0
Your cart

Your cart is empty

Browse All Departments
Price
  • R500+ (63)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Security

Securing Intellectual Property - Protecting Trade Secrets and Other Information Assets (Paperback): Information Security Securing Intellectual Property - Protecting Trade Secrets and Other Information Assets (Paperback)
Information Security
R1,352 Discovery Miles 13 520 Ships in 10 - 15 working days

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.
Nearly all books that address the topic of trade secrets have the spy vs. spy perspective. The author approaches the topic from a practical business perspective and not simply creating paranoia for paranoia s sake. The material for this book comes from the author s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managersSample agreements and forms that address specific business needsCoverage of threats ranging from physical security lapses to hackers to social engineering"

Intruder Alarms (Paperback, 3rd edition): Gerard Honey Intruder Alarms (Paperback, 3rd edition)
Gerard Honey
R1,008 Discovery Miles 10 080 Ships in 10 - 15 working days

Intruder Alarms provides a definitive and fully up-to-date guide to the specification, systems design, integration, installation and maintenance of intruder alarm systems. It has been written to be the essential handbook for installation engineers and security professionals working in this rapidly expanding and developing area.
The third edition includes new material on systems integration, digital systems, wireless and remote signalling technologies, and electrical safety.
The revision has brought coverage fully in line with the new European standards (EN50131 / BS EN 50131-1), with their implications summarised in a new appendix. The coverage has also been carefully matched to the requirements of the new Knowledge of Security and Emergency Alarm Systems from City & Guilds (1852).
* An hugely popular practical guide for installation engineers and security professionals now in its third edition
* Essential reading for managers responsible for the commissioning and maintenance of security alarm systems
* Third edition is fully matched to the new European standards (EN50131 / BS EN 50131-1)
* Coverage meets City & Guilds specifications for the new 1852 Security Alarm course

Design and Evaluation of Physical Protection Systems (Paperback, 2nd edition): Mary Lynn Garcia Design and Evaluation of Physical Protection Systems (Paperback, 2nd edition)
Mary Lynn Garcia
R1,535 Discovery Miles 15 350 Ships in 10 - 15 working days

Design and Evaluation of Physical Security Systems, 2e, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.
* New chapter on transportation systems
* Extensively updated chapter on threat definition
* Major changes to response chapter

The Art of War for Security Managers - 10 Steps to Enhancing Organizational Effectiveness (Paperback, New): Scott Watson The Art of War for Security Managers - 10 Steps to Enhancing Organizational Effectiveness (Paperback, New)
Scott Watson
R940 Discovery Miles 9 400 Ships in 10 - 15 working days

The classic book "The Art of War" (or as it is sometimes translated, "The Art of Strategy") by Sun Tzu is often used to illustrate principles that can apply to the management of business environments. "The Art of War for Security Managers" is the first book to apply the time-honored principles of Sun Tzu's theories of conflict to contemporary organizational security.
Corporate leaders have a responsibility to make rational choices that maximize return on investment. The author posits that while conflict is inevitable, it need not be costly. The result is an efficient framework for understanding and dealing with conflict while minimizing costly protracted battles, focusing specifically on the crucial tasks a security manager must carry out in a 21st century organization.
* Includes an appendix with job aids the security manager can use in day-to-day workplace situations
* Provides readers with a framework for adapting Sun Tzu's theories of conflict within their own organizations
* From an author who routinely packs the room at his conference presentations

Security Education, Awareness and Training - SEAT from Theory to Practice (Paperback, New): Carl Roper, Dr Lynn Fischer, Joseph... Security Education, Awareness and Training - SEAT from Theory to Practice (Paperback, New)
Carl Roper, Dr Lynn Fischer, Joseph A. Grau
R1,325 Discovery Miles 13 250 Ships in 10 - 15 working days

This book is the only one available on security training for all level of personnel. Chief Security Officers (CSOs), security managers, and heads of security forces often have to design training programs themselves from scratch or rely on outside vendors and outside training companies to provide training which is often dry, stilted, and not always applicable to a specific corporate or government setting. This title addresses the theories of sound security training and awareness, then shows the reader how to put the theories into practice when developing or presenting any form of security education, training, motivation or awareness.
* Shows how to establish and integrate a structured, internally consistent and coherent program from the ground up
* Illustrates how to assess and analyze security program needs and audience and customize training accordingly
* Numerous Appendices to help the security manager justify security spending on training initiatives

Vulnerability Assessment of Physical Protection Systems (Paperback): Mary Lynn Garcia Vulnerability Assessment of Physical Protection Systems (Paperback)
Mary Lynn Garcia
R1,409 Discovery Miles 14 090 Ships in 10 - 15 working days

Vulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allow readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The book will address the full spectrum of a VA, including negotiating tasks with the customer, project management and planning of the VA, team membership, step-by-step details for performing the VA, data collection and analysis, important notes on how to use the VA to suggest design improvements and generate multiple design options. The text will end with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools will be introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact.
- Guides the reader through the topic of physical security doing so with a unique, detailed and scientific approach
- Takes the reader from beginning to end and step-by-step through a Vulnerability Assessment
- Over 150 figures and tables to illustrate key concepts

FINDsomeone.com (Paperback): R.Scott Grasser FINDsomeone.com (Paperback)
R.Scott Grasser
R1,105 Discovery Miles 11 050 Ships in 10 - 15 working days

FINDsomeone.com is the complete people-finder of the communications age. This timely reference offers proven and effective search techniques for finding anybody, anywhere. The professional techniques described in FINDsomeone.com were developed by the author over many years in military intelligence, international security, and as a professional investigator. Core strategies for conducting adoption, genealogical, and other missing persons investigations are discussed in clear and understandable terms.
FINDsomeone.com contains numerous sample search reports, which can be used in conjunction with the author's web site FINDsomeone.com or on their own. The book describes in detail the most powerful communications tools that the Internet and modern technology now provide, combined with a range of other time-honored investigative techniques.
R. Scott Grasser is an international security consultant and licensed private investigator. Grasser has both corporate and governmental experience, including a decade as a former Captain with 5th Special Forces Group and the military police. He has successfully taught searching skills to hundreds of students taking his America Online course "Private Investigative Techniques" and as a featured speaker at San Francisco's Bay Area Law Enforcement and Security Liaison Group, ASIS, and North Bay Industrial Security Awareness Council.

The complete people-finder for the communications age.
Details Internet, telephone, and governmental record searches.
Can be used in conjunction with the author's Internet site, FINDsomeone.com.

Security: A Guide to Security System Design and Equipment Selection and Installation (Paperback, 2nd edition): Neil Cumming Security: A Guide to Security System Design and Equipment Selection and Installation (Paperback, 2nd edition)
Neil Cumming
R1,542 Discovery Miles 15 420 Ships in 10 - 15 working days

Security: A Guide to Security System Design and Equipment Selection and Installation, 2ed is the first comprehensive reference for electronic security systems. In eight chapters, it guides the reader through selection, installation, testing, and maintenance of security equipment in 35 categories, from interior and exterior sensors to security systems, The uninformed purchaser, the security-conscious manager, and the novice security practitioner will find that this book demystifies the "black art" of security systems design via clear descriptions of operation principles and extensive practical advice. The more knowledgeable reader will find a unique reference and compendium of information usually found in many separate sources. Each device explained in this book is broken down into sections covering its principles of operation, uses, applications, equipment types, and advantages and disadvantages. This important reference outlines the data objectively, enabling the reader to independently make informed judgments about competing bids or proposals, compile a brief, and design or maintain a security system.
Neil Cumming is a partner at Dodd, Cumming, and Love, Consulting Engineers in Plymouth, England. As Projects Manager for all security projects, he is directly responsible for the design of all security systems from inception to completion for a variety of clients. In this role, Mr. Cumming has designed and supervised the installation of security systems on private and military sites throughout Britain and the Middle East. Starting working life as an apprentice electrician, Mr. Cumming later studies at the City University, London, earning a degree in Building Services and Environmental Engineering.
It is a comprehensive reference for electronic security systems.
Guides the reader through all aspects of electronic security systems from selection to maintenance.
Uses detailed descriptions of operations principles and practical advice to make the use of security systems easier to understand.

Introduction to Security (Hardcover, 9th edition): Robert Fischer, Edward Halibozek, David Walters Introduction to Security (Hardcover, 9th edition)
Robert Fischer, Edward Halibozek, David Walters
R1,591 Discovery Miles 15 910 Ships in 10 - 15 working days

"Introduction to Security" has been the leading text on private security for over thirty years. Celebrated for its balanced and professional approach, this new edition gives future security professionals a broad, solid base that prepares them to serve in a variety of positions. Security is a diverse and rapidly growing field that is immune to outsourcing. The author team as well as an outstanding group of subject-matter experts combine their knowledge and experience with a full package of materials geared to experiential learning. As a recommended title for security certifications, and an information source for the military, this is an essential reference for all security professionals. This timely revision expands on key topics and adds new material on important issues in the 21st century environment such as the importance of communication skills; the value of education; internet-related security risks; changing business paradigms; and brand protection.
New sections on terrorism and emerging security threats like cybercrime and piracy Top industry professionals from aerospace and computer firms join instructors from large academic programs as co-authors and contributors Expanded ancillaries for both instructors and students, including interactive web-based video and case studies

Handbook of Loss Prevention and Crime Prevention (Hardcover, 5th edition): Lawrence Fennelly Handbook of Loss Prevention and Crime Prevention (Hardcover, 5th edition)
Lawrence Fennelly
R1,940 Discovery Miles 19 400 Ships in 10 - 15 working days

"The Handbook of Loss Prevention and Crime Prevention, 5e, "is a trusted resource for physical security professionals, students, and candidates for the coveted Certified Protection Professional (CPP) certification administered by ASIS International. The U.S. government recently announced that employees will have to obtain CPP certification to advance in their careers.

Edited by the security practitioner and author Lawrence Fennelly, this handbook gathers in a single volume the key information on each topic from eminent subject-matter experts. Taken together, this material offers a range of approaches for defining security problems and tools for designing solutions in a world increasingly characterized by complexity and chaos. The 5e adds cutting-edge content and up-to-the-minute practical examples of its application to problems from retail crime to disaster readiness.

* Covers every important topic in the field, including the latest on wireless security applications, data analysis and visualization, situational crime prevention, and global security standards and compliance issues * Required reading for the certification DHS selected for its infrastructure security professionals * Each chapter is contributed by a top security professional with subject-matter expertise

Rethinking Corporate Security in the Post-9/11 Era - Issues and Strategies for Today's Global Business Community... Rethinking Corporate Security in the Post-9/11 Era - Issues and Strategies for Today's Global Business Community (Hardcover, New)
Dennis Dalton
R1,271 Discovery Miles 12 710 Ships in 10 - 15 working days

The attacks on the World Trade Center and the Pentagon on September 11, 2001 changed the way the world thinks about security. Everyday citizens learned how national security, international politics, and the economy are inextricably linked to business continuity and corporate security. Corporate leaders were reminded that the security of business, intellectual, and human assets has a tremendous impact on an organization's long-term viability.
In Rethinking Corporate Security, Fortune 500 consultant Dennis Dalton helps security directors, CEOs, and business managers understand the fundamental role of security in today's business environment and outlines the steps to protect against corporate loss. He draws on the insights of such leaders as Jack Welch, Bill Gates, Charles Schwab, and Tom Peters in this unique review of security's evolving role and the development of a new management paradigm.
* If you truly wish to improve your own skills, and the effectiveness of your Corporation's security focus, you need to read this book
* Presents connections of theory to real-world case examples in historical and contemporary assessment of security management principles
* Applies classic business and management strategies to the corporate security management function

Risk Analysis and the Security Survey (Hardcover, 4th edition): James F. Broder, Gene Tucker Risk Analysis and the Security Survey (Hardcover, 4th edition)
James F. Broder, Gene Tucker
R1,502 Discovery Miles 15 020 Ships in 10 - 15 working days

As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of "Risk Analysis and the Security Survey. "Broder and Tucker guide you throughanalysis toimplementationto provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updating and covering new content. Understand the most fundamental theories surrounding risk control, design, and implementation by reviewing topics such as cost/benefit analysis, crime prediction, response planning, and business impact analysis--all updated to match today's current standards.

