Account
Orders
Advanced search
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways...
Keeping Religious Institutions Secure explores the unique vulnerabilities that churches, synagogues, and mosques face in regards to security, making them attractive to criminals who see them as easy targets. The text illustrates why all places of worship should think...
Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible assets, and people. The book merges business and security perspectives to help transform this often conflicted...
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and...
A bite-sized guide to making change happen and the story behind the No More Page 3 campaign, written by its founder. Change doesn’t just happen. It starts with the idea that something could be different, could be better. It starts with a person who is brave enough to...
Building on the foundation of the previous five editions, Hospital and Healthcare Security, 6th Edition includes new and updated chapters to reflect the current state of healthcare security, particularly in data security and patient privacy, patient-generated violence,...
'An extraordinary book . . . It will shake up your most fundamental beliefs about everyday experience, and it just might change your life.' Paul Bloom___For the millions of people who want spirituality without religion, Sam Harris's new book is a guide to meditation as...
It seems that every day there's a new story about a security lapse, emergency lock-down, or violent act taking place at a school somewhere in the United States. Today it's simply inexcusable not to have adequate security measures in place—regardless of how safe you...
This book is the first to investigate the effects of participation in separation or divorce proceedings on femicide (murder of a female), femicide-suicide, homicide, and suicide. Because separation is one of the most significant predictors of domestic violence, this...
When Jean Sasson’s book Princess: Life Behind the Veil in Saudi Arabia was published, it became an immediate international bestseller. It sold to 43 countries and spent 13 weeks on The New York Times bestseller list. Now, in this long-awaited, compelling new book,...
School security is one of the most pressing public concerns today. Yet in most schools, there is little security expertise or detailed knowledge about how to implement and manage a security program. The Handbook forSchool Safety and Security rectifies this problem by...
Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an...
Criminal Justice Internships: Theory Into Practice guides the student, instructor, and internship site supervisor through the entire internship process, offering advice and information for use at the internship site as well as pre-planning and assessment activities....
This student-friendly introductory text describes the criminal justice process—outlining the decisions, practices, people, and issues involved. It provides a solid introduction to the mechanisms of the criminal justice system, with balanced coverage of the issues...
Telecommunications Engineer's Reference Book maintains a balance between developments and established technology in telecommunications. This book consists of four parts. Part 1 introduces mathematical techniques that are required for the analysis of telecommunication...
RETAIL SECURITY AND LOSS PREVENTION is an invaluable reference for both retail and security professionals. Using step-by-step plans, this book helps the reader design and implement cost-effective loss control programs.It details an easy-to-follow proven process.
Tourism security is an important part of both security management and tourism. Private security professionals and police departments in tourism cities, as well as hotels, major attractions, and theme parks, have all come to realize that tourism security and safety...
In the field of law enforcement in the United States, it is essential to know the contemporary problems being faced and combine that knowledge with empirical research and theoretical reasoning to arrive at best practices and an understanding of policing. Policing in...
This valuable tool for the security manager will assist in tailoring surveys specifically for computer security. The Ultimate Computer Security Survey will allow security managers to take one of the most time-consuming and difficult areas of security -vulnerability...
Personal Social Services serves as a comprehensive source of statistical data for any researcher, be they students or professional. The text opens with a definition of children's services, health and welfare services. It describes and discusses local authority personal...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers