Skip to main content

Books in Security management

61-70 of 132 results in All results

Introduction to Security

  • 9th Edition
  • September 26, 2012
  • Robert Fischer + 2 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 8 5 0 5 7 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 5 0 5 8 - 4
Introduction to Security has been the leading text on private security for over thirty years. Celebrated for its balanced and professional approach, this new edition gives future security professionals a broad, solid base that prepares them to serve in a variety of positions. Security is a diverse and rapidly growing field that is immune to outsourcing. The author team as well as an outstanding group of subject-matter experts combine their knowledge and experience with a full package of materials geared to experiential learning. As a recommended title for security certifications, and an information source for the military, this is an essential reference for all security professionals. This timely revision expands on key topics and adds new material on important issues in the 21st century environment such as the importance of communication skills; the value of education; internet-related security risks; changing business paradigms; and brand protection.

Keys to the Kingdom

  • 1st Edition
  • September 24, 2012
  • Deviant Ollam
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 8 3 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 3 9 7 9 3 0 - 8
Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the author’s previous book, Practical Lock Picking. This material is all new and focuses on locks currently in use as well as ones that have recently emerged on the market. Hackers and pen testers or persons tasked with defending their infrastructure and property from invasion will find these techniques uniquely valuable. As with Deviant Ollam’s previous book, Practical Lock Picking,  Keys to the Kingdom includes full-color versions of all diagrams and photographs. Check out the companion website which includes instructional videos that provide readers with a full-on training seminar from the author.

Practical Lock Picking

  • 2nd Edition
  • September 24, 2012
  • Deviant Ollam
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 8 9 - 7
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 9 9 0 - 3
Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques such as shimming, bumping, and bypassing. Written by Deviant Ollam, one of the security industry's best-known lockpicking teachers, and winner of the Best Book Bejtlich Read in 2010 award, this book contains detailed photos that make learning as easy as picking a lock. Material is offered in easy-to-follow lessons that allow even beginners to acquire the knowledge very quickly. Whether the student will be hired at some point to penetrate security or simply trying to harden his or her own defenses, this book is essential.This edition has been updated to reflect the changing landscape of tools and tactics which have emerged in recent years. It consists of 6 chapters that discuss topics such as the fundamentals of pin tumbler and wafer locks; the basics of picking, with emphasis on how to exploit weaknesses; tips for beginners on how to get very good and very fast in picking locks; advanced training; quick-entry tricks about shimming, bumping, and bypassing; and pin tumblers in other configurations.This book is geared specifically toward penetration testers, security consultants, IT security professionals, and hackers.

Cyber Attacks

  • 1st Edition
  • February 17, 2012
  • Edward Amoroso
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 9 1 8 5 5 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 3 9 1 8 6 7 - 3
Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure. This approach includes controversial themes such as the deliberate use of deception to trap intruders. This volume thus serves as an attractive framework for a new national strategy for cyber security. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. In this edition, each principle is presented as a separate security strategy and illustrated with compelling examples. The book adds 50-75 pages of new material aimed specifically at enhancing the student experience and making it more attractive for instructors teaching courses such as cyber security, information security, digital security, national security, intelligence studies, technology and infrastructure protection. It now also features case studies illustrating actual implementation scenarios of the principles and requirements discussed in the text, along with a host of new pedagogical elements, including chapter outlines, chapter summaries, learning checklists, and a 2-color interior. Furthermore, a new and complete ancillary package includes test bank, lesson plans, PowerPoint slides, case study questions, and more. This text is intended for security practitioners and military personnel as well as for students wishing to become security engineers, network operators, software designers, technology managers, application developers, etc.

Risk Analysis and the Security Survey

  • 4th Edition
  • December 7, 2011
  • James F. Broder + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 8 2 2 3 3 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 2 2 3 4 - 5
As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of Risk Analysis and the Security Survey. Broder and Tucker guide you through analysis to implementation to provide you with the know-how to implement rigorous, accurate, and cost-effective security policies and designs. This book builds on the legacy of its predecessors by updating and covering new content. Understand the most fundamental theories surrounding risk control, design, and implementation by reviewing topics such as cost/benefit analysis, crime prediction, response planning, and business impact analysis--all updated to match today's current standards. This book will show you how to develop and maintain current business contingency and disaster recovery plans to ensure your enterprises are able to sustain loss are able to recover, and protect your assets, be it your business, your information, or yourself, from threats.

Introduction to Homeland Security

  • 4th Edition
  • December 2, 2011
  • George Haddow + 2 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 5 9 6 8 - 6
Bullock, Haddow, and Coppola have set the standard for homeland security textbooks, and they follow up their #1-selling third edition with this substantially improved version. Students will value the decades of experience that the authors bring to their analysis, and the new edition offers still more research-based data to balance the field-tested practical information included in each chapter. Additionally, links to the most current online government information help to keep the text up-to-date in this rapidly developing field. As with its predecessors, the book clearly delineates the bedrock principles of preparing for, mitigating, managing, and recovering from emergencies and disasters. However, this new edition emphasizes their value with improved clarity and focus. NEW TO THIS EDITION: This edition has been thoroughly revised to include changes that are based both on changes relevant to the political, budgetary, and legal aspects of homeland security that have changed since the 2008 Presidential election (and subsequent change in the administration), but also in recognition of an expanding academic demand that is both larger in size and changing in scope (most notably with regard to an increase in the number of government employees and officials who are taking courses that have adopted the text). These include: an expansion of material on the organization of the Department of Homeland Security; strategic and philosophical changes that are recommended and/or that have occurred as a result of the Quadrennial Homeland Security Review completed in 2010; updated budgetary information on both homeland security programs and on the homeland security grants that have supported safety and security actions at the state and local levels, as well as in the private sector; and changes in the way the public perceives and receives information about security risk, including the possible elimination of the Homeland Security Advisory System.

Private Security and the Law

  • 4th Edition
  • October 13, 2011
  • Charles Nemeth
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 8 6 9 2 2 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 6 9 2 3 - 4
Private Security and the Law, Fourth Edition, is a unique resource that provides a comprehensive analysis of practices in the security industry as they relate to law, regulation, licensure, and constitutional questions of case and statutory authority. It is an authoritative, scholarly treatise that serves as a solid introduction for students regarding the legal and ethical standards that shape the industry. The book takes you step-by-step through the analysis of case law as it applies to situations commonly faced by security practitioners. It describes the legal requirements faced by security firms and emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency. It also examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that are likely to intensify in the future. New features of this edition include: a chapter on the legal implications of private contractors operating in war zones like Afghanistan; updated coverage of statutory authority, as well as state and federal processes of oversight and licensure; and special analysis of public-private cooperative relationships in law enforcement. A historical background helps readers understand the present by seeing the full context of recent developments. This book will appeal to: students in physical security, security management, and criminal justice programs in traditional and for-profit schools; security professionals; and those working in law enforcement.

Thor's Microsoft Security Bible

  • 1st Edition
  • July 16, 2011
  • Timothy "Thor" Mullen
  • English
  • Hardback
    9 7 8 - 1 - 5 9 7 4 9 - 5 7 2 - 1
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 5 7 3 - 8
Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes and methodologies uniquely illustrated through real-world process examples. This book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, and application specific security (IIS, SQL, Active Directory, etc.). It also includes new, never-before-published security tools complete with source code; detailed technical information on security processes for all major Microsoft applications; unique project-based storytelling delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases; reference-style content for access to specific application security techniques and methods; actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so. This book will be of interest to systems and network administrators, IT managers, security and network engineers, and database administrators.

Introduction to Homeland Security

  • 3rd Edition
  • April 19, 2011
  • Jane Bullock + 2 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 4 9 5 2 - 9
Bullock and Haddow have set the standard for homeland security textbooks, and they follow up their top-selling second edition with this substantially improved third edition. Professional practitioners value the decades of experience that the authors bring to their analysis, and their passionate argument for an all-hazards approach to enhancing America's safety is now presented still more cogently.Links to the most current online government information help to keep the text up-to-date in this rapidly developing field.The bedrock principles of preparing for, mitigating, managing, and recovering from a disaster remain the same through the years, and this revision emphasizes their value with new clarity and conviction.

Effective Security Management

  • 5th Edition
  • March 28, 2011
  • Charles A. Sennewald
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 2 0 1 3 - 6
Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. Working with a team of sterling contributors endowed with cutting-edge technological expertise, the book presents the most accurately balanced picture of a security manager’s duties. Its Jackass Management cartoons also wittily illustrate the array of pitfalls a new manager must learn to avoid in order to lead effectively. In short, this timely revision of a classic text retains all the strengths that have helped the book endure over the decades and adds the latest resources to support professional development.