Account
Orders
Advanced search
Eduardo Saverin and Mark Zuckerberg - an awkward maths prodigy and a painfully shy computer genius - were never going to fit in at elite, polished Harvard. Yet that all changed when master-hacker Mark crashed the university's entire computer system by creating a...
Long before modern medicines became so widely available, families treated everyday illnesses with home-made remedies. Reused and refined year after year, they were handed down through the generations then lovingly copied into personal 'receipt' books. Grandma's Remedies...
It was 8.46 a.m. on 9/11 when Elia Zedeño, who had worked in the World Trade Center for twenty-one years, heard a booming explosion and felt the building lurch violently to the south. She grabbed her desk, taking her feet off the floor, and screamed, 'What's...
Pregnancy and childbirth remains a mystical and magical time, characterised by feelings of hope, uncertainty and worry. No matter how many scientific innovations come along, there's still room for home-grown beliefs and traditions handed down through the family. Couples...
Did you know that Barnacle geese were once classified as fish? That both the Cherokees and the ancient Greeks were convinced that cranes regularly fought battles with pygmies? That the Swiss believed that any cuckoo that managed to survive for a year would turn into an...
On a narrow cobbled street in a northern mill town young Harry Bernstein and his family face a daily struggle to make ends meet. This is the true story of those harsh years, overshadowed by the First World War.Amidst the hardship and suffering, Harry's devoted mother...
Introduction to Security has been the leading introduction to private security for over 30 years, celebrated for its balanced and professional approach to this increasingly important area. Now the 8th edition expands the key topics and adds material important in the...
High-Security Mechanical Locks comprehensively surveys and explains the highly technical area of high security locks in a way that is accessible to a wide audience. Well over 100 different locks are presented, organized into 6 basic types. Each chapter introduces the...
Design and Evaluation of Physical Security Systems, Second Edition, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate...
This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company. Fighting Fraud provides an exceptional...
The Encyclopedia of Security Management is a valuable guide for all security professionals, and an essential resource for those who need a reference work to support their continuing education. In keeping with the excellent standard set by the First Edition, the Second...
Security Law and Methods examines suggested security methods designed to diminish or negate the consequence of crime and misconduct, and is an attempt to understand both the legal exposures related to crime and the security methods designed to prevent crime. The clear...
Emergency Response Planning for Corporate and Municipal Managers, Second Edition, outlines the essential roles of corporate and municipal managers when responding to a wide range of natural and man-made disasters. It demonstrates the importance of their relationships...
Security metrics is the application of quantitative, statistical, and/or mathematical analyses to measuring security functional trends and workload. In other words, tracking what each function is doing in terms of level of effort (LOE), costs, and productivity.Security...
Vulnerability Assessment of Physical Protection Systems guides the reader through the topic of physical security with a unique, detailed and scientific approach. The book describes the entire vulnerability assessment (VA) process, from the start of planning through...
A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a...
Private Security and the Law, Third Edition is a textbook analysis of significant practices in the security industry that relate to law, regulation, licensure and constitutional dilemmas according to case and statutory authority. It is a treatise on the state of the law...
Effective Physical Security, Third Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the previous Butterworth-Heinemann...
The Handbook of Loss Prevention and Crime Prevention, Fourth Edition, is the most comprehensive reference of its kind, covering the latest information on every topic from community-oriented policing to physical security, workplace violence, CCTV, information security,...
Guard Force Management looks at the contract guard force as a business and demonstrates how current management techniques can be used to improve efficiency and increase profitability. The author takes proven management principles and applies them to the competitive...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers