Introduction to executive protection
At a time when personal security risks are on the rise internationally, Introduction to Executive Protection, Third Edition takes readers beyond "the wizard's curtain" of fear, unawareness, and surprise to give them the tools to sharpen or renew their skills so those they are tasked w...
Saved in:
| Main Author: | June, Dale L. (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, FL
CRC Press, Taylor & Francis Group
2016
|
| Edition: | Third edition. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Introduction to security
by: Fischer, Robert J.
Published: (2013)
by: Fischer, Robert J.
Published: (2013)
Conflict management for security professionals
by: Tufano, Andrew A
Published: (2014)
by: Tufano, Andrew A
Published: (2014)
Risk analysis and security countermeasure selection
by: Norman, Thomas L.
Published: (2016)
by: Norman, Thomas L.
Published: (2016)
Contemporary security management
by: Fay
Published: (2002)
by: Fay
Published: (2002)
Protective operations a handbook for security and law enforcement
by: McGovern, Glenn P.
Published: (2011)
by: McGovern, Glenn P.
Published: (2011)
Network attacks and exploitation a framework
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Security and loss prevention an introduction
by: Purpura, Philip P., 1950-
Published: (2013)
by: Purpura, Philip P., 1950-
Published: (2013)
Fourth-generation corporate security asymmetrical warfare for protective services professionals
by: Godlewski, R.J
Published: (2014)
by: Godlewski, R.J
Published: (2014)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Private security contractors and new wars risk, law, and ethics
by: Carmola, Kateri
Published: (2010)
by: Carmola, Kateri
Published: (2010)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Private security and identity politics ethical hero warriors, professional managers and new humanitarians
by: Joachim, Jutta M., et al.
Published: (2019)
by: Joachim, Jutta M., et al.
Published: (2019)
Protecting our ports domestic and international politics of containerized freight security
by: Grillot, Suzette, et al.
Published: (2010)
by: Grillot, Suzette, et al.
Published: (2010)
Fighting computer crime a new framework for protecting information
by: Parker
Published: (1998)
by: Parker
Published: (1998)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Victory for hire private security companies' impact on military effectiveness
by: Dunigan, Molly
Published: (2011)
by: Dunigan, Molly
Published: (2011)
Hacking web apps detecting and preventing web application security problems
by: Shema, Mike
Published: (2012)
by: Shema, Mike
Published: (2012)
Accountability for human rights atrocities in international law beyond the Nuremberg legacy
by: Ratner, Steven R.
Published: (2009)
by: Ratner, Steven R.
Published: (2009)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Cybersecurity public sector threats and responses
Published: (2012)
Published: (2012)
Protecting your PC
by: Barile, Ian
Published: (2006)
by: Barile, Ian
Published: (2006)
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013)
by: Bergman, Neil
Published: (2013)
Private military and security companies (PMSCs) and the quest for accountability
Published: (2015)
Published: (2015)
Dam Sector Protection and Homeland Security /
by: Spellman, Frank R.
Published: (2017)
by: Spellman, Frank R.
Published: (2017)
The market for force the consequences of privatizing security
by: Avant, Deborah D. 1958-
Published: (2005)
by: Avant, Deborah D. 1958-
Published: (2005)
Crimeware understanding new attacks and defenses
Published: (2008)
Published: (2008)
Scene of the cybercrime computer forensics
Published: (2015)
Published: (2015)
Emerging trends in ICT security
Published: (2014)
Published: (2014)
Combating security breaches and criminal activity in the digital sphere
Published: (2016)
Published: (2016)
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
Machine learning and cognitive science applications in cyber security
Published: (2019)
Published: (2019)
The basics of web hacking tools and techniques to attack the web
by: Pauli, Joshua J.
Published: (2013)
by: Pauli, Joshua J.
Published: (2013)
Sailing safe in cyberspace protect your identity and data
by: Kaushik, Anjali
Published: (2013)
by: Kaushik, Anjali
Published: (2013)
Private anti-piracy navies how warships for hire are changing maritime security
by: Pitney, John J. Jr. 1955-, et al.
Published: (2014)
by: Pitney, John J. Jr. 1955-, et al.
Published: (2014)
Similar Items
-
Introduction to security
by: Fischer, Robert J.
Published: (2013) -
Conflict management for security professionals
by: Tufano, Andrew A
Published: (2014) -
Risk analysis and security countermeasure selection
by: Norman, Thomas L.
Published: (2016) -
Contemporary security management
by: Fay
Published: (2002) -
Protective operations a handbook for security and law enforcement
by: McGovern, Glenn P.
Published: (2011)


