03/20/2012 - The Computer Security Handbook’s 77 comprehensive chapters, in two volumes, cover all 10 domains of the Common Body of Knowledge as defined by the International Information Systems Security Certification Consortium (ISC)2.
02/25/2012 - This book provides an in-depth explanation of the background investigation process and the considerations that must be made when assessing an applicant’s suitability for federal employment, access credentials, or a security clearance.
02/25/2012 - The book familiarizes readers with terms such as “silent slashes,” “evil clones,” and “jihad by proxy” as the authors describe the “seven swords of digital assassination” that damage entities’ reputations.
02/25/2012 - Books about these issues are equally plentiful, but none that I have seen addresses the issue in more detail or with greater insight than this work by Daniel Solove, a professor at George Washington University’s Law School.
01/20/2012 - Novices may find value in the thorough introduction to subjects such as the smart grid, hacking, and IT threats. It’s unlikely that the text would be a consistently helpful working reference, however, for those already engaged in smart grid security.
01/20/2012 - The chief contribution of this book to the body of literature on corporate espionage is a unique examination of individuals who straddle the public and private sectors in the practice of their tradecraft.
12/20/2011 - This book brings together the combined expertise of nearly 50 public sector emergency management and homeland security professionals and the experience of nearly 60 U.S. city and county governments.