0
Your cart

Your cart is empty

Browse All Departments
Price
  • R500+ (64)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Security

Building a Digital Forensic Laboratory - Establishing and Managing a Successful Facility (Paperback): Andrew Jones, Craig Valli Building a Digital Forensic Laboratory - Establishing and Managing a Successful Facility (Paperback)
Andrew Jones, Craig Valli
R1,752 Discovery Miles 17 520 Ships in 12 - 19 working days

The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the investigations themselves. This includes a great need for information on how to cost-effectively establish and manage a computer forensics laboratory. This book meets that need: a clearly written, non-technical book on the topic of computer forensics with emphasis on the establishment and management of a computer forensics laboratory and its subsequent support to successfully conducting computer-related crime investigations.
* Provides guidance on creating and managing a computer forensics lab
* Covers the regulatory and legislative environment in the US and Europe
* Meets the needs of IT professionals and law enforcement as well as consultants

Intruder Alarms (Paperback, 3rd edition): Gerard Honey Intruder Alarms (Paperback, 3rd edition)
Gerard Honey
R1,067 Discovery Miles 10 670 Ships in 12 - 19 working days

Intruder Alarms provides a definitive and fully up-to-date guide to the specification, systems design, integration, installation and maintenance of intruder alarm systems. It has been written to be the essential handbook for installation engineers and security professionals working in this rapidly expanding and developing area.
The third edition includes new material on systems integration, digital systems, wireless and remote signalling technologies, and electrical safety.
The revision has brought coverage fully in line with the new European standards (EN50131 / BS EN 50131-1), with their implications summarised in a new appendix. The coverage has also been carefully matched to the requirements of the new Knowledge of Security and Emergency Alarm Systems from City & Guilds (1852).
* An hugely popular practical guide for installation engineers and security professionals now in its third edition
* Essential reading for managers responsible for the commissioning and maintenance of security alarm systems
* Third edition is fully matched to the new European standards (EN50131 / BS EN 50131-1)
* Coverage meets City & Guilds specifications for the new 1852 Security Alarm course

Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition): Philip Walker Electronic Security Systems - Reducing False Alarms (Hardcover, 3rd edition)
Philip Walker
R2,114 Discovery Miles 21 140 Ships in 12 - 19 working days

In the latest edition, Philip Walker not only tackles the electronic aspect of the design of a security system, but also examines the human factor in such systems. In his own words: 'Electronic aids are added to enable security officers to do their jobs better, but not to do their jobs for them'.
Today, with the escalation of crime and growing concerns for security, there has been a great increase in the number of electronic security systems. Unfortunately, despite improvements in reliability in terms of equipment manufacture, false alarms do still occur, and they waste a large amount of police time; approximately ninety out of one hundred alarms investigated by the police are false. In the light of this, the new edition of Electronic Security Systems couldn't come at a better time, as it deals extensively with methods of reducing false alarms, allowing the police to concentrate on real breeches of security, and thus ultimately to reduce crime.
The extensive and unusual combination of experience that Philip Walker has in the world of electronics, communications and as a security consulting engineer makes him eminently qualified to tackle such subjects.
At only 30, this hardback book is an essential addition to your security collection. It has 320 pages packed with advice and technical knowledge, 40 photographs and 25 line diagrams and a good index.

Comprehensive coverage of electronic security systems
Written by an experienced security professional
Fully updated to examine new equipment with extensive help on avoiding false alarms"

Home Security - Alarms, Sensors and Systems (Paperback, 2nd edition): Vivian Capel Home Security - Alarms, Sensors and Systems (Paperback, 2nd edition)
Vivian Capel
R1,362 Discovery Miles 13 620 Ships in 12 - 19 working days

As crime rates soar every householder looks at ways to protect their home and its contents. This practical guide, in straightforward language, spells out the simple steps you can take to guard your home. It shows how burglars work, and how to thwart them. The selection and installation of alarm systems are described simply. This handy volume may provide the information you need to avoid costly and upsetting break-ins.
As well as describing the bewildering range of security devices on offer, more technical readers may consider their own solutions using descriptions and circuits for two simple tested designs are given, one for the home and one for a foolproof public hall system.
There is a plethora of security devices now on offer. Large sums can be spent on elaborate systems, yet weak links can be left unrecognised - except by the housebreaker Good independent advice is scarce, as most security firms favour their own products. This book explains the pros and cons of alarm systems, including how to avoid faults, and find them if they occur. Friendly security' is particularly featured, and other security devices are given a critical scrutiny.

Explains simply and in straightforward language how to select and install systems
Describes range of security devices on offer
Explains pros and cons of alarm systems and how to avoid faults

High-Security Mechanical Locks - An Encyclopedic Reference (Hardcover): Graham Pulford High-Security Mechanical Locks - An Encyclopedic Reference (Hardcover)
Graham Pulford
R2,389 R2,082 Discovery Miles 20 820 Save R307 (13%) Ships in 9 - 17 working days

" High-Security Mechanical Locks " comprehensively surveys and explains the highly technical area of high security locks in a way that is accessible to a wide audience. Well over 100 different locks are presented, organized into 6 basic types. Each chapter introduces the necessary concepts in a historical perspective and further categorizes the locks. This is followed by detailed 'how it works' descriptions with many pictures, diagrams and references. The descriptions are based on actual dissections of the real locks.
The scope is limited to key operated mechanical locks, thus keyless combination locks and digital locks are not covered. The book does not deal with routine locksmithing topics such as installation and servicing of locks. The sensitive area of picking and bypassing of locks is dealt with only at a high level without giving detailed information that would be unacceptable in the wrong hands.
* Comprehensive coverage of over 100 different types of 19th and 20th century key-operated locks, unified in a simple classification scheme
* Detailed operating principles - clear 'how it works' descriptions
* Manipulation resistance rating for each lock on a scale of 1 to 5

Design and Evaluation of Physical Protection Systems (Paperback, 2nd edition): Mary Lynn Garcia Design and Evaluation of Physical Protection Systems (Paperback, 2nd edition)
Mary Lynn Garcia
R1,628 Discovery Miles 16 280 Ships in 12 - 19 working days

Design and Evaluation of Physical Security Systems, 2e, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.
* New chapter on transportation systems
* Extensively updated chapter on threat definition
* Major changes to response chapter

The Art of War for Security Managers - 10 Steps to Enhancing Organizational Effectiveness (Paperback, New): Scott Watson The Art of War for Security Managers - 10 Steps to Enhancing Organizational Effectiveness (Paperback, New)
Scott Watson
R995 Discovery Miles 9 950 Ships in 12 - 19 working days

The classic book "The Art of War" (or as it is sometimes translated, "The Art of Strategy") by Sun Tzu is often used to illustrate principles that can apply to the management of business environments. "The Art of War for Security Managers" is the first book to apply the time-honored principles of Sun Tzu's theories of conflict to contemporary organizational security.
Corporate leaders have a responsibility to make rational choices that maximize return on investment. The author posits that while conflict is inevitable, it need not be costly. The result is an efficient framework for understanding and dealing with conflict while minimizing costly protracted battles, focusing specifically on the crucial tasks a security manager must carry out in a 21st century organization.
* Includes an appendix with job aids the security manager can use in day-to-day workplace situations
* Provides readers with a framework for adapting Sun Tzu's theories of conflict within their own organizations
* From an author who routinely packs the room at his conference presentations

Vulnerability Assessment of Physical Protection Systems (Paperback): Mary Lynn Garcia Vulnerability Assessment of Physical Protection Systems (Paperback)
Mary Lynn Garcia
R1,494 Discovery Miles 14 940 Ships in 12 - 19 working days

Vulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allow readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The book will address the full spectrum of a VA, including negotiating tasks with the customer, project management and planning of the VA, team membership, step-by-step details for performing the VA, data collection and analysis, important notes on how to use the VA to suggest design improvements and generate multiple design options. The text will end with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools will be introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact.
- Guides the reader through the topic of physical security doing so with a unique, detailed and scientific approach
- Takes the reader from beginning to end and step-by-step through a Vulnerability Assessment
- Over 150 figures and tables to illustrate key concepts

Security Education, Awareness and Training - SEAT from Theory to Practice (Paperback, New): Carl Roper, Dr Lynn Fischer, Joseph... Security Education, Awareness and Training - SEAT from Theory to Practice (Paperback, New)
Carl Roper, Dr Lynn Fischer, Joseph A. Grau
R1,404 Discovery Miles 14 040 Ships in 12 - 19 working days

