No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.
New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…Find out more
See below for a selection of the latest books from Security services category. Presented with a red border are the Security services books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Security services books and those from many more genres to read that will keep you inspired and entertained. And it's all free!
Workplace Violence: Issues in Threat Management defines what workplace violence is, delves into the myths and realities surrounding the topic and provides readers with the latest statistics, thinking, and strategies in the prevention of workplace violence. The authors, who themselves have implemented successful workplace violence protection programs, guide novice and experienced practitioners alike in the development of their own programs.
The Art of Investigation examines the qualities required to be a professional, thorough, and effective investigator. As the title suggests, it delves into more than the steps and procedures involved in managing an investigation, it also covers the soft skills necessary to effectively direct investigations and intuit along the way. The editors and contributing authors are the best in their field, and bring a wealth of real-world knowledge and experience to the subject. There are several publications available on the nuts-and-bolts of the process and stages of an investigation. That ground has been covered. However, little has been published on the investigative skills required, the traits necessary, and the qualities endemic to an inquisitive mind that can be cultivated to improve an investigator's professional skill-set. Each chapter discusses the applicability of the traits to the contributor's own work and experience as an investigator. In doing so, the contributors provide a story-or set of stories-from their personal experience, which demonstrates a given trait and its importance in the course of their investigative work and career. This will be first-hand experience that will serve to help any investigative professional in the course of their work. The case examples included throughout are sometimes surprising, but always engaging and insightful. An investigator must keep an open mind above all else, and this book will lift the veil on the inner workings of an investigation, in addition to the thought processes and inner monologues of an investigator as part of that process. Key Features * Chapters highlight the qualities and traits-the soft skills -that are required, and which can be improved over time, to be a thorough investigator. * A veritable Who's Who of renowned investigative experts lend their personal expertise and experience to this how-to manual for investigators. * A unique approach is applied and provides self-help advice for both new and experienced investigative and security professionals. * The book focuses on the learned, acquired, and intuitive skills of investigation-a nuanced but essential aspect of the investigative skill-set. The Art of Investigation will be a welcome addition to any investigator's toolkit and will also be of interest to students in criminal justice, security, and Homeland Security programs, security consultants, corporate and private security professionals, and the legal community.
This user-friendly casebook covers the changing landscape of securities regulations, dealing concisely but comprehensively with the current state of the law, as well as with expected modifications to securities regulation. The philosophy for the presentation of materials is that securities law is tricky, and most students need a straightforward guide through the maze. Coverage of the Securities Act of 1933 and the Securities Exchange Act of 1934 is kept separate, and care is taken to distinguish the different perspectives of the planner and the litigator. The Ninth Edition has been completely revised to reflect the adoption or revision of a number of exemptions from '33 Act registration, the advent of digital currency, the prosecution of hackers for insider trading, the materiality of corporate ethics code violations, and a myriad of other topics, all explained as an integrated part of the overall structure of securities regulation rather than as confusing add-ons. The Ninth Edition also adds or discusses the important securities decisions issued since the last edition. These include Omnicare, Inc. v. Laborers District Council Construction Industry Pension Fund, Salman v. United States, and Kokesh v. SEC.
The 2018 edition of the Report of the Security Council continued its focus on a number of serious unresolved conflicts, in particular in the Middle East and Africa.
This book represents the manifestation of a new presentation of old perspectives within the discipline of criminal justice. It contains practical considerations of rendering such decisions, it is expected to be an appropriate reference among practitioner personnel.
Private Security and the Investigative Process, Fourth Edition is fully updated and continues to provide complete coverage of the investigative process for private investigations by both individuals and in corporate security environments. This edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new information on case evaluation. Written by a recognized expert in security, criminal justice, ethics, and the law-with over three decades of experience-the updated edition of this popular text covers concepts and techniques that can be applied to a variety of investigations including fraud, insurance, private, and criminal. It details the collection and preservation of evidence, the handling of witnesses, surveillance techniques, background investigations, and report writing. The book reflects best practices and includes tips for ensuring accurate and reliable private sector security investigations. This new edition includes: A new section on career opportunities in paths in the investigative field A rundown of the leading security Industry associations and professional standards being published Added discussion of observational interviews include current protocols analyzing data Details of the current legal implications for security surveillance and practices Advances in technology to thwart crime and fraud in retail and other business settings An entirely new section on e-records from criminal and civil judgments Authoritative, yet accessible, this book is one of the only textbooks dedicated to the subject. It also serves as an important reference for private investigators and security professionals. Complete with numerous forms, checklists, and web exercises, it provides the tools and understanding required to conduct investigations that are professional, ethical, and effective.
