INFORMATION

Site Map - Book Reviews

Global Terrorism and New Media: The Post-Al Qaeda Generation

- Authors Philip Seib and Dana Janbek provide an excellent overview of how terrorists use the new media to spread their message.

Police Assessment Testing, Fourth Edition

- Major John L. Coleman helps police officers prepare for assessment center evaluations.

Securing the State

- Sir David Omand questions whether Western democracies can develop a mature consensus on what is reasonable, prudent, and sustainable regarding our intelligence institutions.  

Wild West 2.0: How to Protect and Restore Your Online Reputation on the Untamed Social Frontier

- Michael Fertik and David Thompson argue the Internet needs a modern-day Wyatt Earp to protect the innocent from the falsehoods and innuendoes that ruin businesses and lives.

Underground Economies and Illegal Imports: Business and Legal Strategies to Address Illegitimate Commerce

- Underground Economies and Illegal Imports provides a window into the highly complex "gray" markets exploited by white-collar criminals.

The Professional Protection Officer: Practical Security Strategies and Emerging Threats

- A new, improved, and expanded version of the International Foundation for Protection Officers' 1986 original.

Workplace Violence

- One of the foremost experts in the field puts together a comprehensive and functional manual to avoid an employee "going postal."

Police Chief 101: Practical Advice for the Law Enforcement Leader

- Ignore the title, this book is a true primer on leadership and executive career survival skills.

Flawless: Inside the Largest Diamond Heist in History

- This is the story of the largest and most audacious diamond thefts in history.

The Illusion of Due Diligence: Notes from the CISO Underground

- The Illusion of Due Diligence isn't a security textbook, it's CISO war stories from inside the corporate belly.

Hacking the Human: Social Engineering Techniques and Security Countermeasures

- Hacking the Human argues persuasively that human security is the missing link between IT security and physical security.

Introduction to Security: Operations and Management, Third Edition

- This introductory text covers material ranging from the history of private security to contemporary principles and practices--sometimes, too quickly.

Quick and Easy Business Continuity Plan for Your Small Business

- This software program is an inexpensive, simple means to ensure that any company has a basic plan in place to deal with emergency situations.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.