Make us homepage
Add to Favorites
FAIL (the browser should render some flash content, not this).

Main page » Tag Security

Sort by: date | rating | most visited | comments | alphabetically


Security Supervision and Management, Third Edition: The Theory and Practice of Asset Protection
2
 
 

Security Supervision and Management, Third Edition: The Theory and Practice of Asset ProtectionSecurity Supervision and Management, Third Edition: The Theory and Practice of Asset Protection

The International Foundation for Protection Officers (IFPO) has for many years provided materials to support its certification programs. The current edition of this book is being used as the core text for the Security Supervision and Management Training/Certified in Security Supervision and Management (CSSM) Program at IFPO. The CSSM is unique and was designed in 1988 to meet the needs of the security supervisor or senior protection officer. 
 
  More..
Tags: Supervision, Security, Management, Protection, supervisor, Security, Supervision, Asset
Digital Video Surveillance and Security
3
 
 

Digital Video Surveillance and SecurityDigital Video Surveillance and Security

Digital Video Surveillance and Security explains the concepts that are becoming the new standards in video security, both theoretically and from the field where the only days your hands aren’t dirty from handling the real tools and equipment are the days when you’re wearing gloves to protect your hands from the subzero temperatures.
Video surveillance has had for decades with closed-circuit television (CCTV). The world of analog television has also jumped into the digital age, thanks to the convergence of digital entertainment and communications, and video surveillance has jumped along with it.

 
  More..
Tags: Video, hands, jumped, rsquo, Digital, Security, Surveillance
Origin in Death by J.D. Robb
2
 
 

Origin in Death by J.D. RobbOrigin in Death by J.D. Robb

A pioneer of modern reconstructive and cosmetic surgery, Dr. Wilfred B. Icove, is found dead in his office-murdered in a chillingly efficient manner: one swift stab to the heart. Struck by the immaculate condition of the crime scene, Dallas suspects a professional killing. Security disks show a stunningly beautiful woman calmly entering and leaving the building-the good doctor's final appointment.
 
  More..
Tags: disks, stunningly, beautiful, Security, killing, Origin, Death, disks
Paranoia by Joseph Finder
1
 
 

Paranoia by Joseph Finder

Adam Cassidy is twenty-six and a low level employee at a high-tech corporation who hates his job. When he manipulates the system to do something nice for a friend, he finds himself charged with a crime. Corporate Security gives him a choice: prison-or become a spy in the headquarters of their chief competitor, Trion Systems.



 
  More..
Tags: headquarters, their, become, prison, gives, Finder, Paranoia, Joseph, choice, prison-or, Security
Security, Territory, Population Lectures at the College De France By Michel Foucault
7
 
 

Security, Territory, Population Lectures at the College De France By Michel FoucaultSecurity, Territory, Population Lectures at the College De France By Michel Foucault

Marking a major development in Foucault's thinking, this book takes as its starting point the notion of "biopower," studying the foundations of this new technology of power over populations. Distrinct from punitive disciplinary systems, the mechanisms of power are here finely entwined with the technologies of security.
 
  More..
Tags: power, Foucault, entwined, technologies, finely, Foucault, power, Security, France, Michel