0
Your cart

Your cart is empty

Browse All departments
Price
  • R500+ (106)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical > Security

Design and Evaluation of Physical Protection Systems (Paperback, 2nd edition): Mary Lynn Garcia Design and Evaluation of Physical Protection Systems (Paperback, 2nd edition)
Mary Lynn Garcia
R1,050 Discovery Miles 10 500 Within 7 - 11 working days

Design and Evaluation of Physical Security Systems, 2e, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.
* New chapter on transportation systems
* Extensively updated chapter on threat definition
* Major changes to response chapter

Risk Analysis and the Security Survey (Hardcover, 4th edition): James F. Broder, Eugene Tucker Risk Analysis and the Security Survey (Hardcover, 4th edition)
James F. Broder, Eugene Tucker
R1,105 R1,035 Discovery Miles 10 350 Save R70 (6%) Within 7 - 11 working days

As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of "Risk Analysis and the Security Survey. "Broder and Tucker guide you throughanalysis toimplementationto provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updating and covering new content. Understand the most fundamental theories surrounding risk control, design, and implementation by reviewing topics such as cost/benefit analysis, crime prediction, response planning, and business impact analysis--all updated to match today's current standards.

This book will show you how to develop and maintain current business contingency and disaster recovery plans to ensure your enterprises are able to sustain loss are able to recover, and protect your assets, be it your business, your information, or yourself, from threats.

*Offers powerful techniques for weighing and managing the risks that face your organization *Gives insights into universal principles that can be adapted to specific situations and threats *Covers topics needed by homeland security professionals as well as IT and physical security managers"

Intruder Alarms (Paperback, 3rd edition): Gerard Honey Intruder Alarms (Paperback, 3rd edition)
Gerard Honey
R821 R775 Discovery Miles 7 750 Save R46 (6%) Within 7 - 11 working days

Intruder Alarms provides a definitive and fully up-to-date guide to the specification, systems design, integration, installation and maintenance of intruder alarm systems. It has been written to be the essential handbook for installation engineers and security professionals working in this rapidly expanding and developing area.
The third edition includes new material on systems integration, digital systems, wireless and remote signalling technologies, and electrical safety.
The revision has brought coverage fully in line with the new European standards (EN50131 / BS EN 50131-1), with their implications summarised in a new appendix. The coverage has also been carefully matched to the requirements of the new Knowledge of Security and Emergency Alarm Systems from City & Guilds (1852).
* An hugely popular practical guide for installation engineers and security professionals now in its third edition
* Essential reading for managers responsible for the commissioning and maintenance of security alarm systems
* Third edition is fully matched to the new European standards (EN50131 / BS EN 50131-1)
* Coverage meets City & Guilds specifications for the new 1852 Security Alarm course

Security Law and Methods (Hardcover): James Pastor Security Law and Methods (Hardcover)
James Pastor
R1,301 R1,214 Discovery Miles 12 140 Save R87 (7%) Within 7 - 11 working days

" Security Law and Methods " examines suggested security methods designed to diminish or negate the consequence of crime and misconduct, and is an attempt to understand both the legal exposures related to crime and the security methods designed to prevent crime. The clear and concise writing of this groundbreaking work, as well as its insightful analysis of specific cases, explains crime prevention methods in light of legal and security principles.
Divided into five parts, " Security Law and Methods " discusses the topics of premises liability and negligence, intentional torts and claims, agency and contract based claims, legal authority and liability, and the subject of terrorism. It also offers an evocative look at security issues that may arise in the future. The book serves as a comprehensive and insightful treatment of security, and is an invaluable addition to the current literature on security and the law.
* Contains clear explanations of complicated legal concepts
* Includes case excerpts, summaries, and discussion questions
* Suggests additional research and relevant cases for further study

Security Education, Awareness and Training - SEAT from Theory to Practice (Paperback, New): Roper Security Education, Awareness and Training - SEAT from Theory to Practice (Paperback, New)
Roper
R1,221 R915 Discovery Miles 9 150 Save R306 (25%) Within 7 - 15 working days

This book is the only one available on security training for all level of personnel. Chief Security Officers (CSOs), security managers, and heads of security forces often have to design training programs themselves from scratch or rely on outside vendors and outside training companies to provide training which is often dry, stilted, and not always applicable to a specific corporate or government setting. This title addresses the theories of sound security training and awareness, then shows the reader how to put the theories into practice when developing or presenting any form of security education, training, motivation or awareness.
* Shows how to establish and integrate a structured, internally consistent and coherent program from the ground up
* Illustrates how to assess and analyze security program needs and audience and customize training accordingly
* Numerous Appendices to help the security manager justify security spending on training initiatives

