and description of how far they have come, the struggles
they have faced, the challenges they have overcome, and the
achievements they have made.
In reaction to the continually changing business climate companies
develop many business strategies to increase their competitiveness
and improve profitability. Companies regularly reshape themselves
continually exploring new markets and developing new products. When
they can't expand into new markets or develop new products on their
own, they seek alternatives. These alternatives include merging
with or acquiring other companies to create a single more capable
company. Companies acquire other companies for a wide variety of
reasons. In some cases company survival may actually be the reason.
What does this condition mean to the security professional? In the
course of mergers and acquisitions, security plays a vital role in
helping to make the endeavor successful. There are numerous titles
on the business aspects of M&A such as the ones listed below.
However, this unique book focuses on the role security plays in
helping to make a merger, acquisition or divestiture successful. It
addresses the fundamental security elements that are required to
support the effort. In addition, it provides an integrated "how to"
approach to implementing M&A security complete with methods and
processes that have been quickly and cost-effectively implemented.
The classic book "The Art of War" (or as it is sometimes
translated, "The Art of Strategy") by Sun Tzu is often used to
illustrate principles that can apply to the management of business
environments. "The Art of War for Security Managers" is the first
book to apply the time-honored principles of Sun Tzu's theories of
conflict to contemporary organizational security.
Vulnerability Assessment of Physical Protection Systems will
describe the entire vulnerability assessment (VA) process, from the
start of planning through final analysis and out brief to senior
management. The text will draw heavily on the principles introduced
in the author's best-selling Design and Evaluation of Physical
Protection Systems and allow readers to apply those principles and
conduct a VA that is aligned with system objectives and achievable
with existing budget and personnel resources. The book will address
the full spectrum of a VA, including negotiating tasks with the
customer, project management and planning of the VA, team
membership, step-by-step details for performing the VA, data
collection and analysis, important notes on how to use the VA to
suggest design improvements and generate multiple design options.
The text will end with a discussion of how to out brief the results
to senior management in order to gain their support and demonstrate
the return on investment of their security dollar. Several new
tools will be introduced to help readers organize and use the
information at their sites and allow them to mix the physical
protection system with other risk management measures to reduce
risk to an acceptable level at an affordable cost and with the
least operational impact. |
You may like...
Background Screening and Investigations…
W. Barry Nixon, Kim Kerr
Paperback
R1,158
Discovery Miles 11 580
Security Education, Awareness and…
Carl Roper, Dr Lynn Fischer, …
Paperback
R1,325
Discovery Miles 13 250
Retail Crime, Security, and Loss…
Charles A. Sennewald, John H. Christman
Hardcover
R1,953
Discovery Miles 19 530
|