![]() |
![]() |
Your cart is empty |
||
Books > Academic & Education > Professional & Technical > Security
The need to professionally and successfully conduct computer
forensic investigations of incidents and crimes has never been
greater. This has caused an increased requirement for information
about the creation and management of computer forensic laboratories
and the investigations themselves. This includes a great need for
information on how to cost-effectively establish and manage a
computer forensics laboratory. This book meets that need: a clearly
written, non-technical book on the topic of computer forensics with
emphasis on the establishment and management of a computer
forensics laboratory and its subsequent support to successfully
conducting computer-related crime investigations.
Intruder Alarms provides a definitive and fully up-to-date guide to
the specification, systems design, integration, installation and
maintenance of intruder alarm systems. It has been written to be
the essential handbook for installation engineers and security
professionals working in this rapidly expanding and developing
area.
In the latest edition, Philip Walker not only tackles the
electronic aspect of the design of a security system, but also
examines the human factor in such systems. In his own words:
'Electronic aids are added to enable security officers to do their
jobs better, but not to do their jobs for them'.
As crime rates soar every householder looks at ways to protect
their home and its contents. This practical guide, in
straightforward language, spells out the simple steps you can take
to guard your home. It shows how burglars work, and how to thwart
them. The selection and installation of alarm systems are described
simply. This handy volume may provide the information you need to
avoid costly and upsetting break-ins.
" High-Security Mechanical Locks " comprehensively surveys and
explains the highly technical area of high security locks in a way
that is accessible to a wide audience. Well over 100 different
locks are presented, organized into 6 basic types. Each chapter
introduces the necessary concepts in a historical perspective and
further categorizes the locks. This is followed by detailed 'how it
works' descriptions with many pictures, diagrams and references.
The descriptions are based on actual dissections of the real locks.
Design and Evaluation of Physical Security Systems, 2e, includes
updated references to security expectations and changes since 9/11.
The threat chapter includes references to new threat capabilities
in Weapons of Mass Destruction, and a new figure on hate crime
groups in the US. All the technology chapters have been reviewed
and updated to include technology in use since 2001, when the first
edition was published. Garcia has also added a new chapter that
shows how the methodology described in the book is applied in
transportation systems. College faculty who have adopted this text
have suggested improvements and these have been incorporated as
well. This second edition also includes some references to the
author's recent book on Vulnerability Assessment, to link the two
volumes at a high level.
The classic book "The Art of War" (or as it is sometimes
translated, "The Art of Strategy") by Sun Tzu is often used to
illustrate principles that can apply to the management of business
environments. "The Art of War for Security Managers" is the first
book to apply the time-honored principles of Sun Tzu's theories of
conflict to contemporary organizational security.
Vulnerability Assessment of Physical Protection Systems will
describe the entire vulnerability assessment (VA) process, from the
start of planning through final analysis and out brief to senior
management. The text will draw heavily on the principles introduced
in the author's best-selling Design and Evaluation of Physical
Protection Systems and allow readers to apply those principles and
conduct a VA that is aligned with system objectives and achievable
with existing budget and personnel resources. The book will address
the full spectrum of a VA, including negotiating tasks with the
customer, project management and planning of the VA, team
membership, step-by-step details for performing the VA, data
collection and analysis, important notes on how to use the VA to
suggest design improvements and generate multiple design options.
The text will end with a discussion of how to out brief the results
to senior management in order to gain their support and demonstrate
the return on investment of their security dollar. Several new
tools will be introduced to help readers organize and use the
information at their sites and allow them to mix the physical
protection system with other risk management measures to reduce
risk to an acceptable level at an affordable cost and with the
least operational impact.
This book is the only one available on security training for all
level of personnel. Chief Security Officers (CSOs), security
managers, and heads of security forces often have to design
training programs themselves from scratch or rely on outside
vendors and outside training companies to provide training which is
often dry, stilted, and not always applicable to a specific
corporate or government setting. This title addresses the theories
of sound security training and awareness, then shows the reader how
to put the theories into practice when developing or presenting any
form of security education, training, motivation or awareness.
FINDsomeone.com is the complete people-finder of the communications
age. This timely reference offers proven and effective search
techniques for finding anybody, anywhere. The professional
techniques described in FINDsomeone.com were developed by the
author over many years in military intelligence, international
security, and as a professional investigator. Core strategies for
conducting adoption, genealogical, and other missing persons
investigations are discussed in clear and understandable terms.
Security: A Guide to Security System Design and Equipment Selection
and Installation, 2ed is the first comprehensive reference for
electronic security systems. In eight chapters, it guides the
reader through selection, installation, testing, and maintenance of
security equipment in 35 categories, from interior and exterior
sensors to security systems, The uninformed purchaser, the
security-conscious manager, and the novice security practitioner
will find that this book demystifies the "black art" of security
systems design via clear descriptions of operation principles and
extensive practical advice. The more knowledgeable reader will find
a unique reference and compendium of information usually found in
many separate sources. Each device explained in this book is broken
down into sections covering its principles of operation, uses,
applications, equipment types, and advantages and disadvantages.
This important reference outlines the data objectively, enabling
the reader to independently make informed judgments about competing
bids or proposals, compile a brief, and design or maintain a
security system.
"Introduction to Security" has been the leading text on private
security for over thirty years. Celebrated for its balanced and
professional approach, this new edition gives future security
professionals a broad, solid base that prepares them to serve in a
variety of positions. Security is a diverse and rapidly growing
field that is immune to outsourcing. The author team as well as an
outstanding group of subject-matter experts combine their knowledge
and experience with a full package of materials geared to
experiential learning. As a recommended title for security
certifications, and an information source for the military, this is
an essential reference for all security professionals. This timely
revision expands on key topics and adds new material on important
issues in the 21st century environment such as the importance of
communication skills; the value of education; internet-related
security risks; changing business paradigms; and brand
protection.
"The Handbook of Loss Prevention and Crime Prevention, 5e, "is a trusted resource for physical security professionals, students, and candidates for the coveted Certified Protection Professional (CPP) certification administered by ASIS International. The U.S. government recently announced that employees will have to obtain CPP certification to advance in their careers. Edited by the security practitioner and author Lawrence
Fennelly, this handbook gathers in a single volume the key
information on each topic from eminent subject-matter experts.
Taken together, this material offers a range of approaches for
defining security problems and tools for designing solutions in a
world increasingly characterized by complexity and chaos. The 5e
adds cutting-edge content and up-to-the-minute practical examples
of its application to problems from retail crime to disaster
readiness. * Covers every important topic in the field, including the latest on wireless security applications, data analysis and visualization, situational crime prevention, and global security standards and compliance issues * Required reading for the certification DHS selected for its infrastructure security professionals * Each chapter is contributed by a top security professional with subject-matter expertise
The attacks on the World Trade Center and the Pentagon on September
11, 2001 changed the way the world thinks about security. Everyday
citizens learned how national security, international politics, and
the economy are inextricably linked to business continuity and
corporate security. Corporate leaders were reminded that the
security of business, intellectual, and human assets has a
tremendous impact on an organization's long-term viability.
As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of "Risk Analysis and the Security Survey. "Broder and Tucker guide you throughanalysis toimplementationto provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updating and covering new content. Understand the most fundamental theories surrounding risk control, design, and implementation by reviewing topics such as cost/benefit analysis, crime prediction, response planning, and business impact analysis--all updated to match today's current standards. This book will show you how to develop and maintain current
business contingency and disaster recovery plans to ensure your
enterprises are able to sustain loss are able to recover, and
protect your assets, be it your business, your information, or
yourself, from threats. *Offers powerful techniques for weighing and managing the risks that face your organization *Gives insights into universal principles that can be adapted to specific situations and threats *Covers topics needed by homeland security professionals as well as IT and physical security managers"
" The Encyclopedia of Security Management " is a valuable guide for
all security professionals, and an essential resource for those who
need a reference work to support their continuing education. In
keeping with the excellent standard set by the First Edition, the
Second Edition is completely updated.
The high-technology crime investigator's profession is one of the
fastest growing professions in the world today, as information
security issues and crimes related to them are growing in number
and magnitude at an ever-increasing pace. "High-Technology Crime
Investigator's Handbook, Second Edition," informs professionals of
the potential risks of computer crimes, and serves as a guide to
establishing and managing a high-technology crime investigative
program. Each chapter is updated with the latest information and
guidance, including added coverage of computer forensics and
additional metrics to measure organizational performance. In
addition, nine new chapters cover emerging trends in the field, and
offer invaluable guidance on becoming a successful high-technology
crime investigator.