This book will show you how to develop and maintain current business contingency and disaster recovery plans to ensure your enterprises are able to sustain loss are able to recover, and protect your assets, be it your business, your information, or yourself, from threats.

*Offers powerful techniques for weighing and managing the risks that face your organization *Gives insights into universal principles that can be adapted to specific situations and threats *Covers topics needed by homeland security professionals as well as IT and physical security managers"

High-Rise Security and Fire Life Safety (Hardcover, 3rd edition): Geoff Craighead High-Rise Security and Fire Life Safety (Hardcover, 3rd edition)
Geoff Craighead
R3,467 Discovery Miles 34 670 Ships in 18 - 22 working days

"High-Rise Security and Fire Life Safety, 3e, " is a comprehensive reference for managing security and fire life safety operations within high-rise buildings. It spells out the unique characteristics of skyscrapers from a security and fire life safety perspective, details the type of security and life safety systems commonly found in them, outlines how to conduct risk assessments, and explains security policies and procedures designed to protect life and property. Craighead also provides guidelines for managing security and life safety functions, including the development of response plans for building emergencies. This latest edition clearly separates out the different types of skyscrapers, from office buildings to hotels to condominiums to mixed-use buildings, and explains how different patterns of use and types of tenancy impact building security and life safety.

New to this edition:

Differentiates security and fire life safety issues specific to:

Office towers

Hotels

Residential and apartment buildings

Mixed-use buildings

Updated fire and life safety standards and guidelines Includes a CD-ROM with electronic versions of sample survey checklists, a sample building emergency management plan, and other security and fire life safety resources.

Security Design Consulting - The Business Of System Security Design (Hardcover, New): Brian Gouin Security Design Consulting - The Business Of System Security Design (Hardcover, New)
Brian Gouin
R1,016 Discovery Miles 10 160 Ships in 10 - 15 working days

A crucial reference for the practicing or aspiring design consultant, "Security Design Consulting" brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, "Security Design Consulting" gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant's important and growing role in an overall security program.
* Focuses on consulting in security design, not security management
* Provides sample service agreements, specifications, and reports to use as models
* Emphasizes the highest technical and ethical standards for this increasingly crucial profession

High-Technology Crime Investigator's Handbook - Establishing and Managing a High-Technology Crime Prevention Program... High-Technology Crime Investigator's Handbook - Establishing and Managing a High-Technology Crime Prevention Program (Paperback, 2nd edition)
Gerald L. Kovacich, William C. Boni
R1,909 Discovery Miles 19 090 Ships in 18 - 22 working days

The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. "High-Technology Crime Investigator's Handbook, Second Edition," informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator.
* Provides an understanding of the global information environment and its threats
* Explains how to establish a high-technology crime investigations unit and prevention program
* Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers

Risk Management for Computer Security - Protecting Your Network and Information Assets (Paperback): Andy Jones, Debi Ashenden Risk Management for Computer Security - Protecting Your Network and Information Assets (Paperback)
Andy Jones, Debi Ashenden
R1,572 Discovery Miles 15 720 Ships in 18 - 22 working days

