Security and loss prevention an introduction
Examines security in a range of contexts, spanning corporate issues such as personnel management and business continuity, and encompassing topics of terrorism and border security. This book covers changes in laws, various strategies of asset protection, and the technology of security and loss preven...
Saved in:
| Main Author: | Purpura, Philip P., 1950- |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Amsterdam
Elsevier
2013.
|
| Edition: | Sixth Edition. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
The market for force the consequences of privatizing security
by: Avant, Deborah D. 1958-
Published: (2005)
by: Avant, Deborah D. 1958-
Published: (2005)
Private military and security companies ethics, policies and civil-military relations
Published: (2008)
Published: (2008)
Securing global transportation networks A total security management approach
by: Ritter
Published: (2007)
by: Ritter
Published: (2007)
Security manual
by: Brooksbank
Published: (2007)
by: Brooksbank
Published: (2007)
Introduction to security
by: Fischer, Robert J.
Published: (2013)
by: Fischer, Robert J.
Published: (2013)
Private security contractors and new wars risk, law, and ethics
by: Carmola, Kateri
Published: (2010)
by: Carmola, Kateri
Published: (2010)
Conflict management for security professionals
by: Tufano, Andrew A
Published: (2014)
by: Tufano, Andrew A
Published: (2014)
Private security and identity politics ethical hero warriors, professional managers and new humanitarians
by: Joachim, Jutta M., et al.
Published: (2019)
by: Joachim, Jutta M., et al.
Published: (2019)
Introduction to executive protection
by: June, Dale L.
Published: (2016)
by: June, Dale L.
Published: (2016)
Private military and security companies (PMSCs) and the quest for accountability
Published: (2015)
Published: (2015)
Victory for hire private security companies' impact on military effectiveness
by: Dunigan, Molly
Published: (2011)
by: Dunigan, Molly
Published: (2011)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Private Military & Security Contractors Controlling The Corporate Warrior
Published: (2016)
Published: (2016)
Principles of information security
by: Whitman, Michael E
Published: (2003)
by: Whitman, Michael E
Published: (2003)
Shadow force private security contractors in Iraq /
by: Isenberg, David
Published: (2009)
by: Isenberg, David
Published: (2009)
Simple computer security disinfect your PC
Published: (2007)
Published: (2007)
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)
Published: (2017)
Outsourcing security private military contractors and U.S. foreign policy
by: Stanley, Bruce E. (Bruce Edwin)
Published: (2015)
by: Stanley, Bruce E. (Bruce Edwin)
Published: (2015)
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010)
by: Ciampa, Mark D.
Published: (2010)
Management of information security
by: Whitman
Published: (2004)
by: Whitman
Published: (2004)
Developing next-generation countermeasures for homeland security threat prevention
Published: (2016)
Published: (2016)
DETERMINING CRITICAL SUCCESS FACTORS OF INFORMATION SECURITY KNOWLEDGE TOWARDS ORGANISATIONS' INFORMATION SECURITY EFFECTIVENESS : /
by: Rohana Mohamad Rashid
Published: (2020)
by: Rohana Mohamad Rashid
Published: (2020)
Regulating private military companies conflicts of law,history, and governance
by: Galai, Katerina
Published: (2019)
by: Galai, Katerina
Published: (2019)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Firewalls don't stop dragons a step-by-step guide to computer security for non-techies
by: Parker, Carey
Published: (2018)
by: Parker, Carey
Published: (2018)
Security
by: Zedner, Lucia
Published: (2009)
by: Zedner, Lucia
Published: (2009)
The morality of private war the challenge of private military and security companies
by: Pattison, James
Published: (2014)
by: Pattison, James
Published: (2014)
IT governance and information security guides, standards, and frameworks
by: Maleh, Yassine, et al.
Published: (2022)
by: Maleh, Yassine, et al.
Published: (2022)
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
Multimedia forensics and security
Published: (2009)
Published: (2009)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Michael T.
Published: (2013)
by: Raggo, Michael T.
Published: (2013)
An investigation into the impact of a cyber exercise in Malaysia
by: Arniyati Ahmad
Published: (2020)
by: Arniyati Ahmad
Published: (2020)
Improving information security practices through computational intelligence
Published: (2016)
Published: (2016)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Corporate soldier and international security the rise of private military companies
by: Kinsey
Published: (2006)
by: Kinsey
Published: (2006)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
The security risk assessment handbook a complete guide for performing security risk assessments
by: Landoll, Douglas J.
Published: (2010)
by: Landoll, Douglas J.
Published: (2010)
Similar Items
-
The market for force the consequences of privatizing security
by: Avant, Deborah D. 1958-
Published: (2005) -
Private military and security companies ethics, policies and civil-military relations
Published: (2008) -
Securing global transportation networks A total security management approach
by: Ritter
Published: (2007) -
Security manual
by: Brooksbank
Published: (2007) -
Introduction to security
by: Fischer, Robert J.
Published: (2013)