High-Rise Security and Fire Life Safety (Hardcover, 3rd edition): Geoff Craighead High-Rise Security and Fire Life Safety (Hardcover, 3rd edition)
Geoff Craighead
R2,286 R1,946 Discovery Miles 19 460 Save R340 (15%) Within 7 - 12 working days

"High-Rise Security and Fire Life Safety, 3e, " is a comprehensive reference for managing security and fire life safety operations within high-rise buildings. It spells out the unique characteristics of skyscrapers from a security and fire life safety perspective, details the type of security and life safety systems commonly found in them, outlines how to conduct risk assessments, and explains security policies and procedures designed to protect life and property. Craighead also provides guidelines for managing security and life safety functions, including the development of response plans for building emergencies. This latest edition clearly separates out the different types of skyscrapers, from office buildings to hotels to condominiums to mixed-use buildings, and explains how different patterns of use and types of tenancy impact building security and life safety.

New to this edition:

Differentiates security and fire life safety issues specific to:

Office towers

Hotels

Residential and apartment buildings

Mixed-use buildings

Updated fire and life safety standards and guidelines Includes a CD-ROM with electronic versions of sample survey checklists, a sample building emergency management plan, and other security and fire life safety resources.

Security: A Guide to Security System Design and Equipment Selection and Installation (Paperback, 2nd edition): Neil Cumming Security: A Guide to Security System Design and Equipment Selection and Installation (Paperback, 2nd edition)
Neil Cumming
R1,110 Discovery Miles 11 100 Within 7 - 11 working days

Security: A Guide to Security System Design and Equipment Selection and Installation, 2ed is the first comprehensive reference for electronic security systems. In eight chapters, it guides the reader through selection, installation, testing, and maintenance of security equipment in 35 categories, from interior and exterior sensors to security systems, The uninformed purchaser, the security-conscious manager, and the novice security practitioner will find that this book demystifies the "black art" of security systems design via clear descriptions of operation principles and extensive practical advice. The more knowledgeable reader will find a unique reference and compendium of information usually found in many separate sources. Each device explained in this book is broken down into sections covering its principles of operation, uses, applications, equipment types, and advantages and disadvantages. This important reference outlines the data objectively, enabling the reader to independently make informed judgments about competing bids or proposals, compile a brief, and design or maintain a security system.
Neil Cumming is a partner at Dodd, Cumming, and Love, Consulting Engineers in Plymouth, England. As Projects Manager for all security projects, he is directly responsible for the design of all security systems from inception to completion for a variety of clients. In this role, Mr. Cumming has designed and supervised the installation of security systems on private and military sites throughout Britain and the Middle East. Starting working life as an apprentice electrician, Mr. Cumming later studies at the City University, London, earning a degree in Building Services and Environmental Engineering.
It is a comprehensive reference for electronic security systems.
Guides the reader through all aspects of electronic security systems from selection to maintenance.
Uses detailed descriptions of operations principles and practical advice to make the use of security systems easier to understand.

Security Consulting (Paperback, 4th edition): Charles A. Sennewald Security Consulting (Paperback, 4th edition)
Charles A. Sennewald
R1,166 Discovery Miles 11 660 Within 7 - 15 working days

Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, at no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption -- which could bring any business to it's knees --has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in-depth security surveys so businesses will know exactly where security holes are present and where they need improvement to limit their exposure to various threats. The fourth edition of "Security Consulting" introduces security and law enforcement professionals to the career and business of security consulting. It provides new and potential consultants with the practical guidelines needed to start up and maintain a successful independent practice. Updated and expanded information is included on marketing, fees and expenses, forensic consulting, the use of computers, and the need for professional growth.Useful sample forms have been updated in addition tonew promotion opportunities and keys to conducting research on the Web.

- The only book of its kind dedicated to beginning a security consulting practice from the ground-up

- Proven, practical methods to establish and run a security consulting business

- Newchapters dedicated to advice for new consultants, information secutiry consulting, and utilizing the power of the Internet

- The most up-to-date best practices from the IAPSC"

Private Security and the Law (Hardcover, 4th edition): Charles Nemeth Private Security and the Law (Hardcover, 4th edition)
Charles Nemeth
R1,083 R931 Discovery Miles 9 310 Save R152 (14%) Within 7 - 12 working days

"Private Security and the Law, 4th Edition," is a unique resource that provides analysis of practices in the security industry as they relate to law, regulation, licensure, and constitutional questions of case and statutory authority.This bookdescribes the legal requirements facedin the area of private security.It emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency.The textalso examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that will set pace for future private security laws and regulations. As private security becomes more closely involved in national and international security, cases like Blackwater are examined. Charles Nemeth takesyou step by step through the analysis of case law as it applies to situations commonly faced in the private security practice, providing a solid introduction to the legal and ethical standards that shape the industry.

*Authoritative, scholarly treatise sheds light on this increasingly important area of the law *Historical background helps readers understand the present by seeing the full context of recent developments *National scope provides crucial parameters to security practitioners throughout the US *NEW TO THIS EDITION A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement"

Contemporary Security Management (Hardcover, 3rd edition): John Fay Contemporary Security Management (Hardcover, 3rd edition)
John Fay
R1,346 Discovery Miles 13 460 Within 7 - 15 working days

"Contemporary Security Management, 3rd Edition "teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management.
Comprehensive introduction to security and IT security management principlesDiscussion of both public and private sector roles, as well as the increasingly common privatizing of government functionsNew experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter

High-Security Mechanical Locks - An Encyclopedic Reference (Hardcover): Graham W. Pulford High-Security Mechanical Locks - An Encyclopedic Reference (Hardcover)
Graham W. Pulford
R2,286 Discovery Miles 22 860 Within 7 - 15 working days

" High-Security Mechanical Locks " comprehensively surveys and explains the highly technical area of high security locks in a way that is accessible to a wide audience. Well over 100 different locks are presented, organized into 6 basic types. Each chapter introduces the necessary concepts in a historical perspective and further categorizes the locks. This is followed by detailed 'how it works' descriptions with many pictures, diagrams and references. The descriptions are based on actual dissections of the real locks.
The scope is limited to key operated mechanical locks, thus keyless combination locks and digital locks are not covered. The book does not deal with routine locksmithing topics such as installation and servicing of locks. The sensitive area of picking and bypassing of locks is dealt with only at a high level without giving detailed information that would be unacceptable in the wrong hands.
* Comprehensive coverage of over 100 different types of 19th and 20th century key-operated locks, unified in a simple classification scheme
* Detailed operating principles - clear 'how it works' descriptions
* Manipulation resistance rating for each lock on a scale of 1 to 5

Security Design Consulting - The Business Of System Security Design (Hardcover, New): Brian Gouin Security Design Consulting - The Business Of System Security Design (Hardcover, New)
Brian Gouin
R1,113 Discovery Miles 11 130 Within 7 - 15 working days

A crucial reference for the practicing or aspiring design consultant, "Security Design Consulting" brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, "Security Design Consulting" gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant's important and growing role in an overall security program.
* Focuses on consulting in security design, not security management
* Provides sample service agreements, specifications, and reports to use as models
* Emphasizes the highest technical and ethical standards for this increasingly crucial profession

Closed Circuit Television (Paperback, 3rd edition): Joe Cieszynski Closed Circuit Television (Paperback, 3rd edition)
Joe Cieszynski
R883 R831 Discovery Miles 8 310 Save R52 (6%) Within 7 - 11 working days

Closed Circuit Television (CCTV) surveillance remains a growing industry in response to increased security threats, and whilst new developments have brought clearer images, digital recording and high speed data transmission, effective security systems still rely upon proper specification and installation by engineers with an in depth knowledge of CCTV principles and technology.
The third edition of Closed Circuit Television provides a thorough technical guide for all those involved in the design, specification, installation and maintenance of CCTV systems. Fully dual-standard for PAL and NTSC systems, the book covers the essential equipment and topics of relevance to practitioners, managers and students on vocational and industry training courses. Extended coverage of flat screen devices, digital recording, and a new chapter on networking principles, bring this popular guide up to date with the latest developments in the field.
Joe Cieszynski is a well-known technical writer with a wealth of experience in the security industry. After many years of college lecturing on TV, video and security topics, he currently acts as City & Guilds' Chief Examiner for security systems and provides independent CCTV system consultancy.
*Demystifies CCTV technology for installers and managers
*Concise, accessible text ideal for hard-pressed practitioners and students
*Fully dual-standard coverage for PAL and NTSC based systems

Vulnerability Assessment of Physical Protection Systems (Paperback): Mary Lynn Garcia Vulnerability Assessment of Physical Protection Systems (Paperback)
Mary Lynn Garcia
R1,112 R1,040 Discovery Miles 10 400 Save R72 (6%) Within 7 - 11 working days

Vulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allow readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The book will address the full spectrum of a VA, including negotiating tasks with the customer, project management and planning of the VA, team membership, step-by-step details for performing the VA, data collection and analysis, important notes on how to use the VA to suggest design improvements and generate multiple design options. The text will end with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools will be introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact.
- Guides the reader through the topic of physical security doing so with a unique, detailed and scientific approach
- Takes the reader from beginning to end and step-by-step through a Vulnerability Assessment
- Over 150 figures and tables to illustrate key concepts

The Security Handbook (Paperback, 2nd edition): Philip P Purpura The Security Handbook (Paperback, 2nd edition)
Philip P Purpura
R1,267 Discovery Miles 12 670 Within 7 - 15 working days

The Security Handbook, Second Edition is a user-friendly guide for security officers and guards, covering everything from introductory information to advanced topics. Whether looking for entry into the profession or development within the security industry, this book offers the practical information, training, and need-to-know techniques for the realization of professional goals.
The Second Edition emphasizes the proper skills required to improve job performance -- customer service, security methods, patrolling, communicating, and report writing. Chapters cover such important topics as arrest law and procedure (including legal liability), self-defense and weapons, a new section on career planning, violence in the workplace, internal theft, burglary, robbery, terrorism, cybercrime, and first response during emergencies. Countermeasures to a variety of threats are explained throughout the book.
Experienced security officers, supervisors, and managers will also find the book useful in outlining the changing roles and responsibilities of the protection officer and for helping train their front line staff.
* Covers every important aspect of the security officer's job, with several new updates and access to online sources
* Defines key terms and outlines basic information before moving on to more advanced topics
* Each chapter includes an outline, chapter objectives, and follows with review questions to aid in the learning process
* Features numerous examples, illustrations, Web sites, case studies, and new "What if?" scenarios to relate theory to practice
* Serves as a comprehensive study guide for state mandated training and certification exams such as the Certified Protection Officer (CPO) program sponsored by the IFPO

Investigative Data Mining for Security and Criminal Detection (Paperback): Jesus Mena Investigative Data Mining for Security and Criminal Detection (Paperback)
Jesus Mena
R1,738 Discovery Miles 17 380 Within 7 - 15 working days

Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest data mining techniques and shows how they can be used as investigative tools. Readers will learn how to search public and private databases and networks to flag potential security threats and root out criminal activities even before they occur.
The groundbreaking book reviews the latest data mining technologies including intelligent agents, link analysis, text mining, decision trees, self-organizing maps, machine learning, and neural networks. Using clear, understandable language, it explains the application of these technologies in such areas as computer and network security, fraud prevention, law enforcement, and national defense. International case studies throughout the book further illustrate how these technologies can be used to aid in crime prevention.
Investigative Data Mining for Security and Criminal Detection will also serve as an indispensable resource for software developers and vendors as they design new products for the law enforcement and intelligence communities.

Key Features:
* Covers cutting-edge data mining technologies available to use in evidence gathering and collection
* Includes numerous case studies, diagrams, and screen captures to illustrate real-world applications of data mining
* Easy-to-read format illustrates current and future data mining uses in preventative law enforcement, criminal profiling, counter-terrorist initiatives, and forensic science
* Introduces cutting-edge technologies in evidence gathering and collection, using clear non-technical language
* Illustrates current and future applications of data mining tools in preventative law enforcement, homeland security, and other areas of crime detection and prevention
* Shows how to construct predictive models for detecting criminal activity and for behavioral profiling of perpetrators
* Features numerous Web links, vendor resources, case studies, and screen captures illustrating the use of artificial intelligence (AI) technologies

Women in Public and Private Law Enforcement (Paperback): Pamela A Collins, Kim Scarborough Women in Public and Private Law Enforcement (Paperback)
Pamela A Collins, Kim Scarborough
R1,018 R763 Discovery Miles 7 630 Save R255 (25%) Within 7 - 15 working days

Women in Public and Private Law Enforcement is hands-down the most comprehensive examination of women in law enforcement to date. Most importantly, it fills the current void that exists for texts on this important and growing area of law enforcement. Both public and private sector law enforcement are covered including policing and private security. For policing this includes not only municipal policing, but also state and federal law enforcement. For the security industry, coverage includes not only private security guards but also various other occupations that may be included under private security such as protection specialists.
Women in Public and Private Law Enforcement is intended for academicians and students of sociology, criminal justice, psychology, business, management and loss prevention as a resource on women in non-traditional occupations, specifically law enforcement. It is also intended for professionals in the field today, to apprize them of contemporary issues for women in law enforcement and serve as a reference to guide policy and procedure development.
Authors Pamela Collins and Kathryn Scarborough not only define distinctions in law enforcement and private security but also provide an understanding of the importance of specificity, with regard to this occupational analysis. The authors' diverse background allows them to offer uniquely complementary approach, emphasizing both the importance of understanding the professions from a practical standpoint, while at the same time giving credence to academic analysis.

The book's primary focus is on gender with limited attention paid to race and ethnicity. Some comparisons are made when appropriate, but the ultimate goal is to provide the reader the most comprehensive analysis with respect to gender. Finally, the authors provide women in law enforcement today with detailed analysis and description of how far they have come, the struggles they have faced, the challenges they have overcome, and the achievements they have made.
* The only complete review of women in law enforcement and security
* An ideal text for students in criminal justice and law enforcement courses
* Reviews the current role of women in local, state, and federal agencies

Investigations 150 Things You Should Know (Paperback): Louis A. Tyska, Lawrence J Fennelly Investigations 150 Things You Should Know (Paperback)
Louis A. Tyska, Lawrence J Fennelly
R1,170 Discovery Miles 11 700 Within 7 - 15 working days

By covering the essential tips and techniques for investigators, Investigations: 150 Things You Should Know becomes a useful reference. By further covering the legal guidelines that investigators must follow, it becomes indispensable. Through anecdotes, case studies, and documented procedures the authors of this book have amassed the most complete collection of investigative information available.
This ready reference is for anyone interested in investigations. Readers in and out of the law enforcement field will find this book easy to use and understand when seeking explanations about a wide variety of investigative topics including: constitutional law, documentary evidence, interviewing and interrogating, and surveillance.

Comprehensive overview of investigation
Easily readable and accessible information supplies all the necessary elements for the beginner or expert investigator
Further investigative resources are listed in valuable appendices

Undercover Investigations (Hardcover, 3rd edition): J.Kirk Barefoot Undercover Investigations (Hardcover, 3rd edition)
J.Kirk Barefoot
R691 Discovery Miles 6 910 Within 7 - 15 working days

Undercover Investigations 3ed will serve as a training text for anyone entering the undercover field. Its previous editions have been used to train police officers, and intelligence agents in addition to private security personnel. Undercover Investigations has a dual purpose; it can be used as a blueprint for any security manager or other handler of undercover agents. Undercover Investigations, which has been recognized by judges as the definitive work in this field, is now completely updated and expanded to include more information on drugs in the workplace, and entrapment. Its principles serve as the standard against which undercover operations are measured.

Risk Management for Security Professionals (Hardcover): Carl Roper Risk Management for Security Professionals (Hardcover)
Carl Roper
R1,555 Discovery Miles 15 550 Within 7 - 11 working days

This book describes the risk management methodology as a specific process, a theory, or a procedure for determining your assets, vulnerabilities, and threats and how security professionals can protect them.
Risk Management for Security Professionals is a practical handbook for security managers who need to learn risk management skills. It goes beyond the physical security realm to encompass all risks to which a company may be exposed. Risk Management as presented in this book has several goals:
Provides standardized common approach to risk management through a framework that effectively links security strategies and related costs to realistic threat assessment and risk levels
Offers flexible yet structured framework that can be applied to the risk assessment and decision support process in support of your business or organization
Increases awareness in terms of potential loss impacts, threats and vulnerabilities to organizational assets
Ensures that various security recommendations are based on an integrated assessment of loss impacts, threats, vulnerabilities and resource constraints

Risk management is essentially a process methodology that will provide a cost-benefit payback factor to senior management.
Provides a stand-alone guide to the risk management process
Helps security professionals learn the risk countermeasures and their pros and cons
Addresses a systematic approach to logical decision-making about the allocation of scarce security resources

High-Technology Crime Investigator's Handbook - Establishing and Managing a High-Technology Crime Prevention Program... High-Technology Crime Investigator's Handbook - Establishing and Managing a High-Technology Crime Prevention Program (Paperback, 2nd edition)
Gerald L. Kovacich, William C. Boni
R1,432 Discovery Miles 14 320 Within 7 - 15 working days

The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. "High-Technology Crime Investigator's Handbook, Second Edition," informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator.
* Provides an understanding of the global information environment and its threats
* Explains how to establish a high-technology crime investigations unit and prevention program
* Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,332 Discovery Miles 13 320 Within 7 - 15 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Private Security and the Law (Hardcover, 3rd edition): Charles Nemeth Private Security and the Law (Hardcover, 3rd edition)
Charles Nemeth
R1,879 Discovery Miles 18 790 Within 7 - 15 working days

PRIVATE SECURITY AND THE LAW is a textbook analysis of significant practices in the security industry that relate to law, regulation, licensure and constitutional dilemmas according to case and statutory authority. It is a treatise on the state of the law that governs the security industry and its operatives. The text delivers up to date information on the legal requirements witnessed by most security firms. In addition, it dwells heavily on the liability problems common to security operations, including negligence and tortious liability, civil actions commonly litigated, and strategies to avoid troublesome causes of action that effect business efficiency. From another angle, the work intensely examines the constitutional and due process dimensions of private security work and affords the reader a look at how case law applies certain remedies to wronged parties. Recent cases, and the trends sure to follow, are highlighted throughout the project. Finally, the text is filled with checklists, data and other useful information that aids the security practitioner in applying theory to practice.
* Up to date case law analysis provides cutting edge legal treatment of evolving standards
* Complicated material is presented in a down-to-earth, readable style, perfect for the student of security or security professional
* Over 200 tables and illustrations allow the reader speedy access to precise data

Rethinking Corporate Security in the Post-9/11 Era - Issues and Strategies for Today's Global Business Community... Rethinking Corporate Security in the Post-9/11 Era - Issues and Strategies for Today's Global Business Community (Hardcover, New)
Dennis Dalton
R1,051 Discovery Miles 10 510 Within 8 - 13 working days

The attacks on the World Trade Center and the Pentagon on September 11, 2001 changed the way the world thinks about security. Everyday citizens learned how national security, international politics, and the economy are inextricably linked to business continuity and corporate security. Corporate leaders were reminded that the security of business, intellectual, and human assets has a tremendous impact on an organization's long-term viability.
In Rethinking Corporate Security, Fortune 500 consultant Dennis Dalton helps security directors, CEOs, and business managers understand the fundamental role of security in today's business environment and outlines the steps to protect against corporate loss. He draws on the insights of such leaders as Jack Welch, Bill Gates, Charles Schwab, and Tom Peters in this unique review of security's evolving role and the development of a new management paradigm.
* If you truly wish to improve your own skills, and the effectiveness of your Corporation's security focus, you need to read this book
* Presents connections of theory to real-world case examples in historical and contemporary assessment of security management principles
* Applies classic business and management strategies to the corporate security management function

The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program... The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program (Hardcover)
Gerald L. Kovacich, Edward Halibozek
R1,861 Discovery Miles 18 610 Within 7 - 15 working days

Kovacich and Halibozek offer you the benefit of more than 55 years of combined experience in government and corporate security. Throughout the book, the authors use a fictional global corporation as a model to provide continual real-world challenges and solutions. New and experienced managers alike will find a wealth of information and practical advice to help you develop strategic and tactical plans and manage your daily operations.
* Contains real case examples to illustrate practical application of concepts
* Thoroughly covers the integration of physical, computer and information security goals for complete security awareness
* A handy reference for managers to quickly find and implement the security solutions they need

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guard Force Management, Updated Edition
Lucien Canton Hardcover R1,148 R860 Discovery Miles 8 600
Understanding Crime Prevention
George Richards, National Crime Prevention Institute Paperback R1,108 Discovery Miles 11 080
Netspionage - The Global Threat to…
William C. Boni, Gerald Kovacich Paperback R1,172 Discovery Miles 11 720
Applied Crime Analysis
Karim Vellani, Joel Nahoun Paperback R955 R719 Discovery Miles 7 190
Preventing Corporate Embezzlement
Paul Shaw, Jack Bologna Paperback R1,528 Discovery Miles 15 280
Physical Security 150 Things You Should…
Louis A. Tyska, Lawrence J Fennelly Paperback R1,528 Discovery Miles 15 280
Outsourcing Security - A Guide for…
John Stees Hardcover R1,417 R1,055 Discovery Miles 10 550
Loss Prevention and Security Procedures…
Robert Fischer, Richard J. Janoski Hardcover R1,731 Discovery Miles 17 310
Public Safety and Security…
P J. Ortmeier Paperback R1,530 Discovery Miles 15 300
Research Methods for Criminology and…
M.L. Dantzker, Ronald D. Hunter Hardcover R1,514 R1,128 Discovery Miles 11 280

 

Loyalty partners