Account
Orders
Advanced search
Illinois Criminal Trial Evidence is intended to assist the work of trial and appellate lawyers and judges. Illinois rules of evidence find their origins in various sources: English common law, American common law, constitutional law,Illinois statutory law, andIllinois...
The Autopsy Medical Practice and Public Policy presents the history of autopsy. It discusses its contributions to the theory and practice of medicine. It addresses the decline of interests in the field and its rediscovery. It also explains the cause of death, a view of...
Public Supplies Work: In Principle and Practice with Particular Reference to Hospitals considers the concepts of supply management. This book is composed of 12 chapters that discuss the nature of the job of supplies officer and the organization of the supplies...
Rheumatism in Populations provides information pertinent to rheumatic diseases. This book covers certain systemic orders such as the systemic lupus erythematosus that frequently affect the joints. Organized into 16 chapters, this book begins with an overview of the...
Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft from...
Building a Travel Risk Management Program: Traveler Safety and Duty of Care for Any Organization helps business and security professionals effectively manage traveler risk by showing them how to build a complete travel risk program. While global corporate travel risks...
Disasters and Public Health: Planning and Response, Second Edition, examines the critical intersection between emergency management and public health. It provides a succinct overview of the actions that may be taken before, during, and after a major public health...
Threat Assessment and Risk Analysis: An Applied Approach details the entire risk analysis process in accessible language, providing the tools and insight needed to effectively analyze risk and secure facilities in a broad range of industries and organizations. The book...
Security Operations Management, 3rd edition, is the latest edition the seminal reference on corporate security management operations for today’s security management professionals and students. The book explores the characteristics of today’s globalized workplaces, why...
Factory, mine and mill. Industry, toil and grime. Its manufacturing roots mean we still see the North of England as a hardworking place. But, more than possibly anywhere else, the North has always known how to get dressed up, take itself out on the town and have a good...
According to Pinkerton—the leading provider of risk management services in the world—workplace violence is second only to cybersecurity as the top threat faced by organizations today. Incidents involving active shooters in the workplace are on the rise and becoming more...
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways...
For many the daily grind can feel like a trap - work, gym, drinks, shops, home, bed, work. But what would happen if one day you just jacked it all in, to survive on next to nothing? Katharine Hibbert decided to find out. No job, no rented flat, no shopping, no debit...
At the vulnerable age of 12, Lara McDonnell was picked out by a gang of men who befriended her, showered her with attention and gained her trust. Manipulated and groomed, her life quickly spiralled out of control as the men trafficked her around the country,...
Keeping Religious Institutions Secure explores the unique vulnerabilities that churches, synagogues, and mosques face in regards to security, making them attractive to criminals who see them as easy targets. The text illustrates why all places of worship should think...
Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible assets, and people. The book merges business and security perspectives to help transform this often conflicted...
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and...
Building on the foundation of the previous five editions, Hospital and Healthcare Security, 6th Edition includes new and updated chapters to reflect the current state of healthcare security, particularly in data security and patient privacy, patient-generated violence,...
It seems that every day there's a new story about a security lapse, emergency lock-down, or violent act taking place at a school somewhere in the United States. Today it's simply inexcusable not to have adequate security measures in place—regardless of how safe you...
School security is one of the most pressing public concerns today. Yet in most schools, there is little security expertise or detailed knowledge about how to implement and manage a security program. The Handbook forSchool Safety and Security rectifies this problem by...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers