0
Your cart

Your cart is empty

Browse All Departments
Price
  • R500+ (61)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Security

Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition): Philip Walker Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition)
Philip Walker
R1,992 Discovery Miles 19 920 Ships in 10 - 15 working days

In the latest edition, Philip Walker not only tackles the electronic aspect of the design of a security system, but also examines the human factor in such systems. In his own words: 'Electronic aids are added to enable security officers to do their jobs better, but not to do their jobs for them'.
Today, with the escalation of crime and growing concerns for security, there has been a great increase in the number of electronic security systems. Unfortunately, despite improvements in reliability in terms of equipment manufacture, false alarms do still occur, and they waste a large amount of police time; approximately ninety out of one hundred alarms investigated by the police are false. In the light of this, the new edition of Electronic Security Systems couldn't come at a better time, as it deals extensively with methods of reducing false alarms, allowing the police to concentrate on real breeches of security, and thus ultimately to reduce crime.
The extensive and unusual combination of experience that Philip Walker has in the world of electronics, communications and as a security consulting engineer makes him eminently qualified to tackle such subjects.
At only 30, this hardback book is an essential addition to your security collection. It has 320 pages packed with advice and technical knowledge, 40 photographs and 25 line diagrams and a good index.

Comprehensive coverage of electronic security systems
Written by an experienced security professional
Fully updated to examine new equipment with extensive help on avoiding false alarms"

Home Security - Alarms, Sensors and Systems (Paperback, 2nd edition): Vivian Capel Home Security - Alarms, Sensors and Systems (Paperback, 2nd edition)
Vivian Capel
R1,286 Discovery Miles 12 860 Ships in 10 - 15 working days

As crime rates soar every householder looks at ways to protect their home and its contents. This practical guide, in straightforward language, spells out the simple steps you can take to guard your home. It shows how burglars work, and how to thwart them. The selection and installation of alarm systems are described simply. This handy volume may provide the information you need to avoid costly and upsetting break-ins.
As well as describing the bewildering range of security devices on offer, more technical readers may consider their own solutions using descriptions and circuits for two simple tested designs are given, one for the home and one for a foolproof public hall system.
There is a plethora of security devices now on offer. Large sums can be spent on elaborate systems, yet weak links can be left unrecognised - except by the housebreaker Good independent advice is scarce, as most security firms favour their own products. This book explains the pros and cons of alarm systems, including how to avoid faults, and find them if they occur. Friendly security' is particularly featured, and other security devices are given a critical scrutiny.

Explains simply and in straightforward language how to select and install systems
Describes range of security devices on offer
Explains pros and cons of alarm systems and how to avoid faults

The Art of War for Security Managers - 10 Steps to Enhancing Organizational Effectiveness (Paperback, New): Scott Watson The Art of War for Security Managers - 10 Steps to Enhancing Organizational Effectiveness (Paperback, New)
Scott Watson
R940 Discovery Miles 9 400 Ships in 10 - 15 working days

The classic book "The Art of War" (or as it is sometimes translated, "The Art of Strategy") by Sun Tzu is often used to illustrate principles that can apply to the management of business environments. "The Art of War for Security Managers" is the first book to apply the time-honored principles of Sun Tzu's theories of conflict to contemporary organizational security.
Corporate leaders have a responsibility to make rational choices that maximize return on investment. The author posits that while conflict is inevitable, it need not be costly. The result is an efficient framework for understanding and dealing with conflict while minimizing costly protracted battles, focusing specifically on the crucial tasks a security manager must carry out in a 21st century organization.
* Includes an appendix with job aids the security manager can use in day-to-day workplace situations
* Provides readers with a framework for adapting Sun Tzu's theories of conflict within their own organizations
* From an author who routinely packs the room at his conference presentations

Vulnerability Assessment of Physical Protection Systems (Paperback): Mary Lynn Garcia Vulnerability Assessment of Physical Protection Systems (Paperback)
Mary Lynn Garcia
R1,409 Discovery Miles 14 090 Ships in 10 - 15 working days

Vulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allow readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The book will address the full spectrum of a VA, including negotiating tasks with the customer, project management and planning of the VA, team membership, step-by-step details for performing the VA, data collection and analysis, important notes on how to use the VA to suggest design improvements and generate multiple design options. The text will end with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools will be introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact.
- Guides the reader through the topic of physical security doing so with a unique, detailed and scientific approach
- Takes the reader from beginning to end and step-by-step through a Vulnerability Assessment
- Over 150 figures and tables to illustrate key concepts

Security Education, Awareness and Training - SEAT from Theory to Practice (Paperback, New): Carl Roper, Dr Lynn Fischer, Joseph... Security Education, Awareness and Training - SEAT from Theory to Practice (Paperback, New)
Carl Roper, Dr Lynn Fischer, Joseph A. Grau
R1,325 Discovery Miles 13 250 Ships in 10 - 15 working days

This book is the only one available on security training for all level of personnel. Chief Security Officers (CSOs), security managers, and heads of security forces often have to design training programs themselves from scratch or rely on outside vendors and outside training companies to provide training which is often dry, stilted, and not always applicable to a specific corporate or government setting. This title addresses the theories of sound security training and awareness, then shows the reader how to put the theories into practice when developing or presenting any form of security education, training, motivation or awareness.
* Shows how to establish and integrate a structured, internally consistent and coherent program from the ground up
* Illustrates how to assess and analyze security program needs and audience and customize training accordingly
* Numerous Appendices to help the security manager justify security spending on training initiatives

FINDsomeone.com (Paperback): R.Scott Grasser FINDsomeone.com (Paperback)
R.Scott Grasser
R1,105 Discovery Miles 11 050 Ships in 10 - 15 working days

FINDsomeone.com is the complete people-finder of the communications age. This timely reference offers proven and effective search techniques for finding anybody, anywhere. The professional techniques described in FINDsomeone.com were developed by the author over many years in military intelligence, international security, and as a professional investigator. Core strategies for conducting adoption, genealogical, and other missing persons investigations are discussed in clear and understandable terms.
FINDsomeone.com contains numerous sample search reports, which can be used in conjunction with the author's web site FINDsomeone.com or on their own. The book describes in detail the most powerful communications tools that the Internet and modern technology now provide, combined with a range of other time-honored investigative techniques.
R. Scott Grasser is an international security consultant and licensed private investigator. Grasser has both corporate and governmental experience, including a decade as a former Captain with 5th Special Forces Group and the military police. He has successfully taught searching skills to hundreds of students taking his America Online course "Private Investigative Techniques" and as a featured speaker at San Francisco's Bay Area Law Enforcement and Security Liaison Group, ASIS, and North Bay Industrial Security Awareness Council.

The complete people-finder for the communications age.
Details Internet, telephone, and governmental record searches.
Can be used in conjunction with the author's Internet site, FINDsomeone.com.

Security: A Guide to Security System Design and Equipment Selection and Installation (Paperback, 2nd edition): Neil Cumming Security: A Guide to Security System Design and Equipment Selection and Installation (Paperback, 2nd edition)
Neil Cumming
R1,542 Discovery Miles 15 420 Ships in 10 - 15 working days

Security: A Guide to Security System Design and Equipment Selection and Installation, 2ed is the first comprehensive reference for electronic security systems. In eight chapters, it guides the reader through selection, installation, testing, and maintenance of security equipment in 35 categories, from interior and exterior sensors to security systems, The uninformed purchaser, the security-conscious manager, and the novice security practitioner will find that this book demystifies the "black art" of security systems design via clear descriptions of operation principles and extensive practical advice. The more knowledgeable reader will find a unique reference and compendium of information usually found in many separate sources. Each device explained in this book is broken down into sections covering its principles of operation, uses, applications, equipment types, and advantages and disadvantages. This important reference outlines the data objectively, enabling the reader to independently make informed judgments about competing bids or proposals, compile a brief, and design or maintain a security system.
Neil Cumming is a partner at Dodd, Cumming, and Love, Consulting Engineers in Plymouth, England. As Projects Manager for all security projects, he is directly responsible for the design of all security systems from inception to completion for a variety of clients. In this role, Mr. Cumming has designed and supervised the installation of security systems on private and military sites throughout Britain and the Middle East. Starting working life as an apprentice electrician, Mr. Cumming later studies at the City University, London, earning a degree in Building Services and Environmental Engineering.
It is a comprehensive reference for electronic security systems.
Guides the reader through all aspects of electronic security systems from selection to maintenance.
Uses detailed descriptions of operations principles and practical advice to make the use of security systems easier to understand.

Introduction to Security (Hardcover, 9th edition): Robert Fischer, Edward Halibozek, David Walters Introduction to Security (Hardcover, 9th edition)
Robert Fischer, Edward Halibozek, David Walters
R1,591 Discovery Miles 15 910 Ships in 10 - 15 working days

"Introduction to Security" has been the leading text on private security for over thirty years. Celebrated for its balanced and professional approach, this new edition gives future security professionals a broad, solid base that prepares them to serve in a variety of positions. Security is a diverse and rapidly growing field that is immune to outsourcing. The author team as well as an outstanding group of subject-matter experts combine their knowledge and experience with a full package of materials geared to experiential learning. As a recommended title for security certifications, and an information source for the military, this is an essential reference for all security professionals. This timely revision expands on key topics and adds new material on important issues in the 21st century environment such as the importance of communication skills; the value of education; internet-related security risks; changing business paradigms; and brand protection.
New sections on terrorism and emerging security threats like cybercrime and piracy Top industry professionals from aerospace and computer firms join instructors from large academic programs as co-authors and contributors Expanded ancillaries for both instructors and students, including interactive web-based video and case studies

Handbook of Loss Prevention and Crime Prevention (Hardcover, 5th edition): Lawrence Fennelly Handbook of Loss Prevention and Crime Prevention (Hardcover, 5th edition)
Lawrence Fennelly
R1,940 Discovery Miles 19 400 Ships in 10 - 15 working days

"The Handbook of Loss Prevention and Crime Prevention, 5e, "is a trusted resource for physical security professionals, students, and candidates for the coveted Certified Protection Professional (CPP) certification administered by ASIS International. The U.S. government recently announced that employees will have to obtain CPP certification to advance in their careers.

Edited by the security practitioner and author Lawrence Fennelly, this handbook gathers in a single volume the key information on each topic from eminent subject-matter experts. Taken together, this material offers a range of approaches for defining security problems and tools for designing solutions in a world increasingly characterized by complexity and chaos. The 5e adds cutting-edge content and up-to-the-minute practical examples of its application to problems from retail crime to disaster readiness.

* Covers every important topic in the field, including the latest on wireless security applications, data analysis and visualization, situational crime prevention, and global security standards and compliance issues * Required reading for the certification DHS selected for its infrastructure security professionals * Each chapter is contributed by a top security professional with subject-matter expertise

Risk Analysis and the Security Survey (Hardcover, 4th edition): James F. Broder, Gene Tucker Risk Analysis and the Security Survey (Hardcover, 4th edition)
James F. Broder, Gene Tucker
R1,498 Discovery Miles 14 980 Ships in 10 - 15 working days

As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of "Risk Analysis and the Security Survey. "Broder and Tucker guide you throughanalysis toimplementationto provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updating and covering new content. Understand the most fundamental theories surrounding risk control, design, and implementation by reviewing topics such as cost/benefit analysis, crime prediction, response planning, and business impact analysis--all updated to match today's current standards.

This book will show you how to develop and maintain current business contingency and disaster recovery plans to ensure your enterprises are able to sustain loss are able to recover, and protect your assets, be it your business, your information, or yourself, from threats.

*Offers powerful techniques for weighing and managing the risks that face your organization *Gives insights into universal principles that can be adapted to specific situations and threats *Covers topics needed by homeland security professionals as well as IT and physical security managers"

Design and Evaluation of Physical Protection Systems (Paperback, 2nd edition): Mary Lynn Garcia Design and Evaluation of Physical Protection Systems (Paperback, 2nd edition)
Mary Lynn Garcia
R1,535 Discovery Miles 15 350 Ships in 10 - 15 working days

Design and Evaluation of Physical Security Systems, 2e, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.
* New chapter on transportation systems
* Extensively updated chapter on threat definition
* Major changes to response chapter

Rethinking Corporate Security in the Post-9/11 Era - Issues and Strategies for Today's Global Business Community... Rethinking Corporate Security in the Post-9/11 Era - Issues and Strategies for Today's Global Business Community (Hardcover, New)
Dennis Dalton
R1,271 Discovery Miles 12 710 Ships in 10 - 15 working days

