No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.
New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…Find out more
See below for a selection of the latest books from Security services category. Presented with a red border are the Security services books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Security services books and those from many more genres to read that will keep you inspired and entertained. And it's all free!
Change Management for Risk Professionals addresses a need in the marketplace. Since organizations are contantly changing, so too do the risks. In addition to this, while these organizational changes are generally intentional-directed, planned, and even mapped out by senior leadership-often the resultant changes and risks are unforeseen and unanticipated. The book focuses on the dynamics of change management with an eye toward the risk professional. It will help in the planning of change in managing through it as well as in the decision-making and migration to a the new norm. Oftentimes risk management professionals are not intimately acquainted with change and change dynamics, despite the fact that they are required to plan for the unexpected. Likewise, change management professionals are not often tasked with looking at the overall risks-including unanticipated challenges, hurdles, or even barriers-that present themselves in a changing environment. The author brings his extensive experience to bear in offering advice, suggestions, industry examples, and best practices to the change management process. The book presents tricks of the trade, and industry insight, into how organizations can migrate from their current environment to the new, desired one with minimal risk and disruption, thereby optimally maintaining flexibility, continuity, and production. Change Management for Risk Professionals will be a welcome addition to enterprise-wide business continuity, crisis management, disaster recovery, and security management and homeland security professionals, their organizations, and their operations.
This descriptive overview chronicles the author's unique experience in working with Islamic and Muslim women in policing. The book fills a void in this area, providing statistics and details wherever possible and identifying issues and problems that Islamic women deal with when they are involved in policing across the world. It includes profiles of current police women from Iran, Dubai, Turkey, Malaysia, Tajikistan, Pakistan and western countries. This well researched reference provides a starting point for the study of the effect of women on policing systems in Muslim countries.
Written for students and professionals in the fields of Criminal Justice, Homeland Security, National Security, and Intelligence, this textbook presents a critical examination of the topic of terrorism. It covers its historical roots and proceeds through events in history to present-day tactics and threats posed by transnational criminal organizations, sponsored terrorism, domestic terrorism, and the rise of nation-less terrorist movements. Topics covered include CBRNE weapons of mass destruction, suicide bombings, cyber terrorism, terrorist motivation, and the clash of ideologies. An Instructor's Guide, test questions, and PowerPoint slides are available, upon qualified course adoption.
Historically, security managers have tended to be sourced from either the armed forces or law enforcement. But the increasing complexity of the organisations employing them, along with the technologies employed by them, is forcing an evolution and expansion of the role, and security managers must meet this challenge in order to succeed in their field and protect the assets of their employers. Risk management, crisis management, continuity management, strategic business operations, data security, IT, and business communications all fall under the purview of the security manager. This book is a guide to meeting those challenges, providing the security manager with the essential skill set and knowledge base to meet the challenges faced in contemporary, international, or tech-oriented businesses. It covers the basics of strategy, risk, and technology from the perspective of the security manager, focussing only on the 'need to know'. The reader will benefit from an understanding of how risk management aligns its functional aims with the strategic goals and operations of the organisation. This essential book supports professional vocational accreditation and qualifications, such as the Chartered Security Professional (CSyP) or Certified Protection Professional (CPP), and advises on pathways to higher education qualifications in the fields of security and risk management. It is ideal for any risk manager looking to further their training and development, as well as being complementary for risk and security management programs with a focus on practice.
Workplace Violence: Issues in Threat Management defines what workplace violence is, delves into the myths and realities surrounding the topic and provides readers with the latest statistics, thinking, and strategies in the prevention of workplace violence. The authors, who themselves have implemented successful workplace violence protection programs, guide novice and experienced practitioners alike in the development of their own programs.
The Art of Investigation examines the qualities required to be a professional, thorough, and effective investigator. As the title suggests, it delves into more than the steps and procedures involved in managing an investigation, it also covers the soft skills necessary to effectively direct investigations and intuit along the way. The editors and contributing authors are the best in their field, and bring a wealth of real-world knowledge and experience to the subject. There are several publications available on the nuts-and-bolts of the process and stages of an investigation. That ground has been covered. However, little has been published on the investigative skills required, the traits necessary, and the qualities endemic to an inquisitive mind that can be cultivated to improve an investigator's professional skill-set. Each chapter discusses the applicability of the traits to the contributor's own work and experience as an investigator. In doing so, the contributors provide a story-or set of stories-from their personal experience, which demonstrates a given trait and its importance in the course of their investigative work and career. This will be first-hand experience that will serve to help any investigative professional in the course of their work. The case examples included throughout are sometimes surprising, but always engaging and insightful. An investigator must keep an open mind above all else, and this book will lift the veil on the inner workings of an investigation, in addition to the thought processes and inner monologues of an investigator as part of that process. Key Features * Chapters highlight the qualities and traits-the soft skills -that are required, and which can be improved over time, to be a thorough investigator. * A veritable Who's Who of renowned investigative experts lend their personal expertise and experience to this how-to manual for investigators. * A unique approach is applied and provides self-help advice for both new and experienced investigative and security professionals. * The book focuses on the learned, acquired, and intuitive skills of investigation-a nuanced but essential aspect of the investigative skill-set. The Art of Investigation will be a welcome addition to any investigator's toolkit and will also be of interest to students in criminal justice, security, and Homeland Security programs, security consultants, corporate and private security professionals, and the legal community.
This book represents the manifestation of a new presentation of old perspectives within the discipline of criminal justice. It contains practical considerations of rendering such decisions, it is expected to be an appropriate reference among practitioner personnel.
Private Security and the Investigative Process, Fourth Edition is fully updated and continues to provide complete coverage of the investigative process for private investigations by both individuals and in corporate security environments. This edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new information on case evaluation. Written by a recognized expert in security, criminal justice, ethics, and the law-with over three decades of experience-the updated edition of this popular text covers concepts and techniques that can be applied to a variety of investigations including fraud, insurance, private, and criminal. It details the collection and preservation of evidence, the handling of witnesses, surveillance techniques, background investigations, and report writing. The book reflects best practices and includes tips for ensuring accurate and reliable private sector security investigations. This new edition includes: A new section on career opportunities in paths in the investigative field A rundown of the leading security Industry associations and professional standards being published Added discussion of observational interviews include current protocols analyzing data Details of the current legal implications for security surveillance and practices Advances in technology to thwart crime and fraud in retail and other business settings An entirely new section on e-records from criminal and civil judgments Authoritative, yet accessible, this book is one of the only textbooks dedicated to the subject. It also serves as an important reference for private investigators and security professionals. Complete with numerous forms, checklists, and web exercises, it provides the tools and understanding required to conduct investigations that are professional, ethical, and effective.
The Coast Guard, within the Department of Homeland Security (DHS), is charged with preventing loss of life, injury, and property damage in the maritime environment through its SAR mission. It maintains over 200 stations with various assets, such as boats and helicopters (depending on the station), along U.S. coasts and inland waterways to carry out this mission, as well as its other missions such as maritime security. Chapter 1 will review: the status of the Coast Guard's recapitalisation program; new technologies that could assist the Coast Guard; maintenance requirements of its ageing vessels; operating costs for the new vessels; and shoreside infrastructure needs and priorities. The Coast Guard's missions in the Arctic include: defense readiness, ice operations, marine environmental protection, and ports, waterways and coastal security. Chapter 2 discusses the Coast Guard's Arctic capabilities. Chapter 3 addresses the extent to which the Coast Guard has (1) a sound process for analysing the need for its boat stations and (2) taken actions to implement its boat station process results.
When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, Floyd's innovative approach enables scholars to normatively evaluate past and present securitizations, equips practitioners to make informed judgements on what they ought to do in relevant situations, and empowers the public to hold relevant actors accountable for how they view security.
The Thai military's Internal Security Operations Command (ISOC) was in charge of a wide range of civil affairs projects during the country's struggle with the communist insurgency between the mid-1960s and the mid-1980s. These projects - including rural development programmes, mass organizations and mobilization campaigns, and psychological operations - provided justification for the military to routinely penetrate the socio-political sphere. Since the Cold War drew to a close, little attention has been paid to ISOC's role and power within the state apparatus. Since the coups of September 2006 and May 2014 that toppled the elected governments, ISOC has been dangerously empowered and increasingly employed by the military regimes to dictate the country's political direction. The power of the Thai military is exerted not only through its use of force but also by means of its socio-political arms. ISOC represents a potent tool with which conservative elites can undermine and control electoral democracy and through which the military can maintain its power.
As corporations and governments become more litigious and risk averse, international risk management becomes more complex. Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct examines real cases of corporate crisis, crime, fraud, and other misconduct that corporate security professionals need to be aware of to effectively protect people, operations, and assets within the region. Current security threats and risks are addressed to help readers conduct an informed risk assessment and analysis of operational risk. Providing detailed guidance on how to address the unique threats and risks in this dynamic and growing business environment, the book: Presents an overview of the region, with relevant historical background Offers recent case examples of crime and common issues facing a given region or country Highlights the range and frequency of corporate security-related breaches and crimes specific to countries in the region Provides detailed write-ups of every country in the region including the major players-Japan, China, India, Indonesia, Singapore, Malaysia, Thailand, and the Philippines Outlines security best practices for navigating the political and law enforcement challenges involved with operating in the region This book provides readers with the regional snapshot and geo-political background needed to understand the cultural differences, challenges, and the state of affairs for any country in the region. Filled with detailed cases of crime, theft of trade secrets, risk factors, and best practices, this book provides the real-world understanding you'll need to conduct better-informed security management that will lead to improved decisions on how to protect your people and assets in the Asia-Pacific region.