This book is the only one available on security training for all level of personnel. Chief Security Officers (CSOs), security managers, and heads of security forces often have to design training programs themselves from scratch or rely on outside vendors and outside training companies to provide training which is often dry, stilted, and not always applicable to a specific corporate or government setting. This title addresses the theories of sound security training and awareness, then shows the reader how to put the theories into practice when developing or presenting any form of security education, training, motivation or awareness.
* Shows how to establish and integrate a structured, internally consistent and coherent program from the ground up
* Illustrates how to assess and analyze security program needs and audience and customize training accordingly
* Numerous Appendices to help the security manager justify security spending on training initiatives

FINDsomeone.com (Paperback): R.Scott Grasser FINDsomeone.com (Paperback)
R.Scott Grasser
R1,170 Discovery Miles 11 700 Ships in 12 - 19 working days

FINDsomeone.com is the complete people-finder of the communications age. This timely reference offers proven and effective search techniques for finding anybody, anywhere. The professional techniques described in FINDsomeone.com were developed by the author over many years in military intelligence, international security, and as a professional investigator. Core strategies for conducting adoption, genealogical, and other missing persons investigations are discussed in clear and understandable terms.
FINDsomeone.com contains numerous sample search reports, which can be used in conjunction with the author's web site FINDsomeone.com or on their own. The book describes in detail the most powerful communications tools that the Internet and modern technology now provide, combined with a range of other time-honored investigative techniques.
R. Scott Grasser is an international security consultant and licensed private investigator. Grasser has both corporate and governmental experience, including a decade as a former Captain with 5th Special Forces Group and the military police. He has successfully taught searching skills to hundreds of students taking his America Online course "Private Investigative Techniques" and as a featured speaker at San Francisco's Bay Area Law Enforcement and Security Liaison Group, ASIS, and North Bay Industrial Security Awareness Council.

The complete people-finder for the communications age.
Details Internet, telephone, and governmental record searches.
Can be used in conjunction with the author's Internet site, FINDsomeone.com.

Security: A Guide to Security System Design and Equipment Selection and Installation (Paperback, 2nd edition): Neil Cumming Security: A Guide to Security System Design and Equipment Selection and Installation (Paperback, 2nd edition)
Neil Cumming
R1,636 Discovery Miles 16 360 Ships in 12 - 19 working days

Security: A Guide to Security System Design and Equipment Selection and Installation, 2ed is the first comprehensive reference for electronic security systems. In eight chapters, it guides the reader through selection, installation, testing, and maintenance of security equipment in 35 categories, from interior and exterior sensors to security systems, The uninformed purchaser, the security-conscious manager, and the novice security practitioner will find that this book demystifies the "black art" of security systems design via clear descriptions of operation principles and extensive practical advice. The more knowledgeable reader will find a unique reference and compendium of information usually found in many separate sources. Each device explained in this book is broken down into sections covering its principles of operation, uses, applications, equipment types, and advantages and disadvantages. This important reference outlines the data objectively, enabling the reader to independently make informed judgments about competing bids or proposals, compile a brief, and design or maintain a security system.
Neil Cumming is a partner at Dodd, Cumming, and Love, Consulting Engineers in Plymouth, England. As Projects Manager for all security projects, he is directly responsible for the design of all security systems from inception to completion for a variety of clients. In this role, Mr. Cumming has designed and supervised the installation of security systems on private and military sites throughout Britain and the Middle East. Starting working life as an apprentice electrician, Mr. Cumming later studies at the City University, London, earning a degree in Building Services and Environmental Engineering.
It is a comprehensive reference for electronic security systems.
Guides the reader through all aspects of electronic security systems from selection to maintenance.
Uses detailed descriptions of operations principles and practical advice to make the use of security systems easier to understand.

Introduction to Security (Hardcover, 9th edition): Robert Fischer, Edward Halibozek, David Walters Introduction to Security (Hardcover, 9th edition)
Robert Fischer, Edward Halibozek, David Walters
R1,688 Discovery Miles 16 880 Ships in 12 - 19 working days

"Introduction to Security" has been the leading text on private security for over thirty years. Celebrated for its balanced and professional approach, this new edition gives future security professionals a broad, solid base that prepares them to serve in a variety of positions. Security is a diverse and rapidly growing field that is immune to outsourcing. The author team as well as an outstanding group of subject-matter experts combine their knowledge and experience with a full package of materials geared to experiential learning. As a recommended title for security certifications, and an information source for the military, this is an essential reference for all security professionals. This timely revision expands on key topics and adds new material on important issues in the 21st century environment such as the importance of communication skills; the value of education; internet-related security risks; changing business paradigms; and brand protection.
New sections on terrorism and emerging security threats like cybercrime and piracy Top industry professionals from aerospace and computer firms join instructors from large academic programs as co-authors and contributors Expanded ancillaries for both instructors and students, including interactive web-based video and case studies

Handbook of Loss Prevention and Crime Prevention (Hardcover, 5th edition): Lawrence Fennelly Handbook of Loss Prevention and Crime Prevention (Hardcover, 5th edition)
Lawrence Fennelly
R2,059 Discovery Miles 20 590 Ships in 12 - 19 working days

"The Handbook of Loss Prevention and Crime Prevention, 5e, "is a trusted resource for physical security professionals, students, and candidates for the coveted Certified Protection Professional (CPP) certification administered by ASIS International. The U.S. government recently announced that employees will have to obtain CPP certification to advance in their careers.

Edited by the security practitioner and author Lawrence Fennelly, this handbook gathers in a single volume the key information on each topic from eminent subject-matter experts. Taken together, this material offers a range of approaches for defining security problems and tools for designing solutions in a world increasingly characterized by complexity and chaos. The 5e adds cutting-edge content and up-to-the-minute practical examples of its application to problems from retail crime to disaster readiness.

* Covers every important topic in the field, including the latest on wireless security applications, data analysis and visualization, situational crime prevention, and global security standards and compliance issues * Required reading for the certification DHS selected for its infrastructure security professionals * Each chapter is contributed by a top security professional with subject-matter expertise

Rethinking Corporate Security in the Post-9/11 Era - Issues and Strategies for Today's Global Business Community... Rethinking Corporate Security in the Post-9/11 Era - Issues and Strategies for Today's Global Business Community (Hardcover, New)
Dennis Dalton
R1,920 R1,347 Discovery Miles 13 470 Save R573 (30%) Ships in 12 - 19 working days

The attacks on the World Trade Center and the Pentagon on September 11, 2001 changed the way the world thinks about security. Everyday citizens learned how national security, international politics, and the economy are inextricably linked to business continuity and corporate security. Corporate leaders were reminded that the security of business, intellectual, and human assets has a tremendous impact on an organization's long-term viability.
In Rethinking Corporate Security, Fortune 500 consultant Dennis Dalton helps security directors, CEOs, and business managers understand the fundamental role of security in today's business environment and outlines the steps to protect against corporate loss. He draws on the insights of such leaders as Jack Welch, Bill Gates, Charles Schwab, and Tom Peters in this unique review of security's evolving role and the development of a new management paradigm.
* If you truly wish to improve your own skills, and the effectiveness of your Corporation's security focus, you need to read this book
* Presents connections of theory to real-world case examples in historical and contemporary assessment of security management principles
* Applies classic business and management strategies to the corporate security management function

Risk Analysis and the Security Survey (Hardcover, 4th edition): James F. Broder, Gene Tucker Risk Analysis and the Security Survey (Hardcover, 4th edition)
James F. Broder, Gene Tucker
R1,592 Discovery Miles 15 920 Ships in 12 - 19 working days

As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of "Risk Analysis and the Security Survey. "Broder and Tucker guide you throughanalysis toimplementationto provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updating and covering new content. Understand the most fundamental theories surrounding risk control, design, and implementation by reviewing topics such as cost/benefit analysis, crime prediction, response planning, and business impact analysis--all updated to match today's current standards.

This book will show you how to develop and maintain current business contingency and disaster recovery plans to ensure your enterprises are able to sustain loss are able to recover, and protect your assets, be it your business, your information, or yourself, from threats.

*Offers powerful techniques for weighing and managing the risks that face your organization *Gives insights into universal principles that can be adapted to specific situations and threats *Covers topics needed by homeland security professionals as well as IT and physical security managers"

Encyclopedia of Security Management (Hardcover, 2nd edition): John Fay Encyclopedia of Security Management (Hardcover, 2nd edition)
John Fay
R2,627 R1,874 Discovery Miles 18 740 Save R753 (29%) Out of stock

" The Encyclopedia of Security Management " is a valuable guide for all security professionals, and an essential resource for those who need a reference work to support their continuing education. In keeping with the excellent standard set by the First Edition, the Second Edition is completely updated.
The Second Edition also emphasizes topics not covered in the First Edition, particularly those relating to homeland security, terrorism, threats to national infrastructures (e.g., transportation, energy and agriculture) risk assessment, disaster mitigation and remediation, and weapons of mass destruction (chemical, biological, radiological, nuclear and explosives). Fay also maintains a strong focus on security measures required at special sites such as electric power, nuclear, gas and chemical plants; petroleum production and refining facilities; oil and gas pipelines; water treatment and distribution systems; bulk storage facilities; entertainment venues; apartment complexes and hotels; schools; hospitals; government buildings; and financial centers. The articles included in this edition also address protection of air, marine, rail, trucking and metropolitan transit systems.
* Completely updated to include new information concerning homeland security and disaster management
* Convenient new organization groups related articles for ease of use
* Brings together the work of more than sixty of the world's top security experts

High-Technology Crime Investigator's Handbook - Establishing and Managing a High-Technology Crime Prevention Program... High-Technology Crime Investigator's Handbook - Establishing and Managing a High-Technology Crime Prevention Program (Paperback, 2nd edition)
Gerald L. Kovacich, William C. Boni
R2,066 Discovery Miles 20 660 Ships in 10 - 15 working days

The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. "High-Technology Crime Investigator's Handbook, Second Edition," informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator.
* Provides an understanding of the global information environment and its threats
* Explains how to establish a high-technology crime investigations unit and prevention program
* Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers

Strategic Security Management - A Risk Assessment Guide for Decision Makers (Hardcover): Karim Vellani Strategic Security Management - A Risk Assessment Guide for Decision Makers (Hardcover)
Karim Vellani
R1,846 R1,334 Discovery Miles 13 340 Save R512 (28%) Out of stock

"Strategic Security Management" supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organization s assets, giving decision makers the foundation needed to climb the next step up the corporate ladder.
"Strategic Security Management" fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures.
" Strategic Security Management " contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald.
* Provides clear direction on how to meet new business demands on the security professional
* Guides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the program
* Covers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each"

Risk Management for Computer Security - Protecting Your Network and Information Assets (Paperback): Andy Jones, Debi Ashenden Risk Management for Computer Security - Protecting Your Network and Information Assets (Paperback)
Andy Jones, Debi Ashenden
R1,700 Discovery Miles 17 000 Ships in 10 - 15 working days

The information systems security (InfoSec) profession remains one of the fastest growing professions in the world today. With the advent of the Internet and its use as a method of conducting business, even more emphasis is being placed on InfoSec. However, there is an expanded field of threats that must be addressed by today's InfoSec and information assurance (IA) professionals.
Operating within a global business environment with elements of a virtual workforce can create problems not experienced in the past. How do you assess the risk to the organization when information can be accessed, remotely, by employees in the field or while they are traveling internationally? How do you assess the risk to employees who are not working on company premises and are often thousands of miles from the office? How do you assess the risk to your organization and its assets when you have offices or facilities in a nation whose government may be supporting the theft of the corporate "crown jewels" in order to assist their own nationally owned or supported corporations? If your risk assessment and management program is to be effective, then these issues must be assessed.
Personnel involved in the risk assessment and management process face a much more complex environment today than they have ever encountered before.
This book covers more than just the fundamental elements that make up a good risk program. It provides an integrated "how to" approach to implementing a corporate program, complete with tested methods and processes; flowcharts; and checklists that can be used by the reader and immediately implemented into a computer and overall corporate security program. The challenges are many and this book will help professionals in meeting their challenges as we progress through the 21st Century.
*Presents material in an engaging, easy-to-follow manner that will appeal to both advanced INFOSEC career professionals and network administrators entering the information security profession
*Addresses the needs of both the individuals who are new to the subject as well as of experienced professionals
*Provides insight into the factors that need to be considered & fully explains the numerous methods, processes & procedures of risk management

Mergers and Acquisitions Security - Corporate Restructuring and Security Management (Paperback): Edward Halibozek, Gerald L.... Mergers and Acquisitions Security - Corporate Restructuring and Security Management (Paperback)
Edward Halibozek, Gerald L. Kovacich
R2,105 Discovery Miles 21 050 Ships in 10 - 15 working days

In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly reshape themselves continually exploring new markets and developing new products. When they can't expand into new markets or develop new products on their own, they seek alternatives. These alternatives include merging with or acquiring other companies to create a single more capable company. Companies acquire other companies for a wide variety of reasons. In some cases company survival may actually be the reason. What does this condition mean to the security professional? In the course of mergers and acquisitions, security plays a vital role in helping to make the endeavor successful. There are numerous titles on the business aspects of M&A such as the ones listed below. However, this unique book focuses on the role security plays in helping to make a merger, acquisition or divestiture successful. It addresses the fundamental security elements that are required to support the effort. In addition, it provides an integrated "how to" approach to implementing M&A security complete with methods and processes that have been quickly and cost-effectively implemented.
- First book available that focuses on the role of the Security Manager in M&A
- Case studies that highlight the role of the security manager; cases include both best practices as well as illustrations of nightmare examples of what NOT to do
- Lead author is an expert that has participated in/managed security for more than 20 high-profile and large-scale acquisitions
- Model processes, procedures, checklists, charts and sample forms all serve to ease immediate analysis and implementation in a merger or acquisition

The Security Handbook (Paperback, 2nd edition): Philip Purpura The Security Handbook (Paperback, 2nd edition)
Philip Purpura
R1,836 Discovery Miles 18 360 Ships in 10 - 15 working days

The Security Handbook, Second Edition is a user-friendly guide for security officers and guards, covering everything from introductory information to advanced topics. Whether looking for entry into the profession or development within the security industry, this book offers the practical information, training, and need-to-know techniques for the realization of professional goals.
The Second Edition emphasizes the proper skills required to improve job performance -- customer service, security methods, patrolling, communicating, and report writing. Chapters cover such important topics as arrest law and procedure (including legal liability), self-defense and weapons, a new section on career planning, violence in the workplace, internal theft, burglary, robbery, terrorism, cybercrime, and first response during emergencies. Countermeasures to a variety of threats are explained throughout the book.
Experienced security officers, supervisors, and managers will also find the book useful in outlining the changing roles and responsibilities of the protection officer and for helping train their front line staff.
* Covers every important aspect of the security officer's job, with several new updates and access to online sources
* Defines key terms and outlines basic information before moving on to more advanced topics
* Each chapter includes an outline, chapter objectives, and follows with review questions to aid in the learning process
* Features numerous examples, illustrations, Web sites, case studies, and new "What if?" scenarios to relate theory to practice
* Serves as a comprehensive study guide for state mandated training and certification exams such as the Certified Protection Officer (CPO) program sponsored by the IFPO

Information Assurance - Managing Organizational IT Security Risks (Paperback): Joseph Boyce, Daniel Jennings Information Assurance - Managing Organizational IT Security Risks (Paperback)
Joseph Boyce, Daniel Jennings
R2,445 Discovery Miles 24 450 Ships in 10 - 15 working days

Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted information security posture to both public and private corporations and government run agencies.
There is a growing concern among all corporations and within the security industry to come up with new approaches to measure an organization's information security risks and posture. Information Assurance explains and defines the theories and processes that will help a company protect its proprietary information including:
* The need to assess the current level of risk.
* The need to determine what can impact the risk.
* The need to determine how risk can be reduced.

The authors lay out a detailed strategy for defining information security, establishing IA goals, providing training for security awareness, and conducting airtight incident response to system compromise. Such topics as defense in depth, configuration management, IA legal issues, and the importance of establishing an IT baseline are covered in-depth from an organizational and managerial decision-making perspective.
* Experience-based theory provided in a logical and comprehensive manner.
* Management focused coverage includes establishing an IT security posture, implementing organizational awareness and training, and understanding the dynamics of new technologies.
* Numerous real-world examples provide a baseline for assessment and comparison.

Women in Public and Private Law Enforcement (Paperback): Pamela A Collins, Kim Scarborough Women in Public and Private Law Enforcement (Paperback)
Pamela A Collins, Kim Scarborough
R1,769 Discovery Miles 17 690 Ships in 10 - 15 working days

Women in Public and Private Law Enforcement is hands-down the most comprehensive examination of women in law enforcement to date. Most importantly, it fills the current void that exists for texts on this important and growing area of law enforcement. Both public and private sector law enforcement are covered including policing and private security. For policing this includes not only municipal policing, but also state and federal law enforcement. For the security industry, coverage includes not only private security guards but also various other occupations that may be included under private security such as protection specialists.
Women in Public and Private Law Enforcement is intended for academicians and students of sociology, criminal justice, psychology, business, management and loss prevention as a resource on women in non-traditional occupations, specifically law enforcement. It is also intended for professionals in the field today, to apprize them of contemporary issues for women in law enforcement and serve as a reference to guide policy and procedure development.
Authors Pamela Collins and Kathryn Scarborough not only define distinctions in law enforcement and private security but also provide an understanding of the importance of specificity, with regard to this occupational analysis. The authors' diverse background allows them to offer uniquely complementary approach, emphasizing both the importance of understanding the professions from a practical standpoint, while at the same time giving credence to academic analysis.

The book's primary focus is on gender with limited attention paid to race and ethnicity. Some comparisons are made when appropriate, but the ultimate goal is to provide the reader the most comprehensive analysis with respect to gender. Finally, the authors provide women in law enforcement today with detailed analysis and description of how far they have come, the struggles they have faced, the challenges they have overcome, and the achievements they have made.
* The only complete review of women in law enforcement and security
* An ideal text for students in criminal justice and law enforcement courses
* Reviews the current role of women in local, state, and federal agencies

Understanding Crime Prevention (Paperback, 2nd edition): George Richards, Ncpi Understanding Crime Prevention (Paperback, 2nd edition)
George Richards, Ncpi
R1,592 Discovery Miles 15 920 Ships in 10 - 15 working days

Understanding Crime Prevention, Second Edition is a revamping of a popular classic written by NCPI, the primary training school for crime prevention officers in the country. It is a basic introduction to the concepts of crime prevention and security techniques and equipment which aid the crime prevention effort. The fundamental material has been updated with current and contemporary examples.

*Includes glossary of crime prevention terms
*Includes an instructor's manual
*Practical, basic and comprehensive introduction to
security and loss procedures

Preventing Corporate Embezzlement (Paperback): Paul Shaw, Jack Bologna Preventing Corporate Embezzlement (Paperback)
Paul Shaw, Jack Bologna
R2,163 Discovery Miles 21 630 Ships in 10 - 15 working days

Internal loss is one of the most costly forms of loss. Embezzlement is one of the least detected and prosecuted forms of internal theft. Preventing Corporate Embezzlement is a professional reference that offers solutions. Managers, auditors and others charged with protecting assets must achieve a heightened awareness of embezzlement. They need to recognize and understand the opportunities, methods, and varieties of embezzlement, as well as establish internal controls that will prevent and detect embezzlement.

Practical tool for detecting and combatting embezzlement: checklists, forms and evaluations
Offers how-to advice on avoiding lawsuits by practicing preventive law
Lists further resources, publications and directories on embezzlement, internal controls and security, risk management, insurance, auditors, and security services and equipment

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Prisoner 913 - The Release Of Nelson…
Riaan de Villiers, Jan-Ad Stemmet Paperback R399 R374 Discovery Miles 3 740
Water Quality & Pollution Set
Various Paperback R4,019 Discovery Miles 40 190
Water Environment Modeling
Clark C.K. Liu, Pengzhi Lin, … Hardcover R2,843 Discovery Miles 28 430
Radioactivity - History, Science, Vital…
Michael F. L'Annunziata Hardcover R7,685 R5,260 Discovery Miles 52 600
German Radioactive Waste - Changes in…
Robert Rybski Hardcover R1,674 Discovery Miles 16 740
Waterlogged Wealth - Why waste the…
Edward Maltby Hardcover R4,476 Discovery Miles 44 760
A History Of South Africa - From The…
Fransjohan Pretorius Paperback R435 Discovery Miles 4 350
Jump - A Memoir
Lenerd Louw Paperback R354 Discovery Miles 3 540
Freestyle Cooking With Chef Ollie
Oliver Swart Hardcover R450 R402 Discovery Miles 4 020
Arsenic: Natural and Anthropogenic
Eleonora Deschamps, Joerg Matschullat Paperback R2,427 Discovery Miles 24 270

 

Partners