Introduction to security
Celebrated for its balanced and professional approach, this book gives future security professionals a broad, solid base that prepares them to serve in a variety positions in a growing field that is immune to outsourcing.
Saved in:
| Main Author: | Fischer, Robert J. |
|---|---|
| Other Authors: | Halibozek, Edward P., Walters, David, 1963- |
| Format: | Book |
| Language: | English |
| Published: |
Amsterdam ; New York
Elsevier
c2013.
|
| Edition: | 9th ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Conflict management for security professionals
by: Tufano, Andrew A
Published: (2014)
by: Tufano, Andrew A
Published: (2014)
Introduction to executive protection
by: June, Dale L.
Published: (2016)
by: June, Dale L.
Published: (2016)
Contemporary security management
by: Fay
Published: (2002)
by: Fay
Published: (2002)
Risk analysis and security countermeasure selection
by: Norman, Thomas L.
Published: (2016)
by: Norman, Thomas L.
Published: (2016)
Private security contractors and new wars risk, law, and ethics
by: Carmola, Kateri
Published: (2010)
by: Carmola, Kateri
Published: (2010)
Private security and identity politics ethical hero warriors, professional managers and new humanitarians
by: Joachim, Jutta M., et al.
Published: (2019)
by: Joachim, Jutta M., et al.
Published: (2019)
Victory for hire private security companies' impact on military effectiveness
by: Dunigan, Molly
Published: (2011)
by: Dunigan, Molly
Published: (2011)
Security and loss prevention an introduction
by: Purpura, Philip P., 1950-
Published: (2013)
by: Purpura, Philip P., 1950-
Published: (2013)
Private military and security companies (PMSCs) and the quest for accountability
Published: (2015)
Published: (2015)
The market for force the consequences of privatizing security
by: Avant, Deborah D. 1958-
Published: (2005)
by: Avant, Deborah D. 1958-
Published: (2005)
Securing Web services practical usage of standards and specifications
Published: (2008)
Published: (2008)
Shadow force private security contractors in Iraq /
by: Isenberg, David
Published: (2009)
by: Isenberg, David
Published: (2009)
Private Military & Security Contractors Controlling The Corporate Warrior
Published: (2016)
Published: (2016)
Private military and security companies ethics, policies and civil-military relations
Published: (2008)
Published: (2008)
Security manual
by: Brooksbank
Published: (2007)
by: Brooksbank
Published: (2007)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
Outsourcing security private military contractors and U.S. foreign policy
by: Stanley, Bruce E. (Bruce Edwin)
Published: (2015)
by: Stanley, Bruce E. (Bruce Edwin)
Published: (2015)
Regulating private military companies conflicts of law,history, and governance
by: Galai, Katerina
Published: (2019)
by: Galai, Katerina
Published: (2019)
Maritime security an introduction
by: McNicholas, Michael
Published: (2016)
by: McNicholas, Michael
Published: (2016)
Maritime security protection of marinas, ports, small watercraft, yachts, and ships
by: Benny, Daniel J.
Published: (2016)
by: Benny, Daniel J.
Published: (2016)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Logistics and transportation security a strategic, tactical, and operational guide to resilience
by: Burns, Maria G.
Published: (2015)
by: Burns, Maria G.
Published: (2015)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
The morality of private war the challenge of private military and security companies
by: Pattison, James
Published: (2014)
by: Pattison, James
Published: (2014)
Introduction to security and network forensics
by: Buchanan, William
Published: (2011)
by: Buchanan, William
Published: (2011)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
The management of network security technology, design, and management control
by: Carr, Houston H. 1937-
Published: (2010)
by: Carr, Houston H. 1937-
Published: (2010)
Pembangunan budaya keselamatan di tempat kerja
by: Mohd Saidin Misnan, et al.
Published: (2011)
by: Mohd Saidin Misnan, et al.
Published: (2011)
Security and software for cybercafes
Published: (2008)
Published: (2008)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Fourth-generation corporate security asymmetrical warfare for protective services professionals
by: Godlewski, R.J
Published: (2014)
by: Godlewski, R.J
Published: (2014)
Web security a whitehat perspective
by: Hanqing, Wu, et al.
Published: (2015)
by: Hanqing, Wu, et al.
Published: (2015)
CWSP guide to wireless security
Published: (2007)
Published: (2007)
Similar Items
-
Conflict management for security professionals
by: Tufano, Andrew A
Published: (2014) -
Introduction to executive protection
by: June, Dale L.
Published: (2016) -
Contemporary security management
by: Fay
Published: (2002) -
Risk analysis and security countermeasure selection
by: Norman, Thomas L.
Published: (2016) -
Private security contractors and new wars risk, law, and ethics
by: Carmola, Kateri
Published: (2010)


