Business & Management

Security Management

Per Page:
Sort:

Essentials of Modeling and Analytics: Retail Risk Management and Asset Protection

David B. Speights, Daniel M. Downs, Adi Raz
September 12, 2017

Essentials of Modeling and Analytics illustrates how and why analytics can be used effectively by loss prevention staff. The book offers an in-depth overview of analytics, first illustrating how analytics are used to solve business problems, then exploring the tools and training that staff will...

Railway Security: Protecting Against Manmade and Natural Disasters

Richard R. Young, Gary A. Gordon, Jeremy F. Plant
August 10, 2017

This book provides an overview and assessment of the security risks, both manmade and natural, facing the railways and rail networks. Railroads face significant threats from disasters, but with situational awareness and coordinated effort these can often be substantially minimized. Transportation...

Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats

Anthony D. Manley
July 13, 2017

Terrorist or criminal attack, fire emergency, civil or geographic disruption, or major electrical failure—recent years have witnessed an increase in the number of natural disasters and man-made events that have threatened the livelihoods of businesses and organizations worldwide. Security Manager’s...

Vein Pattern Recognition: A Privacy-Enhancing Biometric

Chuck Wilson
June 14, 2017

As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR’s growing acceptance and use: it is more accurate than many other biometric methods, it...

Trends in Policing: Interviews with Police Leaders Across the Globe, Volume 2

Dilip K. Das, Otwin Marenin
June 13, 2017

Police leaders possess a plethora of rich experiences and practical and theoretical knowledge that provides fascinating insights into the current state of policing around the world. While observers’ opinions of ongoing developments in policing are well known, it is rare to get an insider’s glimpse...

Internet Searches for Vetting, Investigations, and Open-Source Intelligence

Edward J. Appel
May 31, 2017

In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases,...

Security Surveillance Centers: Design, Implementation, and Operation

Anthony V. DiSalvatore
April 14, 2017

Unlike current books on the market that focus primarily on the technical aspects of surveillance and protection, Security Surveillance Centers: Design, Implementation, and Operation focuses on the operation of a security surveillance center. This text explains in detail the role of security...

The Comprehensive Handbook of School Safety

E. Scott Dunlap
March 29, 2017

In most schools you will probably see one, if not all of the following: Metal detectors to prevent handguns and other weapons from being brought onto school property Students in standardized uniforms to prevent the appearance of gang affiliations Police officers patrolling the property to deter...

Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

Fredrik Nilsson, Communications Axis
November 21, 2016

Continuing in the tradition of the bestselling first edition, this book examines networked surveillance video solutions. It provides the latest details on industry hardware, software, and networking capabilities of the latest cameras and DVRs. It addresses in full detail updated specifications on...

Information Security Management Handbook, Sixth Edition, Volume 6

Harold F. Tipton, Micki Krause Nozaki
November 16, 2016

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it...

Noiseless Steganography: The Key to Covert Communications

Abdelrahman Desoky
November 16, 2016

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the...

The Facility Manager's Guide to Safety and Security

John W. Henderson
August 24, 2016

A guide for facility managers of varying types of facilities including, apartment buildings/complexes, office buildings, retail stores, educational facilities (schools), restaurants, and countless others. It will look specifically at the physical similarities inherent in all buildings/facilities...

Conferences

Year: