Guard Force Management looks at the contract guard force as a business and demonstrates how current management techniques can be used to improve efficiency and increase profitability.
Crime Laboratory Management is the first book to address the unique operational, administrative, and political issues involved in managing a forensic laboratory.
Vulnerability Assessment of Physical Protection Systems guides the reader through the topic of physical security with a unique, detailed and scientific approach.
Intruder Alarms provides a definitive and fully up-to-date guide to the specification, systems design, integration, installation and maintenance of intruder alarm systems.
The Art of Investigation Revisited: Practical Tips from the Experts examines the qual- ities required to be a professional, thorough, and effective investigator and is a follow up to the authors' highly touted book, The Art of Investigation (2019).
A one-stop resource for understanding historical and contemporary perspectives on ideological extremism in law enforcement, as well as its wider impacts on American society.
The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace.
Bringing together perspectives from academics, practitioners, campaigners, and activists, this book explores the victimology of disability hate crime (DHC).
The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape.
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
The emergence of quantum computing introduces a significant shift in the digital and security landscape-prompting organizations to reassess the foundations of how we protect information.
As digital ecosystems advance toward pervasive connectivity, smart devices have become embedded in the operational, social, and economic fabric of modern life.
As digital ecosystems advance toward pervasive connectivity, smart devices have become embedded in the operational, social, and economic fabric of modern life.
The emergence of quantum computing introduces a significant shift in the digital and security landscape-prompting organizations to reassess the foundations of how we protect information.
This book on Governance, Risk Management and Compliance (GRC) and Data Privacy is designed to equip apprentices, students and professionals across various industries with a deep understanding of this holistic approach to organizational security and risk management, quality management and regulatory responsibilities.
This book on Governance, Risk Management and Compliance (GRC) and Data Privacy is designed to equip apprentices, students and professionals across various industries with a deep understanding of this holistic approach to organizational security and risk management, quality management and regulatory responsibilities.