Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Academic & Education > Professional & Technical > Security
Most employeers are astounded at how easily and quickly their
proprietary information can get out of their control. In a large
number of cases, theft of trade secrets often involves employees
leaving a company to start their own business or work for a direct
competitor.
The need to professionally and successfully conduct computer
forensic investigations of incidents and crimes has never been
greater. This has caused an increased requirement for information
about the creation and management of computer forensic laboratories
and the investigations themselves. This includes a great need for
information on how to cost-effectively establish and manage a
computer forensics laboratory. This book meets that need: a clearly
written, non-technical book on the topic of computer forensics with
emphasis on the establishment and management of a computer
forensics laboratory and its subsequent support to successfully
conducting computer-related crime investigations.
In the latest edition, Philip Walker not only tackles the
electronic aspect of the design of a security system, but also
examines the human factor in such systems. In his own words:
'Electronic aids are added to enable security officers to do their
jobs better, but not to do their jobs for them'.
As crime rates soar every householder looks at ways to protect
their home and its contents. This practical guide, in
straightforward language, spells out the simple steps you can take
to guard your home. It shows how burglars work, and how to thwart
them. The selection and installation of alarm systems are described
simply. This handy volume may provide the information you need to
avoid costly and upsetting break-ins.
Since 9/11, business and industry has paid close attention to
security within their own organizations. In fact, at no other time
in modern history has business and industry been more concerned
with security issues. A new concern for security measures to combat
potential terrorism, sabotage, theft and disruption -- which could
bring any business to it's knees --has swept the nation. This has
opened up a huge opportunity for private investigators and security
professionals as consultants. Many retiring law enforcement and
security management professionals look to enter the private
security consulting market. Security consulting often involves
conducting in-depth security surveys so businesses will know
exactly where security holes are present and where they need
improvement to limit their exposure to various threats. The fourth
edition of "Security Consulting" introduces security and law
enforcement professionals to the career and business of security
consulting. It provides new and potential consultants with the
practical guidelines needed to start up and maintain a successful
independent practice. Updated and expanded information is included
on marketing, fees and expenses, forensic consulting, the use of
computers, and the need for professional growth.Useful sample forms
have been updated in addition tonew promotion opportunities and
keys to conducting research on the Web. - The only book of its kind dedicated to beginning a security consulting practice from the ground-up - Proven, practical methods to establish and run a security consulting business - Newchapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet - The most up-to-date best practices from the IAPSC"
"High-Rise Security and Fire Life Safety, 3e, " is a comprehensive
reference for managing security and fire life safety operations
within high-rise buildings. It spells out the unique
characteristics of skyscrapers from a security and fire life safety
perspective, details the type of security and life safety systems
commonly found in them, outlines how to conduct risk assessments,
and explains security policies and procedures designed to protect
life and property. Craighead also provides guidelines for managing
security and life safety functions, including the development of
response plans for building emergencies. This latest edition
clearly separates out the different types of skyscrapers, from
office buildings to hotels to condominiums to mixed-use buildings,
and explains how different patterns of use and types of tenancy
impact building security and life safety. New to this edition: Differentiates security and fire life safety issues specific to: Office towers Hotels Residential and apartment buildings Mixed-use buildings Updated fire and life safety standards and guidelines Includes a CD-ROM with electronic versions of sample survey checklists, a sample building emergency management plan, and other security and fire life safety resources.
"Retail Crime, Security, and Loss Prevention" is destined to become
the "go to" source of crime- and loss prevention- related
information in the retail industry. Written and edited by two
nationally recognized retail security experts and enhanced with 63
contributions by others who contribute expertise in specialized
areas, this book provides over 150 definitions of loss prevention
terms, and discusses topics ranging from accident investigations,
counterfeit currency, emergency planning, and workplace violence to
vendor frauds. No other single work contains such a wealth of
retail security information.
The classic book "The Art of War" (or as it is sometimes
translated, "The Art of Strategy") by Sun Tzu is often used to
illustrate principles that can apply to the management of business
environments. "The Art of War for Security Managers" is the first
book to apply the time-honored principles of Sun Tzu's theories of
conflict to contemporary organizational security.
This book is the only one available on security training for all
level of personnel. Chief Security Officers (CSOs), security
managers, and heads of security forces often have to design
training programs themselves from scratch or rely on outside
vendors and outside training companies to provide training which is
often dry, stilted, and not always applicable to a specific
corporate or government setting. This title addresses the theories
of sound security training and awareness, then shows the reader how
to put the theories into practice when developing or presenting any
form of security education, training, motivation or awareness.
Security: A Guide to Security System Design and Equipment Selection
and Installation, 2ed is the first comprehensive reference for
electronic security systems. In eight chapters, it guides the
reader through selection, installation, testing, and maintenance of
security equipment in 35 categories, from interior and exterior
sensors to security systems, The uninformed purchaser, the
security-conscious manager, and the novice security practitioner
will find that this book demystifies the "black art" of security
systems design via clear descriptions of operation principles and
extensive practical advice. The more knowledgeable reader will find
a unique reference and compendium of information usually found in
many separate sources. Each device explained in this book is broken
down into sections covering its principles of operation, uses,
applications, equipment types, and advantages and disadvantages.
This important reference outlines the data objectively, enabling
the reader to independently make informed judgments about competing
bids or proposals, compile a brief, and design or maintain a
security system.
The attacks on the World Trade Center and the Pentagon on September
11, 2001 changed the way the world thinks about security. Everyday
citizens learned how national security, international politics, and
the economy are inextricably linked to business continuity and
corporate security. Corporate leaders were reminded that the
security of business, intellectual, and human assets has a
tremendous impact on an organization's long-term viability.
Design and Evaluation of Physical Security Systems, 2e, includes
updated references to security expectations and changes since 9/11.
The threat chapter includes references to new threat capabilities
in Weapons of Mass Destruction, and a new figure on hate crime
groups in the US. All the technology chapters have been reviewed
and updated to include technology in use since 2001, when the first
edition was published. Garcia has also added a new chapter that
shows how the methodology described in the book is applied in
transportation systems. College faculty who have adopted this text
have suggested improvements and these have been incorporated as
well. This second edition also includes some references to the
author's recent book on Vulnerability Assessment, to link the two
volumes at a high level.
"Introduction to Security" has been the leading text on private
security for over thirty years. Celebrated for its balanced and
professional approach, this new edition gives future security
professionals a broad, solid base that prepares them to serve in a
variety of positions. Security is a diverse and rapidly growing
field that is immune to outsourcing. The author team as well as an
outstanding group of subject-matter experts combine their knowledge
and experience with a full package of materials geared to
experiential learning. As a recommended title for security
certifications, and an information source for the military, this is
an essential reference for all security professionals. This timely
revision expands on key topics and adds new material on important
issues in the 21st century environment such as the importance of
communication skills; the value of education; internet-related
security risks; changing business paradigms; and brand
protection.
"The Handbook of Loss Prevention and Crime Prevention, 5e, "is a trusted resource for physical security professionals, students, and candidates for the coveted Certified Protection Professional (CPP) certification administered by ASIS International. The U.S. government recently announced that employees will have to obtain CPP certification to advance in their careers. Edited by the security practitioner and author Lawrence
Fennelly, this handbook gathers in a single volume the key
information on each topic from eminent subject-matter experts.
Taken together, this material offers a range of approaches for
defining security problems and tools for designing solutions in a
world increasingly characterized by complexity and chaos. The 5e
adds cutting-edge content and up-to-the-minute practical examples
of its application to problems from retail crime to disaster
readiness. * Covers every important topic in the field, including the latest on wireless security applications, data analysis and visualization, situational crime prevention, and global security standards and compliance issues * Required reading for the certification DHS selected for its infrastructure security professionals * Each chapter is contributed by a top security professional with subject-matter expertise
Intruder Alarms provides a definitive and fully up-to-date guide to
the specification, systems design, integration, installation and
maintenance of intruder alarm systems. It has been written to be
the essential handbook for installation engineers and security
professionals working in this rapidly expanding and developing
area.
As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of "Risk Analysis and the Security Survey. "Broder and Tucker guide you throughanalysis toimplementationto provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updating and covering new content. Understand the most fundamental theories surrounding risk control, design, and implementation by reviewing topics such as cost/benefit analysis, crime prediction, response planning, and business impact analysis--all updated to match today's current standards. This book will show you how to develop and maintain current
business contingency and disaster recovery plans to ensure your
enterprises are able to sustain loss are able to recover, and
protect your assets, be it your business, your information, or
yourself, from threats. *Offers powerful techniques for weighing and managing the risks that face your organization *Gives insights into universal principles that can be adapted to specific situations and threats *Covers topics needed by homeland security professionals as well as IT and physical security managers"
Vulnerability Assessment of Physical Protection Systems will
describe the entire vulnerability assessment (VA) process, from the
start of planning through final analysis and out brief to senior
management. The text will draw heavily on the principles introduced
in the author's best-selling Design and Evaluation of Physical
Protection Systems and allow readers to apply those principles and
conduct a VA that is aligned with system objectives and achievable
with existing budget and personnel resources. The book will address
the full spectrum of a VA, including negotiating tasks with the
customer, project management and planning of the VA, team
membership, step-by-step details for performing the VA, data
collection and analysis, important notes on how to use the VA to
suggest design improvements and generate multiple design options.
The text will end with a discussion of how to out brief the results
to senior management in order to gain their support and demonstrate
the return on investment of their security dollar. Several new
tools will be introduced to help readers organize and use the
information at their sites and allow them to mix the physical
protection system with other risk management measures to reduce
risk to an acceptable level at an affordable cost and with the
least operational impact.
