Account
Orders
Advanced search
Vampires are the hottest topic in popular culture today. From the now classic novels of Anne Rice, to the mega-selling series by Stephanie Meyer to the hit HBO series True Blood based on the bestselling novels of Charlaine Harris, the undead are certainly not dead in...
China constitutes a fifth of the world's population. Over the last twenty years its economy has doubled to make it the fifth largest economy in the world; if the pace is repeated over the next twenty it is set to become second only to the US. The speed of its...
Introduction to Security has been the leading introduction to private security for over 30 years, celebrated for its balanced and professional approach to this increasingly important area. Now the 8th edition expands the key topics and adds material important in the...
High-Security Mechanical Locks comprehensively surveys and explains the highly technical area of high security locks in a way that is accessible to a wide audience. Well over 100 different locks are presented, organized into 6 basic types. Each chapter introduces the...
Design and Evaluation of Physical Security Systems, Second Edition, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate...
This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company. Fighting Fraud provides an exceptional...
The Encyclopedia of Security Management is a valuable guide for all security professionals, and an essential resource for those who need a reference work to support their continuing education. In keeping with the excellent standard set by the First Edition, the Second...
Sit back, grab some popcorn, and let the credits roll. The Complete Idiot's Guide® to Classic Movies provides comprehensive information on the best classic films from the silent era up through 1969, cross-referenced several different ways for easy access. Also contains...
Security Law and Methods examines suggested security methods designed to diminish or negate the consequence of crime and misconduct, and is an attempt to understand both the legal exposures related to crime and the security methods designed to prevent crime. The clear...
Emergency Response Planning for Corporate and Municipal Managers, Second Edition, outlines the essential roles of corporate and municipal managers when responding to a wide range of natural and man-made disasters. It demonstrates the importance of their relationships...
Security metrics is the application of quantitative, statistical, and/or mathematical analyses to measuring security functional trends and workload. In other words, tracking what each function is doing in terms of level of effort (LOE), costs, and productivity.Security...
Vulnerability Assessment of Physical Protection Systems guides the reader through the topic of physical security with a unique, detailed and scientific approach. The book describes the entire vulnerability assessment (VA) process, from the start of planning through...
A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a...
Here is the most comprehensive introduction to and explanation of the most infamous crime organization in history. Completely updated with more than 70 pages of new material and photographs, it includes information about the shifts in power and tightening of ranks of...
The incredible influence of Ancient Greek culture on everything from sicence to literature to politics continues to be relevant and hotly debated. In 'The Complete Idiot's Guide to Ancient Greece', you are invited to meet the Ancient Greeks and to understand their...
Private Security and the Law, Third Edition is a textbook analysis of significant practices in the security industry that relate to law, regulation, licensure and constitutional dilemmas according to case and statutory authority. It is a treatise on the state of the law...
Effective Physical Security, Third Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the previous Butterworth-Heinemann...
The Handbook of Loss Prevention and Crime Prevention, Fourth Edition, is the most comprehensive reference of its kind, covering the latest information on every topic from community-oriented policing to physical security, workplace violence, CCTV, information security,...
Guard Force Management looks at the contract guard force as a business and demonstrates how current management techniques can be used to improve efficiency and increase profitability. The author takes proven management principles and applies them to the competitive...
Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers