This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide.
Learning behind Bars is an oral history of former Irish republican prisoners in the Republic of Ireland and Northern Ireland between 1971, the year internment was introduced, and 2000, when the high-security Long Kesh Detention Centre/HM Prison Maze closed.
This book provides an overview of the dominant philosophical approaches and practices in handling status offenders--those children who habitually resist the control of their parents and schools, who run away from home, who drink and stay out after curfew.
Bringing a unique rural lens to the analysis of dark tourism in Australia, this book covers a range of sites including convict museums, sites of serial killings and colonial violence, ghost tours and the emerging tourism of bushfire sites.
"e;Sensitive security information (SSI) is a category of sensitive but unclassified information under the United States government's information sharing and control rules.
Policing is a dynamic profession with increasing demands and complexities placed upon police officers, staff and volunteers who provide a 24-hour service across a diverse range of communities.
In an era where vehicular networks and Location-Based Services (LBS) are rapidly expanding, safeguarding location privacy has become a critical challenge.
Individuals who have committed a number of crimes over their lifetimes have had complex, multi-faceted life experiences often characterized by extreme disadvantage and victimization.
Security Officers and Supervisors: 150 Things You Should Know presents an array of relevant topics, including addressing "e;Tips of the Trade"e; in how to manage a team of professionals and serve as an effective supervisor.
This book analytically reviews the impact of the global anti-money laundering and counter-terrorist financing (AML/CFT) framework on the compliance trajectory of a number of jurisdictions to this framework.
Arising from Soviet prison camps in the 1930s, career criminals known as 'thieves-in-law' exist in one form or another throughout post-Soviet countries and have evolved into major transnational organized criminal networks since the dissolution of the USSR.
This second edition of Critical Infrastructure Protection, Risk Management, and Resilience continues to be an essential resource for understanding and protecting critical infrastructure across the U.
This book provides valuable information and recommendations for current and future officers and correctional system employees, introducing them to civil liability and federal law, as well as recommending strategies that can be taken to minimize risks.
Offering carefully curated articles from the European Association of Psychology and Law (EAPL), this book features chapters from a truly international group of scholars.
Every law enforcement patrol officer and investigator needs to understand both the tactical considerations of stopping and frisking a suspect, and the legal constraints that should govern that power.
In recognition of the vital need to protect legitimate facilities from the theft and misuse of dangerous pathogens and toxins, the Laboratory Biosecurity Handbook serves as a guide to the implementation of pathogen protection programs.
Respectable Citizens - Shady Practices seeks to explore a previously neglected aspect of crime in modern society - namely those crimes that are committed by otherwise 'respectable' citizens in the market arena.
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at professionals navigating the complex world of cybersecurity.
The Greek philosopher, Socrates, posed a guardian model that would protect his Athenian world, the custodes (watchmen), yet mused who would guard them but themselves.
Casino and Gaming Resort Investigations addresses the continued and growing need for gaming security professionals to properly and successfully investigate the increasing and unique types of crime they will face in their careers.
With urban poverty rising and affordable housing disappearing, the homeless and other "e;disorderly"e; people continue to occupy public space in many American cities.
In a rapidly evolving world where technology is increasingly integrated into our daily lives, security has become a top priority for individuals, organizations, and governments.
This edited collection by internationally recognized authors provides essays on police behavior in the categories of police administration, police operations, and combating specific crimes.
This book explores the infiltration of Italian and Russian organised crime in the UK real estate market, assessing how vulnerable the UK is to these sorts of activities.
This second edition of Critical Infrastructure Protection, Risk Management, and Resilience continues to be an essential resource for understanding and protecting critical infrastructure across the U.
This book describes how to use logic, reasoning, critical thinking, and the scientific method to conduct and improve criminal and civil investigations.
When criminal activity is as straightforward as a childs game of cops and robbers, the role of the police is obvious, but today's bad guys don't always wear black.
Cargo Theft, Loss Prevention, and Supply Chain Security outlines steps for identifying the weakest links in the supply chain and customizing a security program to help you prevent thefts and recover losses.
Workplace Security Playbook: The New Manager's Guide to Security Risk is a set of comprehensive risk management guidelines for companies that have other business functions coordinating security.