The Coast Guard, within the Department of Homeland Security (DHS), is charged with preventing loss of life, injury, and property damage in the maritime environment through its SAR mission. It maintains over 200 stations with various assets, such as boats and helicopters (depending on the station), along U.S. coasts and inland waterways to carry out this mission, as well as its other missions such as maritime security. Chapter 1 will review: the status of the Coast Guard's recapitalisation program; new technologies that could assist the Coast Guard; maintenance requirements of its ageing vessels; operating costs for the new vessels; and shoreside infrastructure needs and priorities. The Coast Guard's missions in the Arctic include: defense readiness, ice operations, marine environmental protection, and ports, waterways and coastal security. Chapter 2 discusses the Coast Guard's Arctic capabilities. Chapter 3 addresses the extent to which the Coast Guard has (1) a sound process for analysing the need for its boat stations and (2) taken actions to implement its boat station process results.
When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, Floyd's innovative approach enables scholars to normatively evaluate past and present securitizations, equips practitioners to make informed judgements on what they ought to do in relevant situations, and empowers the public to hold relevant actors accountable for how they view security.
The Thai military's Internal Security Operations Command (ISOC) was in charge of a wide range of civil affairs projects during the country's struggle with the communist insurgency between the mid-1960s and the mid-1980s. These projects - including rural development programmes, mass organizations and mobilization campaigns, and psychological operations - provided justification for the military to routinely penetrate the socio-political sphere. Since the Cold War drew to a close, little attention has been paid to ISOC's role and power within the state apparatus. Since the coups of September 2006 and May 2014 that toppled the elected governments, ISOC has been dangerously empowered and increasingly employed by the military regimes to dictate the country's political direction. The power of the Thai military is exerted not only through its use of force but also by means of its socio-political arms. ISOC represents a potent tool with which conservative elites can undermine and control electoral democracy and through which the military can maintain its power.
Written for students and professionals in the fields of Criminal Justice, Homeland Security, National Security, and Intelligence, this textbook presents a critical examination of the topic of terrorism. It covers its historical roots and proceeds through events in history to present-day tactics and threats posed by transnational criminal organizations, sponsored terrorism, domestic terrorism, and the rise of nation-less terrorist movements. Topics covered include CBRNE weapons of mass destruction, suicide bombings, cyber terrorism, terrorist motivation, and the clash of ideologies. An Instructor's Guide, test questions, and PowerPoint slides are available, upon qualified course adoption.
Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue. As such, the book's objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach. The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager. While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization's system of management and all its activities and functions. The Introduction section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization's overall business management strategy. The Framework section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The Tactics and Control Measures section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events. For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach. Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization's day-to-day activities-as an integral part of these activities-rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.
As corporations and governments become more litigious and risk averse, international risk management becomes more complex. Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct examines real cases of corporate crisis, crime, fraud, and other misconduct that corporate security professionals need to be aware of to effectively protect people, operations, and assets within the region. Current security threats and risks are addressed to help readers conduct an informed risk assessment and analysis of operational risk. Providing detailed guidance on how to address the unique threats and risks in this dynamic and growing business environment, the book: Presents an overview of the region, with relevant historical background Offers recent case examples of crime and common issues facing a given region or country Highlights the range and frequency of corporate security-related breaches and crimes specific to countries in the region Provides detailed write-ups of every country in the region including the major players-Japan, China, India, Indonesia, Singapore, Malaysia, Thailand, and the Philippines Outlines security best practices for navigating the political and law enforcement challenges involved with operating in the region This book provides readers with the regional snapshot and geo-political background needed to understand the cultural differences, challenges, and the state of affairs for any country in the region. Filled with detailed cases of crime, theft of trade secrets, risk factors, and best practices, this book provides the real-world understanding you'll need to conduct better-informed security management that will lead to improved decisions on how to protect your people and assets in the Asia-Pacific region.