"Strategic Security Management" supports data driven security that
is measurable, quantifiable and practical. Written for security
professionals and other professionals responsible for making
security decisions as well as for security management and criminal
justice students, this text provides a fresh perspective on the
risk assessment process. It also provides food for thought on
protecting an organization s assets, giving decision makers the
foundation needed to climb the next step up the corporate ladder.
The information systems security (InfoSec) profession remains one
of the fastest growing professions in the world today. With the
advent of the Internet and its use as a method of conducting
business, even more emphasis is being placed on InfoSec. However,
there is an expanded field of threats that must be addressed by
today's InfoSec and information assurance (IA) professionals.
In reaction to the continually changing business climate companies
develop many business strategies to increase their competitiveness
and improve profitability. Companies regularly reshape themselves
continually exploring new markets and developing new products. When
they can't expand into new markets or develop new products on their
own, they seek alternatives. These alternatives include merging
with or acquiring other companies to create a single more capable
company. Companies acquire other companies for a wide variety of
reasons. In some cases company survival may actually be the reason.
What does this condition mean to the security professional? In the
course of mergers and acquisitions, security plays a vital role in
helping to make the endeavor successful. There are numerous titles
on the business aspects of M&A such as the ones listed below.
However, this unique book focuses on the role security plays in
helping to make a merger, acquisition or divestiture successful. It
addresses the fundamental security elements that are required to
support the effort. In addition, it provides an integrated "how to"
approach to implementing M&A security complete with methods and
processes that have been quickly and cost-effectively implemented.
The Security Handbook, Second Edition is a user-friendly guide for
security officers and guards, covering everything from introductory
information to advanced topics. Whether looking for entry into the
profession or development within the security industry, this book
offers the practical information, training, and need-to-know
techniques for the realization of professional goals.
Written by two INFOSEC experts, this book provides a systematic and
practical approach for establishing, managing and operating a
comprehensive Information Assurance program. It is designed to
provide ISSO managers, security managers, and INFOSEC professionals
with an understanding of the essential issues required to develop
and apply a targeted information security posture to both public
and private corporations and government run agencies. The authors lay out a detailed strategy for defining information
security, establishing IA goals, providing training for security
awareness, and conducting airtight incident response to system
compromise. Such topics as defense in depth, configuration
management, IA legal issues, and the importance of establishing an
IT baseline are covered in-depth from an organizational and
managerial decision-making perspective.
Women in Public and Private Law Enforcement is hands-down the most
comprehensive examination of women in law enforcement to date. Most
importantly, it fills the current void that exists for texts on
this important and growing area of law enforcement. Both public and
private sector law enforcement are covered including policing and
private security. For policing this includes not only municipal
policing, but also state and federal law enforcement. For the
security industry, coverage includes not only private security
guards but also various other occupations that may be included
under private security such as protection specialists. The book's primary focus is on gender with limited attention
paid to race and ethnicity. Some comparisons are made when
appropriate, but the ultimate goal is to provide the reader the
most comprehensive analysis with respect to gender. Finally, the
authors provide women in law enforcement today with detailed
analysis and description of how far they have come, the struggles
they have faced, the challenges they have overcome, and the
achievements they have made.
Understanding Crime Prevention, Second Edition is a revamping of a
popular classic written by NCPI, the primary training school for
crime prevention officers in the country. It is a basic
introduction to the concepts of crime prevention and security
techniques and equipment which aid the crime prevention effort. The
fundamental material has been updated with current and contemporary
examples.
Internal loss is one of the most costly forms of loss. Embezzlement
is one of the least detected and prosecuted forms of internal
theft. Preventing Corporate Embezzlement is a professional
reference that offers solutions. Managers, auditors and others
charged with protecting assets must achieve a heightened awareness
of embezzlement. They need to recognize and understand the
opportunities, methods, and varieties of embezzlement, as well as
establish internal controls that will prevent and detect
embezzlement. |
![]() ![]() You may like...
Prisoner 913 - The Release Of Nelson…
Riaan de Villiers, Jan-Ad Stemmet
Paperback
Radioactivity - History, Science, Vital…
Michael F. L'Annunziata
Hardcover
Arsenic: Natural and Anthropogenic
Eleonora Deschamps, Joerg Matschullat
Paperback
R2,427
Discovery Miles 24 270
|