The information systems security (InfoSec) profession remains one of the fastest growing professions in the world today. With the advent of the Internet and its use as a method of conducting business, even more emphasis is being placed on InfoSec. However, there is an expanded field of threats that must be addressed by today's InfoSec and information assurance (IA) professionals.
Operating within a global business environment with elements of a virtual workforce can create problems not experienced in the past. How do you assess the risk to the organization when information can be accessed, remotely, by employees in the field or while they are traveling internationally? How do you assess the risk to employees who are not working on company premises and are often thousands of miles from the office? How do you assess the risk to your organization and its assets when you have offices or facilities in a nation whose government may be supporting the theft of the corporate "crown jewels" in order to assist their own nationally owned or supported corporations? If your risk assessment and management program is to be effective, then these issues must be assessed.
Personnel involved in the risk assessment and management process face a much more complex environment today than they have ever encountered before.
This book covers more than just the fundamental elements that make up a good risk program. It provides an integrated "how to" approach to implementing a corporate program, complete with tested methods and processes; flowcharts; and checklists that can be used by the reader and immediately implemented into a computer and overall corporate security program. The challenges are many and this book will help professionals in meeting their challenges as we progress through the 21st Century.
*Presents material in an engaging, easy-to-follow manner that will appeal to both advanced INFOSEC career professionals and network administrators entering the information security profession
*Addresses the needs of both the individuals who are new to the subject as well as of experienced professionals
*Provides insight into the factors that need to be considered & fully explains the numerous methods, processes & procedures of risk management

Mergers and Acquisitions Security - Corporate Restructuring and Security Management (Paperback): Edward Halibozek, Gerald L.... Mergers and Acquisitions Security - Corporate Restructuring and Security Management (Paperback)
Edward Halibozek, Gerald L. Kovacich
R1,945 Discovery Miles 19 450 Ships in 18 - 22 working days

In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly reshape themselves continually exploring new markets and developing new products. When they can't expand into new markets or develop new products on their own, they seek alternatives. These alternatives include merging with or acquiring other companies to create a single more capable company. Companies acquire other companies for a wide variety of reasons. In some cases company survival may actually be the reason. What does this condition mean to the security professional? In the course of mergers and acquisitions, security plays a vital role in helping to make the endeavor successful. There are numerous titles on the business aspects of M&A such as the ones listed below. However, this unique book focuses on the role security plays in helping to make a merger, acquisition or divestiture successful. It addresses the fundamental security elements that are required to support the effort. In addition, it provides an integrated "how to" approach to implementing M&A security complete with methods and processes that have been quickly and cost-effectively implemented.
- First book available that focuses on the role of the Security Manager in M&A
- Case studies that highlight the role of the security manager; cases include both best practices as well as illustrations of nightmare examples of what NOT to do
- Lead author is an expert that has participated in/managed security for more than 20 high-profile and large-scale acquisitions
- Model processes, procedures, checklists, charts and sample forms all serve to ease immediate analysis and implementation in a merger or acquisition

The Security Handbook (Paperback, 2nd edition): Philip Purpura The Security Handbook (Paperback, 2nd edition)
Philip Purpura
R1,698 Discovery Miles 16 980 Ships in 18 - 22 working days

The Security Handbook, Second Edition is a user-friendly guide for security officers and guards, covering everything from introductory information to advanced topics. Whether looking for entry into the profession or development within the security industry, this book offers the practical information, training, and need-to-know techniques for the realization of professional goals.
The Second Edition emphasizes the proper skills required to improve job performance -- customer service, security methods, patrolling, communicating, and report writing. Chapters cover such important topics as arrest law and procedure (including legal liability), self-defense and weapons, a new section on career planning, violence in the workplace, internal theft, burglary, robbery, terrorism, cybercrime, and first response during emergencies. Countermeasures to a variety of threats are explained throughout the book.
Experienced security officers, supervisors, and managers will also find the book useful in outlining the changing roles and responsibilities of the protection officer and for helping train their front line staff.
* Covers every important aspect of the security officer's job, with several new updates and access to online sources
* Defines key terms and outlines basic information before moving on to more advanced topics
* Each chapter includes an outline, chapter objectives, and follows with review questions to aid in the learning process
* Features numerous examples, illustrations, Web sites, case studies, and new "What if?" scenarios to relate theory to practice
* Serves as a comprehensive study guide for state mandated training and certification exams such as the Certified Protection Officer (CPO) program sponsored by the IFPO

Information Assurance - Managing Organizational IT Security Risks (Paperback): Joseph Boyce, Daniel Jennings Information Assurance - Managing Organizational IT Security Risks (Paperback)
Joseph Boyce, Daniel Jennings
R2,258 Discovery Miles 22 580 Ships in 18 - 22 working days

Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted information security posture to both public and private corporations and government run agencies.
There is a growing concern among all corporations and within the security industry to come up with new approaches to measure an organization's information security risks and posture. Information Assurance explains and defines the theories and processes that will help a company protect its proprietary information including:
* The need to assess the current level of risk.
* The need to determine what can impact the risk.
* The need to determine how risk can be reduced.

The authors lay out a detailed strategy for defining information security, establishing IA goals, providing training for security awareness, and conducting airtight incident response to system compromise. Such topics as defense in depth, configuration management, IA legal issues, and the importance of establishing an IT baseline are covered in-depth from an organizational and managerial decision-making perspective.
* Experience-based theory provided in a logical and comprehensive manner.
* Management focused coverage includes establishing an IT security posture, implementing organizational awareness and training, and understanding the dynamics of new technologies.
* Numerous real-world examples provide a baseline for assessment and comparison.

Women in Public and Private Law Enforcement (Paperback): Pamela A Collins, Kim Scarborough Women in Public and Private Law Enforcement (Paperback)
Pamela A Collins, Kim Scarborough
R1,636 Discovery Miles 16 360 Ships in 18 - 22 working days

Women in Public and Private Law Enforcement is hands-down the most comprehensive examination of women in law enforcement to date. Most importantly, it fills the current void that exists for texts on this important and growing area of law enforcement. Both public and private sector law enforcement are covered including policing and private security. For policing this includes not only municipal policing, but also state and federal law enforcement. For the security industry, coverage includes not only private security guards but also various other occupations that may be included under private security such as protection specialists.
Women in Public and Private Law Enforcement is intended for academicians and students of sociology, criminal justice, psychology, business, management and loss prevention as a resource on women in non-traditional occupations, specifically law enforcement. It is also intended for professionals in the field today, to apprize them of contemporary issues for women in law enforcement and serve as a reference to guide policy and procedure development.
Authors Pamela Collins and Kathryn Scarborough not only define distinctions in law enforcement and private security but also provide an understanding of the importance of specificity, with regard to this occupational analysis. The authors' diverse background allows them to offer uniquely complementary approach, emphasizing both the importance of understanding the professions from a practical standpoint, while at the same time giving credence to academic analysis.

The book's primary focus is on gender with limited attention paid to race and ethnicity. Some comparisons are made when appropriate, but the ultimate goal is to provide the reader the most comprehensive analysis with respect to gender. Finally, the authors provide women in law enforcement today with detailed analysis and description of how far they have come, the struggles they have faced, the challenges they have overcome, and the achievements they have made.
* The only complete review of women in law enforcement and security
* An ideal text for students in criminal justice and law enforcement courses
* Reviews the current role of women in local, state, and federal agencies

Understanding Crime Prevention (Paperback, 2nd edition): George Richards, Ncpi Understanding Crime Prevention (Paperback, 2nd edition)
George Richards, Ncpi
R1,472 Discovery Miles 14 720 Ships in 18 - 22 working days

Understanding Crime Prevention, Second Edition is a revamping of a popular classic written by NCPI, the primary training school for crime prevention officers in the country. It is a basic introduction to the concepts of crime prevention and security techniques and equipment which aid the crime prevention effort. The fundamental material has been updated with current and contemporary examples.

*Includes glossary of crime prevention terms
*Includes an instructor's manual
*Practical, basic and comprehensive introduction to
security and loss procedures

Preventing Corporate Embezzlement (Paperback): Paul Shaw, Jack Bologna Preventing Corporate Embezzlement (Paperback)
Paul Shaw, Jack Bologna
R1,999 Discovery Miles 19 990 Ships in 18 - 22 working days

Internal loss is one of the most costly forms of loss. Embezzlement is one of the least detected and prosecuted forms of internal theft. Preventing Corporate Embezzlement is a professional reference that offers solutions. Managers, auditors and others charged with protecting assets must achieve a heightened awareness of embezzlement. They need to recognize and understand the opportunities, methods, and varieties of embezzlement, as well as establish internal controls that will prevent and detect embezzlement.

Practical tool for detecting and combatting embezzlement: checklists, forms and evaluations
Offers how-to advice on avoiding lawsuits by practicing preventive law
Lists further resources, publications and directories on embezzlement, internal controls and security, risk management, insurance, auditors, and security services and equipment

Netspionage - The Global Threat to Information (Paperback): William C. Boni, Gerald Kovacich Netspionage - The Global Threat to Information (Paperback)
William C. Boni, Gerald Kovacich
R1,559 Discovery Miles 15 590 Ships in 18 - 22 working days

This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers," "cyberpunks," and even intelligence agencies) has already resulted in several incidents that foreshadow the perilous future. Close study of these incidents demonstrates how difficult yet how important it is to confront the challenges of "netspionage" and its less intrusive cousins. The authors present a set of the known incidents and then outline protective measures that will reduce the potential and consequences of netspionage.
Unlike most security books, this one is written for managers and executives in non-protection roles of the organization, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise.

*Practical guide written from front-line experience
*Explains the evolution of information collection and why it has never been easier
*Highlights the tools of the trade and how they can be put to best use

Practical Security Training (Paperback): Patrick Kane Practical Security Training (Paperback)
Patrick Kane
R2,010 Discovery Miles 20 100 Ships in 18 - 22 working days

Practical Security Training is designed to help security departments develop effective security forces from the personnel screening and selection process to ensuring that proper, cost-efficient training is conducted. Using the building block and progressive method approach allows security staff to become increasingly more effective and more confident. Flexible and practicle, these tools allow security practitioners to adapt them as needed in different environments.
Considering hypothetical situations and case studies, performing drills and continually evaluating performance, the security staff can be better prepared to deal with both routine and emergency situations.
Advocates performance related training similar to that in a military environment
Describes performance-oriented drills
Considers and analyzes hypothetical situations

Security Investigations - A Professional's Guide (Paperback): Larry Gene Nicholson Security Investigations - A Professional's Guide (Paperback)
Larry Gene Nicholson
R1,838 Discovery Miles 18 380 Ships in 18 - 22 working days

Security Investigations is a comprehensive book that covers the full spectrum of investigative issues. It contains practical self-evaluation exercises that can be applied in both a formal or informal training environment. Corporate security supervisors will find it helpful in establishing policies and procedures for conducting investigations. It is a guide also for those responsible for the security function without prior experience. ie. Director of Human Resources. Forms in the book will assist an organization in standardizing the means to conduct investigations as well as reporting the outcome in a way that ensures that nothing was missed during the investigation. The real worth of an investigator is their ability to adapt to ever changing circumstances. This text gives the investigator a quick reference manual that can be used to: develop the investigation plan, take effective and accurate field notes, conduct an interview, perform surveillance and finally write the report, all within the legal guidelines outlined in the book. As an additional bonus to the reader, the book will include information on how to select and use the proper surveillance equipment.

Gives the reader the opportunity to practice their skills in answering questions based on real-world type investigations.
Offers self-evaluation exercises
Covers the full spectrum of investigative issues

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Casio MS-20UC - Desktop calculator 12…
R247 Discovery Miles 2 470
Nexx DK238 12 Digit Desktop Calculator
R295 Discovery Miles 2 950
Sharp EL-2607V Fast Printer Calculator
 (1)
R2,399 R2,271 Discovery Miles 22 710
SDS Compact 12-Digit Dual Power Desk…
R183 R140 Discovery Miles 1 400
Nexx DK027 8 Digit Desktop Calculator
R208 Discovery Miles 2 080
Trefoil 12 Digit Desktop Calculator
R118 Discovery Miles 1 180
Nexx CH903 8 Digit Palm Fit Calculator
R85 R78 Discovery Miles 780
Treeline Metal Cash Box (200mm)(8…
R279 Discovery Miles 2 790
Pritt Glue Stick (22g)
R44 R38 Discovery Miles 380
Butterfly Skullcandy Deluxe Pencil Case…
R150 R129 Discovery Miles 1 290

 

Partners