Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 8 of 8 matches in All Departments
Identifies the various national security threats and details the numerous U.S. and key allied intelligence services that work and collaborate to mitigate such threats Reviews the types of intelligence-outlining intelligence collection methods and intelligence tradecraft Explores how to determine the value of the intelligence collected, explaining the various methods of intelligence analysis and optimal methods to present conclusions
Identifies the various national security threats and details the numerous U.S. and key allied intelligence services that work and collaborate to mitigate such threats Reviews the types of intelligence-outlining intelligence collection methods and intelligence tradecraft Explores how to determine the value of the intelligence collected, explaining the various methods of intelligence analysis and optimal methods to present conclusions
The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.
The FBI estimates that billions of U.S. dollars are lost each year to foreign and domestic competitors who deliberately target industrial trade secrets. And, although today's organizations face unprecedented threats to the security of their proprietary information and assets, most books on industrial espionage fail to supply guidelines for establishing a program to prevent and thwart such threats. Filling this need, Industrial Espionage: Developing a Counterespionage Program provides complete coverage of how to ensure the protection of company proprietary information and assets, including how to develop an effective corporate counterespionage program. The book presents the insights of a former veteran of the Office of Naval Intelligence. The book examines the motives behind industrial espionage and illustrates the variety of spy tradecraft utilized. Through the use of real-world case examples, the author provides guidelines to determine the current threat level to your organization's proprietary assets as well as the physical security countermeasures, policy, and procedures that must be in place to establish an effective counterespionage program. Outlining the day-to-day aspects of protecting sensitive data and trade secrets in a corporate security setting, this book is suitable for organizations that have proprietary information and assets to protect, businesses that have operations or partner with companies overseas such as China, organizations that work with the federal government on classified projects, security and counterespionage professionals, and university degree programs in Homeland Security and intelligence.
To adequately protect an organization, physical security must go beyond the "gates, guns, and guards" mentality that characterizes most security programs. Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. The Complete Guide to Physical Security discusses the assets of a facility people, building, and location and the various means to protect them. It emphasizes the marriage of technology and physical hardware to help those tasked with protecting these assets to operate successfully in the ever-changing world of security. The book covers specific physical security technologies, such as intrusion detection, access control, and video surveillance systems including networked video. It addresses the reasoning behind installations, how to work with contractors, and how to develop a central station for monitoring. It also discusses government regulations for building secured facilities and SCIFs (Sensitive Compartmented Information Facilities). Case examples demonstrate the alignment of security program management techniques with not only the core physical security elements and technologies but also operational security practices. The authors of this book have nearly 50 years combined experience in the security industry including the physical security and security management arenas. Their insights provide the foundation for security professionals to develop a comprehensive approach to achieving physical security requirements while also establishing leadership roles that help further the overall mission of their organization. "
In a time when threats against the maritime community have never been greater, Maritime Security: Protection of Marinas, Ports, Small Watercraft, Yachts, and Ships provides a single, comprehensive source of necessary information for understanding and preventing or reducing threats to the maritime community. The book defines what comprises the maritime community, including marinas, ports, small watercraft, yachts, and ships. It focuses on the protection of these rather than the protection of cargo in the maritime supply chain, since with the protection of the infrastructural elements it follows that the cargo is secured. In identifying and discussing threats to security, the book includes natural threats such as storms as well as traditional criminal threats and piracy, with especially detailed examinations of terrorism and cybersecurity. It also introduces the US Coast Guard America's Waterway Watch program, describing the components of the program, its implementation throughout the maritime community, and its successes. By dealing with the security of all areas within the maritime community, Maritime Security is highly valuable to all members of the community, from the local boater to professionals charged with the protection of major ports and seagoing vessels. It gives you the skills to understand, identify, analyze, and address natural and man-made threats to localized or broad sections in the maritime community.
After 9/11, the initial focus from the U.S. government, media, and the public was on security at commercial airports and aboard commercial airlines. Soon, investigation revealed the hijackers had trained at flight schools operating out of general aviation airports, leading to a huge outcry by the media and within the government to mandate security regulations for this flight sector. General Aviation Security: Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports examines the threats against general aviation (GA) and presents resources for security professionals and GA airport owners and operators to develop an impenetrable airport and aircraft security plan. Following an overview of general aviation and its inherent security threats, the book explores: Physical security for the aviation environment, including intrusion detection systems, cameras, locks, lighting, and window security The security force, including recruitment and training Security of general aviation aircraft and airports, including runway security and fuel storage Airport safety regulations such as the Workers Protection Act and the Bloodborne Pathogens Act Emergency response to a range of scenarios, including medical emergencies, fires, gas leaks, and bomb threats The security of hangars, fixed-base operations, and flight schools Corporate aviation security departments The book concludes with a study involving the Aircraft Owners and Pilots Association (AOPA) Airport Watch Program and the Transportation Security Administration (TSA) security requirements and recommendations for general aviation. General aviation supports public safety, business, agriculture, commercial airports, aeronautical education, and many aspects of the aviation industry. The book is the first to explore the unique security concerns relevant to general aviation operations. Dr. Daniel J. Benny was interviewed on video by General Aviation Security Magazine about his article concerning the effects of the Airport Watch Program.
The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.
|
You may like...
|