Research shows that during the past 5 years 80-90% of security breaches in healthcare has been due to people inside the organization. Security culture and information assurance governance is the only
This book is about social security, or the lack of it, for the labouring poor in India. It is a critical study of the working of two flagship national social security schemes initiated by the Governme
The International Security Programs Benchmark Report presents and analyzes the findings of a broad survey conducted by the Security Executive Council of corporate international security programs. The
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and
The Netter Collection of Medical Illustrations: Musculoskeletal System, 2nd Edition provides a highly visual guide to this body system, from basic science and anatomy to orthopaedics and rheumatology.
Contemporary European Security explores the complex European security architecture and introduces students to the empirical, theoretical and conceptual approaches to studying the subject. Written by e
Contemporary European Security explores the complex European security architecture and introduces students to the empirical, theoretical and conceptual approaches to studying the subject. Written by e
This book examines the political consequences of European security commercialisation through increased reliance on private military and security companies (PMSCs).The role of commercial security in th
Northern interventions into African countries at war are dominated by security concerns, bolstered by claims of shared returns and reinforcing processes of development and security. As global security
While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for
Nine Practices of the Successful Security Leader lays out a series of best practices for security managers. Collected from interviews with security leaders at public and private sector organizations,
This book examines the political consequences of European security commercialisation through increased reliance on private military and security companies (PMSCs).The role of commercial security in th
Muhibat (Centre for Strategic and International Studies, Jakarta) examines how states approach security cooperation, emphasizing cooperative security as an approach to regional security. Using primari
Many of us, especially since 9/11, have become personally concerned about issues of security, and this is no surprise. Security is near the top of government and corporate agendas around the globe. Se
The twelfth volume in the series India’s National Security: Annual Review offers a detailed analysis of India’s complex security environment: persistence of major threats, alongside a constructive eng
This book engages the intense relationship between citizenship and security in modern politics. It focuses on questions of citizenship in security analysis in order to critically evaluate how politica
This book engages the intense relationship between citizenship and security in modern politics. It focuses on questions of citizenship in security analysis in order to critically evaluate how politica
Long considered the only book an audio engineer needs on their shelf, Sound System Engineering provides an accurate, complete and concise tool for all those involved in sound system engineering. Ful
In this timely contribution to ensuring the security of global ports, a longtime security and risk manager based in the Middle East provides an overview and analysis of the factors that specifically a
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, se
This book explores current thinking about positive security and seeks to suggest a reformulated positive security concept, and to evaluate the efficacy of such a concept in terms of foreign and securi
It's a reference guide to enterprise security programs. This book is intended for the IT security staff beginner to expert but would also be a valuable resource for other IT functions such as IT compl
Updated annually, the Information Security Management Handbook is the most comprehensive and up-to-date reference available on information security and risk management. Bringing together the knowledge
This timely volume presents the key concepts, issues, and debates surrounding environmental security, illustrating through a range of examples and cases how global environmental matters and internatio
Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledg
The impact of public law depends on how politicians secure control of public organizations, and how these organizations in turn are used to define national security. Governing Security explores this d
The impact of public law depends on how politicians secure control of public organizations, and how these organizations in turn are used to define national security. Governing Security explores this d
Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Infor
The Complete Home Security Guide provides an essential reference guide to domestic security and crime prevention. It sets out a clearly defined stratgey to improve home security. It includes informati
The unequal division of power, income, social, and cultural capital is reflected in the field of security. This results in an unequal distribution of security in our society. In this book, the researc