12/10/2007 - The preface to chapter four of this book describes that section as "a layman's introduction." That description can be applied to the entire work. Author Mark Robinson introduces competitive intelligence (CI) concepts to neophytes and peppers his book with charts, lists, and graphics that underscore his lessons. That's good as far as it goes, but it fails to provide the comprehensive study expected from a how-to book.
12/10/2007 - Security professionals sometimes forget just how little they knew when they began their careers and how valuable they found references that successfully covered the basics. This book, by a captain in the Dothan (Alabama) Police Department, is a good example of such a book.
12/05/2007 - Hacking for Dummies is written on the premise that to catch a hacker, you have to think and behave like one. This is a well-written and engrossing book that helps the reader understand how hackers compromise computer systems and networks. Its clear, easy-to-read style won't intimidate readers unfamiliar with abstruse security terms and concepts.
12/04/2007 - The report, Forensic Examination of Digital Evidence: A Guide for Law Enforcement, maps out the policies and procedures needed to conduct computer-related forensic investigations and describes the processes of evidence acquisition, assessment, and examination.
12/04/2007 - One is stored in what looks like an oversize locker key. Another sits inside a belt buckle. Others are concealed in brush handles, small crucifixes, and walking canes. These are among the ingenious knives and other weapons cataloged and exhibited by the FBI in a recently released guide to concealable weapons.
12/04/2007 - Cryptography is one of the most intimidating aspects of computer security, conjuring up, as it does, such concepts as hash functions and public-key infrastructures. For the average user who wants to know about cryptography without gaining the proficiency of a cryptographer, Cryptography for Dummies is the perfect introduction.
12/03/2007 - It is apparent that author Tony L. Jones--whose bio is nowhere to be found in the book, but who a Web search indicates is an Ohio police officer--has spent many hours researching the specialized field of courthouse security. The resulting work is a comprehensive manual of information culled from many U.S. sources. Information presented comes from a range of respected and noted court security advisors.
12/03/2007 - The Federal Deposit Insurance Corporation (FDIC) has offered assistance to financial institutions to protect against instant messaging (IM) troubles. The Guidance on Instant Messaging provides risk-management considerations such as how to implement antivirus checks on IM and how to configure firewalls to prevent IM traffic. It also includes technical notes that describe different IM types, and points out that even if users are not allowed to download software, "IM can still be accessed by sending messages directly from a Web browser" such as Internet Explorer. @ More on the FDIC's IM guidance is at SM Online.
11/29/2007 - Besides the effect that drug abuse can have on family, business, and friends, prescription fraud bilks Medicaid and insurance companies out of rightful payments. When doctors and pharmacists are duped, it taints their reputation and may expose them to legal or professional sanctions. A recent addition to the Problem-Specific Guide Series of the Justice Department's Office of Community Oriented Policing Services (COPS) explains the problem of prescription fraud and identifies tactics, offenders, and abused drugs. It also helps communities deal with their local prescription-fraud problem.
11/29/2007 - Many churches are still unaware of the risks they face, so while preachers and pastors deliver the spiritual message to churchgoers, Jeff Hanna is on the much more earthbound mission of raising security consciousness at churches. His firm, the GuideOne Center for Risk Management Church and School Division, which provides insurance for 50,000 churches across the United States, has declared October "Church Safety and Security Month." The company is making available security resources on its Web site.