INFORMATION

Site Map - Book Reviews

The Secret History of MI6: 1909-1949

- A piece of intelligence touted as a “smoking gun” turns out to be a forgery. Improper pressure is exerted on an intelligence analyst to reach the “right” conclusion. Exiles use sophisticated schemes to distribute bogus intelligence to further their own ends. This and more in The Secret History of MI6: 1909-1949 reviewer Mario Possamai, CPP says.

Crisis Communications: A Casebook Approach, Fourth Edition

- This book is an excellent resource for security practitioners who are responsible for the development of crisis and emergency management plans reviewer George J. Okaty, CPP says. ----------------------------------------------------------------------------------

Homeland Security: Legal and Policy Issues

- Joe D. Whitley and Lynne K. Zusman use experts to blend together the key legal and policy frameworks of homeland security into one cogent, concise single volume.

Security: An Introduction

- For a long time, the security profession has lacked a comprehensive text addressing the fundamentals of protecting people, assets, and organizations. Reviewer David Sayer says Security: An Introduction is that book.

The Sword and the Shield: Antiterrorism Planning for Corporations and NGOs

- A security expert describes his antiterrorism methodology for companies and nongovernment organizations, arising out of his work for the United Nations in the Middle East and Africa.

The Handbook for Campus Threat Assessment & Management Teams

- A well-written guidebook for schools interested in creating campus threat assessment and management teams to identify potentially violent individuals.

Seven Deadliest Microsoft Attacks

- Attention Microsoft users: Syngress lays out the seven deadliest attacks against the popular operating system.

Priceless: How I Went Undercover to Rescue the World's Stolen Treasures

- A former FBI special agent gives the ultimate insider look at the $6-billion-a-year art theft business.

Violence and Security on Campus: From Preschool Through College

- Violence and Security on Campus is a comprehensive blueprint that stakeholders can use to plan for and deter acts of school violence.

Global Terrorism and New Media: The Post-Al Qaeda Generation

- Authors Philip Seib and Dana Janbek provide an excellent overview of how terrorists use the new media to spread their message.

Police Assessment Testing, Fourth Edition

- Major John L. Coleman helps police officers prepare for assessment center evaluations.

Securing the State

- Sir David Omand questions whether Western democracies can develop a mature consensus on what is reasonable, prudent, and sustainable regarding our intelligence institutions.  

Wild West 2.0: How to Protect and Restore Your Online Reputation on the Untamed Social Frontier

- Michael Fertik and David Thompson argue the Internet needs a modern-day Wyatt Earp to protect the innocent from the falsehoods and innuendoes that ruin businesses and lives.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.