![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Academic & Education > Professional & Technical > Security
This book is the only one available on security training for all
level of personnel. Chief Security Officers (CSOs), security
managers, and heads of security forces often have to design
training programs themselves from scratch or rely on outside
vendors and outside training companies to provide training which is
often dry, stilted, and not always applicable to a specific
corporate or government setting. This title addresses the theories
of sound security training and awareness, then shows the reader how
to put the theories into practice when developing or presenting any
form of security education, training, motivation or awareness.
FINDsomeone.com is the complete people-finder of the communications
age. This timely reference offers proven and effective search
techniques for finding anybody, anywhere. The professional
techniques described in FINDsomeone.com were developed by the
author over many years in military intelligence, international
security, and as a professional investigator. Core strategies for
conducting adoption, genealogical, and other missing persons
investigations are discussed in clear and understandable terms.
Security: A Guide to Security System Design and Equipment Selection
and Installation, 2ed is the first comprehensive reference for
electronic security systems. In eight chapters, it guides the
reader through selection, installation, testing, and maintenance of
security equipment in 35 categories, from interior and exterior
sensors to security systems, The uninformed purchaser, the
security-conscious manager, and the novice security practitioner
will find that this book demystifies the "black art" of security
systems design via clear descriptions of operation principles and
extensive practical advice. The more knowledgeable reader will find
a unique reference and compendium of information usually found in
many separate sources. Each device explained in this book is broken
down into sections covering its principles of operation, uses,
applications, equipment types, and advantages and disadvantages.
This important reference outlines the data objectively, enabling
the reader to independently make informed judgments about competing
bids or proposals, compile a brief, and design or maintain a
security system.
"Introduction to Security" has been the leading text on private
security for over thirty years. Celebrated for its balanced and
professional approach, this new edition gives future security
professionals a broad, solid base that prepares them to serve in a
variety of positions. Security is a diverse and rapidly growing
field that is immune to outsourcing. The author team as well as an
outstanding group of subject-matter experts combine their knowledge
and experience with a full package of materials geared to
experiential learning. As a recommended title for security
certifications, and an information source for the military, this is
an essential reference for all security professionals. This timely
revision expands on key topics and adds new material on important
issues in the 21st century environment such as the importance of
communication skills; the value of education; internet-related
security risks; changing business paradigms; and brand
protection.
"The Handbook of Loss Prevention and Crime Prevention, 5e, "is a trusted resource for physical security professionals, students, and candidates for the coveted Certified Protection Professional (CPP) certification administered by ASIS International. The U.S. government recently announced that employees will have to obtain CPP certification to advance in their careers. Edited by the security practitioner and author Lawrence
Fennelly, this handbook gathers in a single volume the key
information on each topic from eminent subject-matter experts.
Taken together, this material offers a range of approaches for
defining security problems and tools for designing solutions in a
world increasingly characterized by complexity and chaos. The 5e
adds cutting-edge content and up-to-the-minute practical examples
of its application to problems from retail crime to disaster
readiness. * Covers every important topic in the field, including the latest on wireless security applications, data analysis and visualization, situational crime prevention, and global security standards and compliance issues * Required reading for the certification DHS selected for its infrastructure security professionals * Each chapter is contributed by a top security professional with subject-matter expertise
Design and Evaluation of Physical Security Systems, 2e, includes
updated references to security expectations and changes since 9/11.
The threat chapter includes references to new threat capabilities
in Weapons of Mass Destruction, and a new figure on hate crime
groups in the US. All the technology chapters have been reviewed
and updated to include technology in use since 2001, when the first
edition was published. Garcia has also added a new chapter that
shows how the methodology described in the book is applied in
transportation systems. College faculty who have adopted this text
have suggested improvements and these have been incorporated as
well. This second edition also includes some references to the
author's recent book on Vulnerability Assessment, to link the two
volumes at a high level.
The attacks on the World Trade Center and the Pentagon on September
11, 2001 changed the way the world thinks about security. Everyday
citizens learned how national security, international politics, and
the economy are inextricably linked to business continuity and
corporate security. Corporate leaders were reminded that the
security of business, intellectual, and human assets has a
tremendous impact on an organization's long-term viability.
As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of "Risk Analysis and the Security Survey. "Broder and Tucker guide you throughanalysis toimplementationto provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updating and covering new content. Understand the most fundamental theories surrounding risk control, design, and implementation by reviewing topics such as cost/benefit analysis, crime prediction, response planning, and business impact analysis--all updated to match today's current standards. This book will show you how to develop and maintain current
business contingency and disaster recovery plans to ensure your
enterprises are able to sustain loss are able to recover, and
protect your assets, be it your business, your information, or
yourself, from threats. *Offers powerful techniques for weighing and managing the risks that face your organization *Gives insights into universal principles that can be adapted to specific situations and threats *Covers topics needed by homeland security professionals as well as IT and physical security managers"
The need to professionally and successfully conduct computer
forensic investigations of incidents and crimes has never been
greater. This has caused an increased requirement for information
about the creation and management of computer forensic laboratories
and the investigations themselves. This includes a great need for
information on how to cost-effectively establish and manage a
computer forensics laboratory. This book meets that need: a clearly
written, non-technical book on the topic of computer forensics with
emphasis on the establishment and management of a computer
forensics laboratory and its subsequent support to successfully
conducting computer-related crime investigations.
A crucial reference for the practicing or aspiring design
consultant, "Security Design Consulting" brings you step by step
through the process of becoming a security consultant, describing
how to start the business, market services, write proposals,
determine fees, and write a report. Specific elements of
assessment, design and project management services as well as
acquiring product and industry knowledge are all covered in detail.
Concentrating on client-focused marketing and sales strategies as
well as the crucial elements of preparing, running, and succeeding
at the security consulting business, "Security Design Consulting"
gives the reader a working knowledge of all the steps necessary to
be a successful security design consultant and a smarter business
owner. Security directors, architects and security management
consultants will also find this reference invaluable in
understanding the security design consultant's important and
growing role in an overall security program.
Research should be enjoyable - whether it is a college student
completing a project for a degree or a professor meeting
requirements or expectations associated with his or her position.
Learning the basics for conducting research is the first step. This
text is a reader-friendly primer which has as its strength the
facility to positively and gently ease the reader into the task of
conducting research.
By covering the essential tips and techniques for investigators,
Investigations: 150 Things You Should Know becomes a useful
reference. By further covering the legal guidelines that
investigators must follow, it becomes indispensable. Through
anecdotes, case studies, and documented procedures the authors of
this book have amassed the most complete collection of
investigative information available. |
You may like...
Cardiovascular and Coronary Artery…
Ayman S. El-Baz, Jasjit S. Suri
Paperback
R3,897
Discovery Miles 38 970
Python Programming and Numerical Methods…
Qingkai Kong, Timmy Siauw, …
Paperback
R1,777
Discovery Miles 17 770
Big Data and Analytics - Strategic and…
Vincenzo Morabito
Hardcover
Information Management: Technologies and…
Iker Morris
Hardcover
|