This one-semester text discusses all aspects of private security--from recruiting, selecting and training security personnel to testifying in court. Designed to help address the need for more in-depth
Security and other safety issues are more important than ever in the maritime industry. Maritime Safety, Security and Piracy is the first book to discuss safety, security and piracy in the maritime co
This report from a committee of the National Research Council assesses the Bureau of Reclamation's security program to protect the country's dams from security-related failures. In response to the Bur
Analyze Key Security Mechanisms and Approaches with this practical primer, the first book on the market to cover critical IPv6 security considerations.Dan Minoli, author of over 50 books on telecommun
With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perfor
From the #1 Name in Professional Certification Get on the fast track to becoming CompTIA Security+ certified with this affordable, portable study tool. Inside, network security expert T.J. Samuelle
Practical Aviation Security is a complete guide to the aviation security system, from crucial historical events, to the policies and policy makers and the major terrorist and criminal acts that have s
"CompTIA Security+ 2008 In Depth" gives you the coverage you need to pass CompTIA?s latest Security+ exam and to fully understand the current risks and threats to an organization?s data. If you are j
Because of 9/11, there is universal recognition that aviation security is a deadly serious business. Still, around the world today, the practice of aviation security is rooted in a hodgepodge of gove
Aiming to assist students in developing the mind-set of considering security from the start of a project, this book focuses on how the psychological and physical aspects of security relate to interior
In this book you’ll learn how to: Build a secure network using security controls Secure network perimeters Implement secure management and harden routers Implement network security policies u
Clearly written and easy to use, Payment Card Industry Data Security Standard Handbook is your single source along the journey to compliance with the Payment Card Industry Data Security Standard (PCI
Computer Network Security Theory and Practice introduces to the reader a complete and concise view of network security. It provides in-depth theoretical coverage of recent advancements and practical s
Security Studies is the most comprehensive textbook available on security studies.It gives students a detailed overview of the major theoretical approaches, key themes and most significant issues with
This study examines how Japanese policy toward Middle East security issues is shaped by the need to both maintain Japan’s security alliance with the US and its oil relationship with states in the Midd
Global Perspectives in Information Security, compiled by renowned expert and professor Hossein Bidgoli, offers an expansive view of current issues in information security. Written by leading academics
In contrast to the common perception that the United Nations is, or should become, a system of collective security, this paper advances the proposition that the UN Security Council embodies a necessar
Master the Android mobile development platformBuild compelling Java-based mobile applications using the Android SDK and the Eclipse open-source software development platform. Android: A Programmer's G
Security and Migration in Asia explores how various forms of unregulated and illegal forms of human movement within Asia and beyond the region have come to be treated as 'security' issues, and whether
INTRODUCTION TO PRIVATE SECURITY, Fifth Edition, provides a comprehensive, accessible, state-of-the-art overview of private security, its principles, its legal authority, its growing role in the crimi
Takanen (Codenomicon), DeMott (Crucial Security, Inc.) and Miller (Independent Security Evaluators) have written this guide to "fuzzing" techniques for software programmers who are interested in new w
Library security consultant Kahn discusses security risk management for libraries and other cultural institutions. She addresses building security in chapters that discuss surveying exteriors and grou
The redefinition of the African security is the main subject of this book. The book is divided into two main sections where the first part defines African security in relation to the characteristics
In today's transnational world, a sustainable national security policy cannot be achieved through national capabilities alone. Sustainable national security instead rests on three pillars: 1) a multi-
Introduction to Security, 8th Edition, has been the leading introduction to private security for over thirty years, celebrated for its balanced and professional approach to this increasingly importan
Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for co
What is real? What can we know? How might we act? This book sets out to answer these fundamental philosophical questions in a radical and original theory of security for our times. Arguing that the concept of security in world politics has long been imprisoned by conservative thinking, Ken Booth explores security as a precious instrumental value which gives individuals and groups the opportunity to pursue the invention of humanity rather than live determined and diminished lives. Booth suggests that human society globally is facing a set of converging historical crises. He looks to critical social theory and radical international theory to develop a comprehensive framework for understanding the historical challenges facing global business-as-usual and for planning to reconstruct a more cosmopolitan future. Theory of World Security is a challenge both to well-established ways of thinking about security and alternative approaches within critical security studies.
What is real? What can we know? How might we act? This book sets out to answer these fundamental philosophical questions in a radical and original theory of security for our times. Arguing that the concept of security in world politics has long been imprisoned by conservative thinking, Ken Booth explores security as a precious instrumental value which gives individuals and groups the opportunity to pursue the invention of humanity rather than live determined and diminished lives. Booth suggests that human society globally is facing a set of converging historical crises. He looks to critical social theory and radical international theory to develop a comprehensive framework for understanding the historical challenges facing global business-as-usual and for planning to reconstruct a more cosmopolitan future. Theory of World Security is a challenge both to well-established ways of thinking about security and alternative approaches within critical security studies.
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security For years, IT and security professionals and stu
The Dictionary of International Security provides an easily understood introduction to the major concepts, issues, actors and institutions in the world of international security. Its 200 entries offer
The Dictionary of International Security provides an easily understood introduction to the major concepts, issues, actors and institutions in the world of international security. Its 200 entries offer
The Best Damn Security Manager's Handbook Periodhas comprehensive coverage of all management isuses facing IT and security professionals. Compiled from the best of the Syngress and Butterworth Heinema
The concept of 'human security' has influenced discourse and practice, and has been the subject of vigorous debate. Despite its relevance to the central questions of international law, human security
The latest Windows security attack and defense strategies"Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows sec
Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings.
Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings.
Since the first edition of Security and Loss Prevention was published in 1983, much has changed in security and loss prevention considerations. In the past five years alone, security awareness and
High-Security Mechanical Locks comprehensively surveys and explains the highly technical area of high security locks in a way that is accessible to a wide audience. Well over 100 different locks are
This book describes the rules governing international security decision-making and examines the different understandings of collective security in the post-Cold War world. The post-Cold War world has
What aspects of social security are covered by the European Convention on Human Rights? What obligations does a State have in the field of social security to safeguard the rights guaranteed in the Con