Cargo Theft, Loss Prevention, and Supply Chain Security outlines steps for identifying the weakest links in the supply chain and customizing a security program to help you prevent thefts and recover losses. Written by one of the world's leading experts in cargo theft analysis, risk assessment and supply chain security, this is the most comprehensive book available on the topic of cargo theft and loss prevention. Part history of cargo theft, part analysis and part how-to guide, the book is the one source supply chain professionals and students can turn to in order to understand every facet of cargo theft and take steps to prevent losses. This groundbreaking book contains methods of predictive cargo theft modeling, allowing proactive professionals to develop prevention solutions at every step along the supply chain. It provides a complete methodology for use in creating your own customized supply chain security program as well as in-depth analysis of commonly encountered supply chain security problems. It also supplies a massive amount of credible cargo theft statistics and provides solutions and best practices to supply chain professionals who must determine their company's risk and mitigate their losses by adopting customizable security programs. Furthermore, it presents cutting-edge techniques that industry professionals can use to prevent losses and keep their cargo secure at every stage along the supply chain. This book will be of interest to manufacturing, logistics and security professionals including chief security officers, VPs of logistics or supply chain operations, and transportation managers, as well as professionals in any company that manufactures, ships, transports, stores, distributes, secures or is otherwise responsible for bulk product and cargo.
It is now possible to predict the future when it comes to crime. In
" Data Mining and Predictive Analysis," Dr. Colleen McCue describes
not only the possibilities for data mining to assist law
enforcement professionals, but also provides real-world examples
showing how data mining has identified crime trends, anticipated
community hot-spots, and refined resource deployment decisions. In
this book Dr. McCue describes her use of "off the shelf" software
to graphically depict crime trends and to predict where future
crimes are likely to occur. Armed with this data, law enforcement
executives can develop "risk-based deployment strategies," that
allow them to make informed and cost-efficient staffing decisions
based on the likelihood of specific criminal activity.
The high-technology crime investigator's profession is one of the
fastest growing professions in the world today, as information
security issues and crimes related to them are growing in number
and magnitude at an ever-increasing pace. "High-Technology Crime
Investigator's Handbook, Second Edition," informs professionals of
the potential risks of computer crimes, and serves as a guide to
establishing and managing a high-technology crime investigative
program. Each chapter is updated with the latest information and
guidance, including added coverage of computer forensics and
additional metrics to measure organizational performance. In
addition, nine new chapters cover emerging trends in the field, and
offer invaluable guidance on becoming a successful high-technology
crime investigator.
The information systems security (InfoSec) profession remains one
of the fastest growing professions in the world today. With the
advent of the Internet and its use as a method of conducting
business, even more emphasis is being placed on InfoSec. However,
there is an expanded field of threats that must be addressed by
today's InfoSec and information assurance (IA) professionals.
In reaction to the continually changing business climate companies
develop many business strategies to increase their competitiveness
and improve profitability. Companies regularly reshape themselves
continually exploring new markets and developing new products. When
they can't expand into new markets or develop new products on their
own, they seek alternatives. These alternatives include merging
with or acquiring other companies to create a single more capable
company. Companies acquire other companies for a wide variety of
reasons. In some cases company survival may actually be the reason.
What does this condition mean to the security professional? In the
course of mergers and acquisitions, security plays a vital role in
helping to make the endeavor successful. There are numerous titles
on the business aspects of M&A such as the ones listed below.
However, this unique book focuses on the role security plays in
helping to make a merger, acquisition or divestiture successful. It
addresses the fundamental security elements that are required to
support the effort. In addition, it provides an integrated "how to"
approach to implementing M&A security complete with methods and
processes that have been quickly and cost-effectively implemented.
PRIVATE SECURITY AND THE LAW is a textbook analysis of significant
practices in the security industry that relate to law, regulation,
licensure and constitutional dilemmas according to case and
statutory authority. It is a treatise on the state of the law that
governs the security industry and its operatives. The text delivers
up to date information on the legal requirements witnessed by most
security firms. In addition, it dwells heavily on the liability
problems common to security operations, including negligence and
tortious liability, civil actions commonly litigated, and
strategies to avoid troublesome causes of action that effect
business efficiency. From another angle, the work intensely
examines the constitutional and due process dimensions of private
security work and affords the reader a look at how case law applies
certain remedies to wronged parties. Recent cases, and the trends
sure to follow, are highlighted throughout the project. Finally,
the text is filled with checklists, data and other useful
information that aids the security practitioner in applying theory
to practice.
Guard Force Management looks at the contract guard force as a
business and demonstrates how current management techniques can be
used to improve efficiency and increase profitability. The author
takes proven management principles and applies them to the
competitive security industry.
The Security Handbook, Second Edition is a user-friendly guide for
security officers and guards, covering everything from introductory
information to advanced topics. Whether looking for entry into the
profession or development within the security industry, this book
offers the practical information, training, and need-to-know
techniques for the realization of professional goals. |
You may like...
The Manager's Handbook for Corporate…
Gerald L. Kovacich, Edward Halibozek
Hardcover
R1,738
Discovery Miles 17 380
Information Assurance - Managing…
Joseph Boyce, Daniel Jennings
Paperback
R2,514
Discovery Miles 25 140
Background Screening and Investigations…
W. Barry Nixon, Kim Kerr
Paperback
Physical Security Systems Handbook - The…
Michael Khairallah
Hardcover
R1,460
Discovery Miles 14 600
|