Account
Orders
Advanced search
Threat Assessment and Risk Analysis: An Applied Approach details the entire risk analysis process in accessible language, providing the tools and insight needed to effectively analyze risk and secure facilities in a broad range of industries and organizations. The book...
By Steppe, Desert, and Ocean is nothing less than the story of how humans first started building the globalized world we know today. Set on a huge continental stage, from Europe to China, it is a tale covering over 10,000 years, from the origins of farming around 9000...
Security Operations Management, 3rd edition, is the latest edition the seminal reference on corporate security management operations for today’s security management professionals and students. The book explores the characteristics of today’s globalized workplaces, why...
According to Pinkerton—the leading provider of risk management services in the world—workplace violence is second only to cybersecurity as the top threat faced by organizations today. Incidents involving active shooters in the workplace are on the rise and becoming more...
This book presents a fascinating analysis of expertise and policy formation, based on an in-depth study of the UK Royal Commission on Environmental Pollution. The Commission provided expert advice to governments from 1970 to 2011. Often portrayed as a scientific body,...
Where do myths come from? What is their function and what do they mean? In this Very Short Introduction Robert Segal introduces the array of approaches used to understand the study of myth. These approaches hail from disciplines as varied as anthropology, sociology,...
Social workers spend their time trying to ease social suffering. They encounter the extreme casualties of social inequality: the victims of poverty, illness, addiction, and abuse; they work with abusers and offenders; and operate in the space between the State and the...
In 2006, after a scandal that gripped the country, the British government began to transform its prison system. Under pressure to find and expel foreigners, Her Majesty's Prison Service began concentrating non-citizens in prisons with 'embedded' border agents. Today,...
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways...
Speaking Truths to Power: Policy Ethnography and Police Reform in Bosnia and Herzegovina presents a rigorous institutional-level analysis of the effects of globalisation on local policing, drawing on data generated from two ethnographic case studies conducted in 2011 in...
As the youth gang phenomenon becomes an important and sensitive public issue, communities from Los Angeles to Rio, Cape Town to London are facing the reality of what such violent groups mean for their children and young people. Complex dangers and instabilities, as well...
Keeping Religious Institutions Secure explores the unique vulnerabilities that churches, synagogues, and mosques face in regards to security, making them attractive to criminals who see them as easy targets. The text illustrates why all places of worship should think...
Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible assets, and people. The book merges business and security perspectives to help transform this often conflicted...
The Neolithic --a period in which the first sedentary agrarian communities were established across much of Europe--has been a key topic of archaeological research for over a century. However, the variety of evidence across Europe, the range of languages in which...
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers