INFORMATION

Site Map - Book Reviews

Federal Suitability and Security Clearances: Issue Mitigation Handbook

- This book provides an in-depth explanation of the background investigation process and the considerations that must be made when assessing an applicant’s suitability for federal employment, access credentials, or a security clearance.

Digital Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks

- The book familiarizes readers with terms such as “silent slashes,” “evil clones,” and “jihad by proxy” as the authors describe the “seven swords of digital assassination” that damage entities’ reputations.

Nothing to Hide: The False Tradeoff between Privacy and Security

- Books about these issues are equally plentiful, but none that I have seen addresses the issue in more detail or with greater insight than this work by Daniel Solove, a professor at George Washington University’s Law School.

Due Diligence for the Financial Professional

- This book, which covers an important issue, can help anyone responsible for fraud prevention and intellectual property protection.

Public Health Management of Disasters: The Practice Guide

- Healthcare professionals, emergency managers, and government officials will find in this work a comprehensive guide on how to prepare for and respond to disasters.

Natural Hazards, UnNatural Disasters: The Economics of Effective Prevention

- Despite the number of contributors, the book is exceptionally well-written with a substantial quantity of carefully researched information.

Security of Mobile Communications

- Security of Mobile Communications provides detailed information on many aspects of communications security and would be valuable even to nontechnical security managers.

Securing the Smart Grid: Next Generation Power Grid Security

- Novices may find value in the thorough introduction to subjects such as the smart grid, hacking, and IT threats. It’s unlikely that the text would be a consistently helpful working reference, however, for those already engaged in smart grid security.

Broker, Trader, Law­yer, Spy: The Secret World of Corporate Espionage

- The chief contribution of this book to the body of literature on corporate espionage is a unique examination of individuals who straddle the public and private sectors in the practice of their tradecraft.

Contemporary Security Management, Third Edition

- The book is highly recommended as a textbook and reference that will be useful for some time.

Homeland Security: Best Practices for Local Government, 2nd edition

- This book brings together the combined expertise of nearly 50 public sector emergency management and homeland security professionals and the experience of nearly 60 U.S. city and county governments.

Metasploit: The Penetration Tester’s Guide

- For those looking to use the Metasploit to its fullest, Metasploit: The Penetration Tester’s Guide is a valuable aid.

Securing the Cloud

- This book is much too detailed for the layman security professional or executive-level manager and is better suited to cloud infrastructure engineers.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.