Site Map - Book Reviews

Metasploit: The Penetration Tester’s Guide

- For those looking to use the Metasploit to its fullest, Metasploit: The Penetration Tester’s Guide is a valuable aid.

Securing the Cloud

- This book is much too detailed for the layman security professional or executive-level manager and is better suited to cloud infrastructure engineers.

Hacking Exposed: Wireless Security Secrets & Solutions

- A topical and timely work, appearing at a time in which “hacking” scandals have become a worldwide phenomenon, fully ablaze and out-of-control.

Fires . . . Accidental or Arson? Fire Investigations

- This book is a valuable asset for detectives or criminal investigators, who are tasked with collaborating with fire officials.

Escape the Wolf: Risk Mitigation; Personal Security Handbook for the Traveling Professional

- While Escape the Wolf is lengthy, it is well structured and easy to follow.

The Assessment Center Handbook for Police and Fire Personnel

- Charles D. Hale developed this handbook to give police and fire administrators a tool that they could use to determine employee readiness.

Effective Security Management

- This well-structured book can be used as a security professional’s template for setting up and organizing effective security operations in virtually any setting.

Internet Searches for Vetting, Investigations, and Open-Source Intelligence

- Edward J. Appel, CEO of iName­Check, has written a primer for today’s security professionals covering the ins and outs of Internet vetting, data mining, and intelligence gathering.

Managing Security Overseas: Protecting Employees and Assets in Volatile Regions

- The book is aimed at entry-level security personnel or those with little or no experience in the international arena of unstable or volatile countries.

Cross-Training for First Responders

- In his book, Gregory Bennett brings the reader through real life situations faced by first responders and, in doing so, highlights where the re­spond­ers’ training may be inadequate.

Preventing Crowd Violence

- While the book is written from a law enforcement perspective and for a police readership, the information certainly applies to private security professionals who must manage large crowd events in stadiums, malls, concerts, and protests that may be aimed at their companies or on the streets surrounding their facilities.

Police Chief: How to Attain and Succeed in this Critical Position

- Can a book about obtaining the position of police chief and then successfully performing as one be of professional interest to security professionals? In this instance, the answer is a qualified yes.

Vulnerability Management

- Overall, this book provides excellent guidance for the information security practitioner and the network security engineer, as well as those who need an understanding of the strategic significance of vulnerabilities and reasons for their control.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.