Skip to Content

Books by Subject

Security Services Books

You are currently browsing 1–10 of 151 new and published books in the subject of Security Services — sorted by publish date from newer books to older books.

For books that are not yet published; please browse forthcoming books.

New and Published Books

  1. Risk Assessment and Security for Pipelines, Tunnels, and Underground Rail and Transit Operations

    By Anna M. Doro-on

    Risk Assessment and Security for Pipelines, Tunnels, and Underground Rail and Transit Operations details a quantitative risk assessment methodology for systematically analyzing various alternatives for protecting underground rail, oil and gas pipelines, pipeline freight transportation, and other...

    Published June 2nd 2014 by CRC Press

  2. Breaking Al-Qaeda

    Psychological and Operational Techniques, Second Edition

    By Elena Mastors

    Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition explores the background and history of al-Qaeda, covers recent developments, and explains how, why, and where the al-Qaeda network is expanding. The author examines the current state of the terrorist network and describes...

    Published May 11th 2014 by CRC Press

  3. Risk Management of Less Lethal Options

    Evaluation, Deployment, Aftermath, and Forensics

    By R.T. Wyant, Thomas Burns

    Force used to quell out-of-control demonstrations or detain unruly individuals can result in litigation and bad press for law enforcement agencies. Injury or loss of life can best be avoided if agencies have accurate knowledge and proper training in less lethal options. Risk Management of Less...

    Published April 27th 2014 by CRC Press

  4. Conducting Network Penetration and Espionage in a Global Environment

    By Bruce Middleton

    When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer...

    Published April 27th 2014 by Auerbach Publications

  5. Crisis and Emergency Management

    Theory and Practice, Second Edition

    By Ali Farazmand

    Series: Public Administration and Public Policy

    More than 12 years have passed since the publication of the first edition of Crisis and Emergency Management. During that time numerous disasters—from 9/11 to massive earthquakes in Iran and China, to the giant Asian Tsunami, Hurricane Katrina, and the Fukushima Tsunami and ensuing nuclear...

    Published March 24th 2014 by CRC Press

  6. Practical Military Ordnance Identification

    By Tom Gersbeck

    Series: Practical Aspects of Criminal and Forensic Investigations

    The threat variables associated with military ordnance are enormous, requiring the application of a structured process to identify unknown munitions. The focus of Practical Military Ordnance Identification is the application of a practical deductive process to identify unknown ordnance items that...

    Published March 4th 2014 by CRC Press

  7. How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

    By David Kahn

    Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking...

    Published January 16th 2014 by Auerbach Publications

  8. Introduction to Homeland Security, Second Edition

    By David H. McElreath, Carl J. Jensen, Michael Wigginton, Jr., Daniel Adrian Doss, Robert Nations, Jeffrey Van Slyke

    Since the attacks of 9/11, billions of dollars and countless resources have been committed and expended in the attempt to make the nation more secure. Introduction to Homeland Security: Second Edition is written by a team of homeland security and justice professionals on the cutting edge of the...

    Published December 17th 2013 by CRC Press

  9. Trade Secret Theft, Industrial Espionage, and the China Threat

    By Carl Roper

    Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage...

    Published December 9th 2013 by CRC Press

  10. Crisis Management and Emergency Planning

    Preparing for Today's Challenges

    By Michael J. Fagel

    Emergency managers and officials have seen a tremendous increase in the planning responsibilities placed on their shoulders over the last decade. Crisis Management and Emergency Planning: Preparing for Today's Challenges supplies time-tested insights to help communities and organizations become...

    Published December 3rd 2013 by CRC Press