03/20/2012 - The authors first note that preventing workplace and school-based violence starts with the understanding that no one can predict violence; rather, the goal is to assess dangerousness based on observations and reports of a person’s behavior.
Book Reviews: Contingency Planning \ Disaster Management
03/20/2012 - Blurring Military and Police Roles is a fascinating collection of scholarly essays on this subject from both the police and military points of view, as well as from historical, organizational, and operational perspectives.
03/20/2012 - The Computer Security Handbook’s 77 comprehensive chapters, in two volumes, cover all 10 domains of the Common Body of Knowledge as defined by the International Information Systems Security Certification Consortium (ISC)2.
02/25/2012 - This book provides an in-depth explanation of the background investigation process and the considerations that must be made when assessing an applicant’s suitability for federal employment, access credentials, or a security clearance.
02/25/2012 - The book familiarizes readers with terms such as “silent slashes,” “evil clones,” and “jihad by proxy” as the authors describe the “seven swords of digital assassination” that damage entities’ reputations.
02/25/2012 - Books about these issues are equally plentiful, but none that I have seen addresses the issue in more detail or with greater insight than this work by Daniel Solove, a professor at George Washington University’s Law School.