Security Specialists, Inc Box Set


Book Description

Target for Terror - Critical Care Nurse Natalia Sokolova's life has blown up around her, literally. The only person she trusts is former FBI agent Sloan Dryer. As they run for their lives, and from the attraction simmering between them, they uncover a terrorist plot that could bring the nation to its knees. Can Sloan and Natalia save their country and their future, before it's too late? Target for Ransom -Former FBI Agent Jordan Rashid has been tasked with infiltrating a terrorist cell located in DC. But when he learns the daughter he didn't know he had was kidnapped, his mission becomes personal. Diana and Jordan must find a way to put their rocky past aside and work together to save Bryn. Can they save hundreds of innocent lives in time to become a family, once again? Target for Revenge - Sun Lin is teamed up with her former Mensa friend Mack Remington to find a suspected Korean nuclear bomb that has been smuggled into DC. Working together, they fight assailants around every corner. The clock is ticking. Can Mack keep Sun alive, find the bomb, and convince her how much he loves her, before it's too late? Target for Treason - Former Secret Service agent Boyd Sinclair finds protecting Microbiologist Lina Parker more challenging than anything he'd experienced at the White House. Lina's simple DNA test has revealed secrets that lead to a terrorist threat. Lina knows Boyd is the only man she can trust - but will they find the traitor in their midst in time?




Shifter Protection Specialists, Inc: Box Set


Book Description

Shifter Protection Specialists, Inc series: a box set Purrfect Protector Never play cat and mouse with a saber-tooth tiger. When Kale Andrews gets disturbing mail from an obsessed fan, his brother drags him to Shifter Protection Specialists, Inc. Kale reluctantly agrees to have a bodyguard, but when a tall, muscular blond walks into the office emanating power and a sexy dose of danger, Kale's doubts about needing the man with him twenty-four hours a day quickly disappear. The easy babysitting job Aleksi was promised quickly changes from strange mail to threatening deliveries, so Aleksi has to become creative to keep his protectee out of danger. Everyone knows models are self-centered and shallow, so why does being with Kale make him feel like he finally has a home? Since he's a saber-tooth tiger and naturally dominant, most people aren't strong enough to be with him in a relationship or even as a friend. Yet Kale seems to calm his beast, simultaneously exciting the man in Aleksi. Neither man expects nor wants a relationship with strings, but as they grow closer, Aleksi realizes that Kale might be his mate. With an obsessed fan escalating toward murder, Aleksi isn't sure that even his tiger can keep his mate safe. Protecting his Asset Float like a butterfly. Kill like a swallowtail. Scott knows his boring day is over the second a bloody and scared George Kelvin crashes into his office, claiming people are trying to kill him. He knows he should pass the case over to one of his brothers, but he can't seem to do it. The strength and resilience of the man mixed with a quirky sense of humor fascinate him. He may be a human in the company of powerful shifters, but he's just as deadly and well trained as the rest of his brothers. With devious CIA agents, foreign forces gunning for what George possesses and George's power-hungry father, who is also Deputy Director of the FBI, Scott begins to wonder if he's bitten off more than he can chew. George always knew his father was dangerous and cruel. However, he never thought that those titles would inadequately sum up the lengths his father is willing to go to, to get what he wants. The only chance he has is using whatever is on file against his father. Staying alive to do that is another challenge. When he runs into the Shifter Protection Specialists, Inc. office, he's desperate, but isn't convinced anyone can protect him from his father. Risking more than he'd thought possible, he discovers that maybe he is more than he's always been taught to believe. One thing is for certain—his father is not going to give up easily. Guarding his Mark Beware the bite of a king. Khan is a king cobra shifter with a serious mistrust of anyone outside his brothers at SPSI—and he has good reason for it. As a teenager, he was subjected to the whims and experiments of a mad scientist. Since becoming part of a real family, he's thrived in his job as a close protection specialist. One night, he meets a pretty human who interests him on a level he hasn't experienced before, but old fears and revelations force him to put distance between them. Unable to stay away, however, Khan creates the persona of a courier to deliver the venom Casey needs and find out exactly what the human will do. Dr. Casey Jameson is working toward a deadline. He needs snake-shifter venom to continue his research and create a cure to save someone he loves. When he goes in search of a donor, he meets Khan, but he's confronted with the irresistible roughness of Khan and ends up taking the shifter home. However, when Khan finds out who and what he is, Khan leaves him high and dry. The appearance of Roan, a courier, in his




Security, ID Systems and Locks


Book Description

Written in clear and simple terms, Security, ID Systems and Locks provides the security professional with a complete understanding of all aspects of electronic access control. Each chapter includes important definitions, helpful study hints, highlighted review, and application questions. Security, ID Systems and Locks will teach you how to: Work with consultants Negotiate with dealers Select communications options Understand what computer professionals are saying Provide better security Throughout the book, the reader will find advice from security professionals, computer wizards, and seasoned trainers. Topics include a history of access control, modern ID technology, locks, barriers, sensors, computers, wiring, communications, and system design and integration. Joel Konicek has worked in almost every phase of the security industry. He is president and co-founder of Northern Computers, Inc., sits on the board of the Security Industry Association (SIA) and serves as SIA's Education Committee chairperson. He has lectured widely and conducted training seminars on sales and technical support issues. Karen Little, a technical writer and trainer, has been president of Clear Concepts since 1992. She provides research, writing, and illustrations for technical documentation, training manuals, Web sites, and interactive multimedia. Review questions and study tips make it easy to assess what you've learned Well-written and easy to understand, this is the most up-to-date book on electronic access control Coupons in the back of the book will save money on training programs in access control







Risk Management for Security Professionals


Book Description

This book describes the risk management methodology as a specific process, a theory, or a procedure for determining your assets, vulnerabilities, and threats and how security professionals can protect them. Risk Management for Security Professionals is a practical handbook for security managers who need to learn risk management skills. It goes beyond the physical security realm to encompass all risks to which a company may be exposed. Risk Management as presented in this book has several goals: Provides standardized common approach to risk management through a framework that effectively links security strategies and related costs to realistic threat assessment and risk levels Offers flexible yet structured framework that can be applied to the risk assessment and decision support process in support of your business or organization Increases awareness in terms of potential loss impacts, threats and vulnerabilities to organizational assets Ensures that various security recommendations are based on an integrated assessment of loss impacts, threats, vulnerabilities and resource constraints Risk management is essentially a process methodology that will provide a cost-benefit payback factor to senior management. Provides a stand-alone guide to the risk management process Helps security professionals learn the risk countermeasures and their pros and cons Addresses a systematic approach to logical decision-making about the allocation of scarce security resources




CCTV for Security Professionals


Book Description

CCTV for Security Professionals provides the information necessary to design the ideal CCTV system. The chapters are stand-alone sources of information on their subjects and are presented in logical sequence to guide the reader from basic principles to more complex for a complete system understanding. In his straight-forward and informative text, Alan Matchett approaches the camera systems from the user's point of view, providing the security manager with the knowledge to discuss the system, its desired features, and the areas of design concern within the context of an organization's business model. This can prove to be invaluable when evaluating an existing system, the use and components of a given system, or in evaluating a system design proposed by a vendor. Installers and service personnel will benefit from the functions and possibilities that are available with the various components and by gaining an understanding of their customers' needs. Newer technicians will learn how to set up the system properly, and can familiarize themselves with the technologies that go into a CCTV system. Security equipment sales personnel will also gain a better knowledge of the customer's needs as well as learn to determine exactly what questions they should be asking the customer and what the customer's responses mean. In this manner, the book will offer invaluable tips to ensure customers get exactly what they expect in a system. * Provides a detailed explanation of CCTV components and the technology behind analog and digital CCTV systems. * Establishes a "common language" for security professionals, CCTV system designers and sales personnel to use as a basis for system design. * Provides a clear explanation of the design process and design principles.




The Joint Task Team Box Set: Books 1 - 3


Book Description

As members of a black-ops unit, the men of the Joint Task Team are the best of the best when it comes to covert operations. Brought together to protect their country from enemies near and far, there’s only one thing these soldiers need to survive—the love of a strong woman. Tough, dangerous, and fiercely protective of the people they love, these males will melt your heart, along with your panties. Books one to three in the Joint Task Team Series are fast paced, full-length standalone novels with each couple earning a happily ever after you won’t want to miss!







Crimson Point Protectors Series: Box Set Volume II


Book Description

BOOKS 4-6 OF THE CRIMSON POINT PROTECTORS SERIES: UNSANCTIONED Two star-crossed lovers… …are about to face the maelstrom of war together. PROTECTIVE IMPULSE She’s a forbidden temptation. But giving into desire could cost them everything. FINAL SHOT Neither of them were looking for love. It finds them anyway.




The Corporate Security Professional's Handbook on Terrorism


Book Description

The Corporate Security Professional's Handbook on Terrorism is a professional reference that clarifies the difference between terrorism against corporations and their assets, versus terrorism against government assets. It addresses the existing misconceptions regarding how terrorism does or does not affect corporations, and provides security professionals and business executives with a better understanding of how terrorism may impact them. Consisting three sections, Section I provides an explanation of what terrorism is, its history, who engages in it, and why. Section II focuses on helping the security professional develop and implement an effective anti-terrorism program in order to better protect the employees and assets of the corporation. Section III discusses the future as it relates to the likelihood of having to deal with terrorism. The book provides the reader with a practitioner's guide, augmented by a historical assessment of terrorism and its impact to corporations, enabling them to immediately put in place useful security processes and methods to protect their corporate interests against potential acts of terror. This is guide is an essential tool for preparing security professionals and company executives to operate in an increasingly hostile global business environment.- Features case studies involving acts of terror perpetrated against corporate interests - Provides coverage of the growing business practice of outsourcing security- Remains practical and straightforward in offering strategies on physically securing premises, determining risk, protecting employees, and implementing emergency planning