The attacks on the World Trade Center and the Pentagon on September 11, 2001 changed the way the world thinks about security. Everyday citizens learned how national security, international politics, and the economy are inextricably linked to business continuity and corporate security. Corporate leaders were reminded that the security of business, intellectual, and human assets has a tremendous impact on an organization's long-term viability.
In Rethinking Corporate Security, Fortune 500 consultant Dennis Dalton helps security directors, CEOs, and business managers understand the fundamental role of security in today's business environment and outlines the steps to protect against corporate loss. He draws on the insights of such leaders as Jack Welch, Bill Gates, Charles Schwab, and Tom Peters in this unique review of security's evolving role and the development of a new management paradigm.
* If you truly wish to improve your own skills, and the effectiveness of your Corporation's security focus, you need to read this book
* Presents connections of theory to real-world case examples in historical and contemporary assessment of security management principles
* Applies classic business and management strategies to the corporate security management function

Security Design Consulting - The Business Of System Security Design (Hardcover, New): Brian Gouin Security Design Consulting - The Business Of System Security Design (Hardcover, New)
Brian Gouin
R1,016 Discovery Miles 10 160 Ships in 10 - 15 working days

A crucial reference for the practicing or aspiring design consultant, "Security Design Consulting" brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, "Security Design Consulting" gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant's important and growing role in an overall security program.
* Focuses on consulting in security design, not security management
* Provides sample service agreements, specifications, and reports to use as models
* Emphasizes the highest technical and ethical standards for this increasingly crucial profession

High-Technology Crime Investigator's Handbook - Establishing and Managing a High-Technology Crime Prevention Program... High-Technology Crime Investigator's Handbook - Establishing and Managing a High-Technology Crime Prevention Program (Paperback, 2nd edition)
Gerald L. Kovacich, William C. Boni
R1,909 Discovery Miles 19 090 Ships in 18 - 22 working days

The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. "High-Technology Crime Investigator's Handbook, Second Edition," informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator.
* Provides an understanding of the global information environment and its threats
* Explains how to establish a high-technology crime investigations unit and prevention program
* Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers

Risk Management for Computer Security - Protecting Your Network and Information Assets (Paperback): Andy Jones, Debi Ashenden Risk Management for Computer Security - Protecting Your Network and Information Assets (Paperback)
Andy Jones, Debi Ashenden
R1,572 Discovery Miles 15 720 Ships in 18 - 22 working days

The information systems security (InfoSec) profession remains one of the fastest growing professions in the world today. With the advent of the Internet and its use as a method of conducting business, even more emphasis is being placed on InfoSec. However, there is an expanded field of threats that must be addressed by today's InfoSec and information assurance (IA) professionals.
Operating within a global business environment with elements of a virtual workforce can create problems not experienced in the past. How do you assess the risk to the organization when information can be accessed, remotely, by employees in the field or while they are traveling internationally? How do you assess the risk to employees who are not working on company premises and are often thousands of miles from the office? How do you assess the risk to your organization and its assets when you have offices or facilities in a nation whose government may be supporting the theft of the corporate "crown jewels" in order to assist their own nationally owned or supported corporations? If your risk assessment and management program is to be effective, then these issues must be assessed.
Personnel involved in the risk assessment and management process face a much more complex environment today than they have ever encountered before.
This book covers more than just the fundamental elements that make up a good risk program. It provides an integrated "how to" approach to implementing a corporate program, complete with tested methods and processes; flowcharts; and checklists that can be used by the reader and immediately implemented into a computer and overall corporate security program. The challenges are many and this book will help professionals in meeting their challenges as we progress through the 21st Century.
*Presents material in an engaging, easy-to-follow manner that will appeal to both advanced INFOSEC career professionals and network administrators entering the information security profession
*Addresses the needs of both the individuals who are new to the subject as well as of experienced professionals
*Provides insight into the factors that need to be considered & fully explains the numerous methods, processes & procedures of risk management

Mergers and Acquisitions Security - Corporate Restructuring and Security Management (Paperback): Edward Halibozek, Gerald L.... Mergers and Acquisitions Security - Corporate Restructuring and Security Management (Paperback)
Edward Halibozek, Gerald L. Kovacich
R1,945 Discovery Miles 19 450 Ships in 18 - 22 working days

In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly reshape themselves continually exploring new markets and developing new products. When they can't expand into new markets or develop new products on their own, they seek alternatives. These alternatives include merging with or acquiring other companies to create a single more capable company. Companies acquire other companies for a wide variety of reasons. In some cases company survival may actually be the reason. What does this condition mean to the security professional? In the course of mergers and acquisitions, security plays a vital role in helping to make the endeavor successful. There are numerous titles on the business aspects of M&A such as the ones listed below. However, this unique book focuses on the role security plays in helping to make a merger, acquisition or divestiture successful. It addresses the fundamental security elements that are required to support the effort. In addition, it provides an integrated "how to" approach to implementing M&A security complete with methods and processes that have been quickly and cost-effectively implemented.
- First book available that focuses on the role of the Security Manager in M&A
- Case studies that highlight the role of the security manager; cases include both best practices as well as illustrations of nightmare examples of what NOT to do
- Lead author is an expert that has participated in/managed security for more than 20 high-profile and large-scale acquisitions
- Model processes, procedures, checklists, charts and sample forms all serve to ease immediate analysis and implementation in a merger or acquisition

The Security Handbook (Paperback, 2nd edition): Philip Purpura The Security Handbook (Paperback, 2nd edition)
Philip Purpura
R1,698 Discovery Miles 16 980 Ships in 18 - 22 working days

The Security Handbook, Second Edition is a user-friendly guide for security officers and guards, covering everything from introductory information to advanced topics. Whether looking for entry into the profession or development within the security industry, this book offers the practical information, training, and need-to-know techniques for the realization of professional goals.
The Second Edition emphasizes the proper skills required to improve job performance -- customer service, security methods, patrolling, communicating, and report writing. Chapters cover such important topics as arrest law and procedure (including legal liability), self-defense and weapons, a new section on career planning, violence in the workplace, internal theft, burglary, robbery, terrorism, cybercrime, and first response during emergencies. Countermeasures to a variety of threats are explained throughout the book.
Experienced security officers, supervisors, and managers will also find the book useful in outlining the changing roles and responsibilities of the protection officer and for helping train their front line staff.
* Covers every important aspect of the security officer's job, with several new updates and access to online sources
* Defines key terms and outlines basic information before moving on to more advanced topics
* Each chapter includes an outline, chapter objectives, and follows with review questions to aid in the learning process
* Features numerous examples, illustrations, Web sites, case studies, and new "What if?" scenarios to relate theory to practice
* Serves as a comprehensive study guide for state mandated training and certification exams such as the Certified Protection Officer (CPO) program sponsored by the IFPO

Information Assurance - Managing Organizational IT Security Risks (Paperback): Joseph Boyce, Daniel Jennings Information Assurance - Managing Organizational IT Security Risks (Paperback)
Joseph Boyce, Daniel Jennings
R2,258 Discovery Miles 22 580 Ships in 18 - 22 working days

Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted information security posture to both public and private corporations and government run agencies.
There is a growing concern among all corporations and within the security industry to come up with new approaches to measure an organization's information security risks and posture. Information Assurance explains and defines the theories and processes that will help a company protect its proprietary information including:
* The need to assess the current level of risk.
* The need to determine what can impact the risk.
* The need to determine how risk can be reduced.

The authors lay out a detailed strategy for defining information security, establishing IA goals, providing training for security awareness, and conducting airtight incident response to system compromise. Such topics as defense in depth, configuration management, IA legal issues, and the importance of establishing an IT baseline are covered in-depth from an organizational and managerial decision-making perspective.
* Experience-based theory provided in a logical and comprehensive manner.
* Management focused coverage includes establishing an IT security posture, implementing organizational awareness and training, and understanding the dynamics of new technologies.
* Numerous real-world examples provide a baseline for assessment and comparison.

Women in Public and Private Law Enforcement (Paperback): Pamela A Collins, Kim Scarborough Women in Public and Private Law Enforcement (Paperback)
Pamela A Collins, Kim Scarborough
R1,636 Discovery Miles 16 360 Ships in 18 - 22 working days

Women in Public and Private Law Enforcement is hands-down the most comprehensive examination of women in law enforcement to date. Most importantly, it fills the current void that exists for texts on this important and growing area of law enforcement. Both public and private sector law enforcement are covered including policing and private security. For policing this includes not only municipal policing, but also state and federal law enforcement. For the security industry, coverage includes not only private security guards but also various other occupations that may be included under private security such as protection specialists.
Women in Public and Private Law Enforcement is intended for academicians and students of sociology, criminal justice, psychology, business, management and loss prevention as a resource on women in non-traditional occupations, specifically law enforcement. It is also intended for professionals in the field today, to apprize them of contemporary issues for women in law enforcement and serve as a reference to guide policy and procedure development.
Authors Pamela Collins and Kathryn Scarborough not only define distinctions in law enforcement and private security but also provide an understanding of the importance of specificity, with regard to this occupational analysis. The authors' diverse background allows them to offer uniquely complementary approach, emphasizing both the importance of understanding the professions from a practical standpoint, while at the same time giving credence to academic analysis.

The book's primary focus is on gender with limited attention paid to race and ethnicity. Some comparisons are made when appropriate, but the ultimate goal is to provide the reader the most comprehensive analysis with respect to gender. Finally, the authors provide women in law enforcement today with detailed analysis and description of how far they have come, the struggles they have faced, the challenges they have overcome, and the achievements they have made.
* The only complete review of women in law enforcement and security
* An ideal text for students in criminal justice and law enforcement courses
* Reviews the current role of women in local, state, and federal agencies

Understanding Crime Prevention (Paperback, 2nd edition): George Richards, Ncpi Understanding Crime Prevention (Paperback, 2nd edition)
George Richards, Ncpi
R1,472 Discovery Miles 14 720 Ships in 18 - 22 working days

Understanding Crime Prevention, Second Edition is a revamping of a popular classic written by NCPI, the primary training school for crime prevention officers in the country. It is a basic introduction to the concepts of crime prevention and security techniques and equipment which aid the crime prevention effort. The fundamental material has been updated with current and contemporary examples.

*Includes glossary of crime prevention terms
*Includes an instructor's manual
*Practical, basic and comprehensive introduction to
security and loss procedures

Netspionage - The Global Threat to Information (Paperback): William C. Boni, Gerald Kovacich Netspionage - The Global Threat to Information (Paperback)
William C. Boni, Gerald Kovacich
R1,559 Discovery Miles 15 590 Ships in 18 - 22 working days

This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers," "cyberpunks," and even intelligence agencies) has already resulted in several incidents that foreshadow the perilous future. Close study of these incidents demonstrates how difficult yet how important it is to confront the challenges of "netspionage" and its less intrusive cousins. The authors present a set of the known incidents and then outline protective measures that will reduce the potential and consequences of netspionage.
Unlike most security books, this one is written for managers and executives in non-protection roles of the organization, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise.

*Practical guide written from front-line experience
*Explains the evolution of information collection and why it has never been easier
*Highlights the tools of the trade and how they can be put to best use

Preventing Corporate Embezzlement (Paperback): Paul Shaw, Jack Bologna Preventing Corporate Embezzlement (Paperback)
Paul Shaw, Jack Bologna
R1,999 Discovery Miles 19 990 Ships in 18 - 22 working days

Internal loss is one of the most costly forms of loss. Embezzlement is one of the least detected and prosecuted forms of internal theft. Preventing Corporate Embezzlement is a professional reference that offers solutions. Managers, auditors and others charged with protecting assets must achieve a heightened awareness of embezzlement. They need to recognize and understand the opportunities, methods, and varieties of embezzlement, as well as establish internal controls that will prevent and detect embezzlement.

Practical tool for detecting and combatting embezzlement: checklists, forms and evaluations
Offers how-to advice on avoiding lawsuits by practicing preventive law
Lists further resources, publications and directories on embezzlement, internal controls and security, risk management, insurance, auditors, and security services and equipment

The Drug Free Workplace - How to Get There and Stay There (Paperback): John Fay The Drug Free Workplace - How to Get There and Stay There (Paperback)
John Fay
R2,143 Discovery Miles 21 430 Ships in 18 - 22 working days

This is a no-nonsense, practical book for helping organizations rid their workplaces of drug abuse and its serious and costly consequences. The book draws upon the collective experiences of hundreds of organizations that have said "no more, not here" and have grown stronger as a result. The path to a drug-free working environment is straight but narrow. The Drug-Free Workplace:
How to Get There and Stay There delineates the path, always with a view toward avoiding missteps that can lead to trouble.
Bringing a workplace back to safety and profitability is a collaborative and multi-disciplinary effort. Participation necessarily involves professionals from security, safety, human resources, and health. Central to the effort is an enlightened management. Every specialist and manager committed to developing and maintaining a drug-free workplace will find in the pages of this book a wealth of sensible, meaningful information.
A drug-free workplace program cuts costs, increases productivity, reduces loss and wastage, avoids accidents, and literally saves careers, families, and lives. Much is at stake, making the drug-free program deserving of thoughtful deliberation, considerable planning, and careful implementation. Preliminary to the process is understanding the key tasks. All of the tasks are spelled out in this book.



Offers organizations a clear course to enact drug policiesTeaches the ramifications of testing and investigating drug use and abuseAddresses liability issues to keep buisness owners, security managers, and their companies out of court

Security Investigations - A Professional's Guide (Paperback): Larry Gene Nicholson Security Investigations - A Professional's Guide (Paperback)
Larry Gene Nicholson
R1,838 Discovery Miles 18 380 Ships in 18 - 22 working days

Security Investigations is a comprehensive book that covers the full spectrum of investigative issues. It contains practical self-evaluation exercises that can be applied in both a formal or informal training environment. Corporate security supervisors will find it helpful in establishing policies and procedures for conducting investigations. It is a guide also for those responsible for the security function without prior experience. ie. Director of Human Resources. Forms in the book will assist an organization in standardizing the means to conduct investigations as well as reporting the outcome in a way that ensures that nothing was missed during the investigation. The real worth of an investigator is their ability to adapt to ever changing circumstances. This text gives the investigator a quick reference manual that can be used to: develop the investigation plan, take effective and accurate field notes, conduct an interview, perform surveillance and finally write the report, all within the legal guidelines outlined in the book. As an additional bonus to the reader, the book will include information on how to select and use the proper surveillance equipment.

Gives the reader the opportunity to practice their skills in answering questions based on real-world type investigations.
Offers self-evaluation exercises
Covers the full spectrum of investigative issues

Practical Security Training (Paperback): Patrick Kane Practical Security Training (Paperback)
Patrick Kane
R2,010 Discovery Miles 20 100 Ships in 18 - 22 working days

Practical Security Training is designed to help security departments develop effective security forces from the personnel screening and selection process to ensuring that proper, cost-efficient training is conducted. Using the building block and progressive method approach allows security staff to become increasingly more effective and more confident. Flexible and practicle, these tools allow security practitioners to adapt them as needed in different environments.
Considering hypothetical situations and case studies, performing drills and continually evaluating performance, the security staff can be better prepared to deal with both routine and emergency situations.
Advocates performance related training similar to that in a military environment
Describes performance-oriented drills
Considers and analyzes hypothetical situations

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Security Consulting
Charles A. Sennewald Paperback R1,107 Discovery Miles 11 070
Biometric Technologies and Verification…
John Vacca Paperback R1,586 Discovery Miles 15 860
High-Security Mechanical Locks - An…
Graham Pulford Hardcover R2,131 Discovery Miles 21 310
Investigations 150 Things You Should…
Lawrence Fennelly, Louis Tyska Paperback R1,065 Discovery Miles 10 650
CCTV for Security Professionals
Alan Matchett Hardcover R1,861 Discovery Miles 18 610
Retail Crime, Security, and Loss…
Charles A. Sennewald, John H. Christman Hardcover R1,953 Discovery Miles 19 530
Background Screening and Investigations…
W. Barry Nixon, Kim Kerr Paperback R1,158 Discovery Miles 11 580
Digital CCTV - A Security Professional's…
Emily M. Harwood Hardcover R1,429 Discovery Miles 14 290
Physical Security Systems Handbook - The…
Michael Khairallah Hardcover R1,400 Discovery Miles 14 000
Trojans, Worms, and Spyware - A Computer…
Michael Erbschloe Paperback R1,191 Discovery Miles 11 910

 

Partners