No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.
New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…Find out more
See below for a selection of the latest books from Security services category. Presented with a red border are the Security services books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Security services books and those from many more genres to read that will keep you inspired and entertained. And it's all free!
Strategic Security Management, Second Edition provides security leadership and decision-makers with a fresh perspective on threat, vulnerability, and risk assessment. The book offers a framework to look at applying security analysis and theory into practice for effective security program, implementation, management and evaluation. Chapters examine metric-based security resource allocation of countermeasures, including security procedures, utilization of personnel, and electronic measures. The new edition is fully updated to reflect the latest industry best-practices and includes contributions from security industry leaders-based on their years of professional experience-including: Nick Vellani, Michael Silva, Kenneth Wheatley, Robert Emery, Michael Haggard. Strategic Security Management, Second Edition will be a welcome addition to the security literature for all security professionals, security managers, and criminal justice students interested in understanding foundational security principles and their application.
Private Security and the Investigative Process, Fourth Edition is fully updated and continues to provides complete coverage of the investigative process for private investigations by both individuals and in corporate security environments. This edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new information on case evaluation. Written by a recognized expert in security, criminal justice, ethics, and the law-with over three decades of experience-the updated edition of this popular text covers concepts and techniques that can be applied to a variety of investigations including fraud, insurance, private, and criminal. It details the collection and preservation of evidence, the handling of witnesses, surveillance techniques, background investigations, and report writing. The book reflects best practices and includes tips for ensuring accurate and reliable private sector security investigations. This new edition includes: A new section on career opportunities in paths in the investigative field A run-down of the leading security Industry associations and professional standards they are publishing Added discussion of observational interviews include current protocols analyzing data Details the current legal implications for security surveillance and practices Outlines advances in technology to thwart crime and fraud in the retail and other business settings An entirely new section on e-records from criminal and civil judgements Authoritative, yet accessible, this book is one of the only textbooks dedicated to the subject. It also serves as an important reference for private investigators and security professionals. Complete with numerous forms, checklists, and web exercises, it provides the tools and understanding required to conduct investigations that are professional, ethical, and effective.
The Coast Guard, within the Department of Homeland Security (DHS), is charged with preventing loss of life, injury, and property damage in the maritime environment through its SAR mission. It maintains over 200 stations with various assets, such as boats and helicopters (depending on the station), along U.S. coasts and inland waterways to carry out this mission, as well as its other missions such as maritime security. Chapter 1 will review: the status of the Coast Guard's recapitalization program; new technologies that could assist the Coast Guard; maintenance requirements of its ageing vessels; operating costs for the new vessels; and shore-side infrastructure needs and priorities. The Coast Guards missions in the Arctic include: defense readiness, ice operations, marine environmental protection, and ports, waterways and coastal security. Chapter 2 discusses the Coast Guards Arctic capabilities. Chapter 3 addresses the extent to which the Coast Guard has (1) a sound process for analyzing the need for its boat stations and (2) taken actions to implement its boat station process results.
When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, Floyd's innovative approach enables scholars to normatively evaluate past and present securitizations, equips practitioners to make informed judgements on what they ought to do in relevant situations, and empowers the public to hold relevant actors accountable for how they view security.
Written for students and professionals in the fields of Criminal Justice, Homeland Security, National Security, and Intelligence, this textbook presents a critical examination of the topic of terrorism. It covers its historical roots and proceeds through events in history to present-day tactics and threats posed by transnational criminal organizations, sponsored terrorism, domestic terrorism, and the rise of nation-less terrorist movements. Topics covered include CBRNE weapons of mass destruction, suicide bombings, cyber terrorism, terrorist motivation, and the clash of ideologies. An Instructor's Guide, test questions, and PowerPoint slides are available, upon qualified course adoption.
Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue. As such, the book's objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach. The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager. While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization's system of management and all its activities and functions. The Introduction section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization's overall business management strategy. The Framework section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The Tactics and Control Measures section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events. For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach. Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization's day-to-day activities-as an integral part of these activities-rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.
As corporations and governments become more litigious and risk averse, international risk management becomes more complex. Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct examines real cases of corporate crisis, crime, fraud, and other misconduct that corporate security professionals need to be aware of to effectively protect people, operations, and assets within the region. Current security threats and risks are addressed to help readers conduct an informed risk assessment and analysis of operational risk. Providing detailed guidance on how to address the unique threats and risks in this dynamic and growing business environment, the book: Presents an overview of the region, with relevant historical background Offers recent case examples of crime and common issues facing a given region or country Highlights the range and frequency of corporate security-related breaches and crimes specific to countries in the region Provides detailed write-ups of every country in the region including the major players-Japan, China, India, Indonesia, Singapore, Malaysia, Thailand, and the Philippines Outlines security best practices for navigating the political and law enforcement challenges involved with operating in the region This book provides readers with the regional snapshot and geo-political background needed to understand the cultural differences, challenges, and the state of affairs for any country in the region. Filled with detailed cases of crime, theft of trade secrets, risk factors, and best practices, this book provides the real-world understanding you'll need to conduct better-informed security management that will lead to improved decisions on how to protect your people and assets in the Asia-Pacific region.
Few people are better able to describe how to survive in a war zone than those who have seen, experienced, and lived it first-hand. Comprised of a collection of original stories from international contributors, Surviving the International War Zone: Security Lessons Learned and Stories from Police and Military Peacekeeping Forces contains true accounts of unimaginable scenarios that could only occur in war-torn and conflict-ridden areas. Presenting accounts written by military and police officers who lived in different dangerous regions across the world, the book offers an inside look at the lives of the officers and the local people living in the war zone environment. Covering many facets of daily life, the book helps readers understand how to survive in deadly terrain. With contributions from soldiers and law enforcement personnel from 13 different countries who have lived and served in Iraq, Afghanistan, Sudan, Bosnia, Kosovo, East Timor, Cambodia, Haiti, and Liberia, the book includes practical tips for day-to-day life in a war zone. It examines topics such as: Surviving extreme temperatures and staying healthy Interacting with the indigenous population and cultural awareness Adjusting to the challenges of limited technology and resources Protecting oneself from the imminent threat of violence that is present in all war-torn regions Enhanced with photographs from the war zone, the stories in this volume range from accounts of unspeakable torture, to descriptions of deplorable living conditions, to moments of humor. Some of the stories will make you laugh; others may make you cry. Ultimately, the book provides an unparalleled insight into the full range of deep-seated and sometimes conflicting emotions of the people who have lived and served in war zones and have come home to tell about it.
This user-friendly casebook covers the changing landscape of securities regulations, dealing concisely but comprehensively with the current state of the law, as well as with expected modifications to securities regulation. The philosophy for the presentation of materials is that securities law is tricky, and most students need a straightforward guide through the maze. Coverage of the Securities Act of 1933 and the Securities Exchange Act of 1934 is kept separate, and care is taken to distinguish the different perspectives of the planner and the litigator. The Ninth Edition has been completely revised to reflect the adoption or revision of a number of exemptions from '33 Act registration, the advent of digital currency, the prosecution of hackers for insider trading, the materiality of corporate ethics code violations, and a myriad of other topics, all explained as an integrated part of the overall structure of securities regulation rather than as confusing add-ons. The Ninth Edition also adds or discusses the important securities decisions issued since the last edition. These include Omnicare, Inc. v. Laborers District Council Construction Industry Pension Fund, Salman v. United States, and Kokesh v. SEC.
As a critical function in monitoring workplace safety, loss control auditing provides an organizational assessment of safety program performance in relation to regulatory requirements and company policies. Principles of quality management dictate that measurement of an activity receives organizational attention and provides an excellent tool for communicating performance to management. A comprehensive audit, rather than individual metrics such as injury rate, helps to determine which aspects of a safety program are functioning well and which ones have room for improvement. Loss Control Auditing: A Guide for Conducting Fire, Safety, and Security Audits is a one-stop resource for both developing and executing a loss control audit program. Written for professionals in the fire service, loss prevention, and safety management as well as those studying the fields, this reference addresses loss control auditing from the perspectives of workplace safety, physical security, and fire risks. The text focuses on the three core areas of an audit: documentation review, physical inspection, and employee interviews. It also presents a three-phase model pre-audit, audit, and post audit activities which can be used for all three core areas. It includes detailed information to assist in the development of an effective audit program. The author discusses the foundational elements of an audit program, the written audit program and the audit protocol. Systemic auditing issues of audit scoring, auditor selection and training, audit logistics, and audit frequency are also addressed. The final section of the book discusses the opportunities that can arise in conducting an audit, including how an audit can be used as a training tool and the importance of involving employees in the audit process. The application of the information presented in this volume is facilitated by representative case studies included at the end of each chapter. An up-to-date refe
The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. It also examines key questions on how these new technologies have lowered barriers for new entrants in the field and how they are likely to change market dynamics and affect customer choices. Set in the context of one of the early dot.com companies to enter physical security, the narrative is written for professionals from Chief Security Officers and systems integrators to product managers and investors.