This handbook provides gaming security professionals with the means to mitigate the myriad security threats facing the gaming world. It details the most common risks, threats, and scams—both internal and external—and supplies the appropriate security response.
This work helps readers unfamiliar with IMS-MS to understand its fundamental theory and practical applications. After presenting an overview and funda..
"This entirely updated and enlarged Second Edition of a landmark reference/text continues to provide comprehensive coverage of every important aspect ..
Truly a practical work, this handbook offers a comprehensive roadmap for designing and implementing an effective information security program based on..
Building on the success of the first edition, Ethics for the Public Service Professional, 2e serves as a single-source resource for the topic of ethic..
This work helps readers unfamiliar with IMS-MS to understand its fundamental theory and practical applications. After presenting an overview and funda..
With reported incidents increasing every year, kidnapping for ransom continues to be a worldwide plague. This volume provides an understanding of the ..
Unveiling best practices and little-known trade secrets for private sector security investigations, the third edition of this popular text provides co..
Drawing on over two decades of experience creating continuity plans and using them in actual recoveries, including 9/11 and Hurricane Katrina, Kelley ..
Facing security problems on many fronts, including external and internal theft, operational and paperwork errors, vendor error, and Organized Retail C..
As industrial control systems (ICS) become Internet-facing, they expose crucial services to attack. Explaining how to develop and implement an effecti..
Merging public policy analysis with an understanding of human nature, this volume provides a thorough examination of the current state of policing and..