Site Map - Book Reviews

Securing the Smart Grid: Next Generation Power Grid Security

- Novices may find value in the thorough introduction to subjects such as the smart grid, hacking, and IT threats. It’s unlikely that the text would be a consistently helpful working reference, however, for those already engaged in smart grid security.

Broker, Trader, Law­yer, Spy: The Secret World of Corporate Espionage

- The chief contribution of this book to the body of literature on corporate espionage is a unique examination of individuals who straddle the public and private sectors in the practice of their tradecraft.

Contemporary Security Management, Third Edition

- The book is highly recommended as a textbook and reference that will be useful for some time.

Homeland Security: Best Practices for Local Government, 2nd edition

- This book brings together the combined expertise of nearly 50 public sector emergency management and homeland security professionals and the experience of nearly 60 U.S. city and county governments.

Metasploit: The Penetration Tester’s Guide

- For those looking to use the Metasploit to its fullest, Metasploit: The Penetration Tester’s Guide is a valuable aid.

Securing the Cloud

- This book is much too detailed for the layman security professional or executive-level manager and is better suited to cloud infrastructure engineers.

Hacking Exposed: Wireless Security Secrets & Solutions

- A topical and timely work, appearing at a time in which “hacking” scandals have become a worldwide phenomenon, fully ablaze and out-of-control.

Fires . . . Accidental or Arson? Fire Investigations

- This book is a valuable asset for detectives or criminal investigators, who are tasked with collaborating with fire officials.

Escape the Wolf: Risk Mitigation; Personal Security Handbook for the Traveling Professional

- While Escape the Wolf is lengthy, it is well structured and easy to follow.

The Assessment Center Handbook for Police and Fire Personnel

- Charles D. Hale developed this handbook to give police and fire administrators a tool that they could use to determine employee readiness.

Effective Security Management

- This well-structured book can be used as a security professional’s template for setting up and organizing effective security operations in virtually any setting.

Internet Searches for Vetting, Investigations, and Open-Source Intelligence

- Edward J. Appel, CEO of iName­Check, has written a primer for today’s security professionals covering the ins and outs of Internet vetting, data mining, and intelligence gathering.

Managing Security Overseas: Protecting Employees and Assets in Volatile Regions

- The book is aimed at entry-level security personnel or those with little or no experience in the international arena of unstable or volatile countries.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.