Site Map - Book Reviews

The Illusion of Due Diligence: Notes from the CISO Underground

- The Illusion of Due Diligence isn't a security textbook, it's CISO war stories from inside the corporate belly.

Hacking the Human: Social Engineering Techniques and Security Countermeasures

- Hacking the Human argues persuasively that human security is the missing link between IT security and physical security.

Introduction to Security: Operations and Management, Third Edition

- This introductory text covers material ranging from the history of private security to contemporary principles and practices--sometimes, too quickly.

Quick and Easy Business Continuity Plan for Your Small Business

- This software program is an inexpensive, simple means to ensure that any company has a basic plan in place to deal with emergency situations.

Urbanization, Policing, and Security: Global Perspectives

- Urbanization, Policing, and Security is an intensely academic and wide-ranging compilation of essays on crime and policing across the world.

Vein Pattern Recognition: A Privacy-Enhancing Biometric

- Vein Pattern Recognition gives readers a comprehensive overview of a non-intrusive, hard-to-forge biometric.

Defend the Realm: The Authorized History of MI5

- Scholar Christopher Andrews writes an engaging, warts-and-all history of MI5, Britain's domestic intelligence service.

RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations

- Sixty-four well-known information technology experts from around the world make RFID and Sensor Networks a concise but comprehensive volume.

Information Warfare

- Information Warfare is a poorly written text that has no practical value for guiding information operations today.

Safeguarding Homeland Security: Governors and Mayors Speak Out.

- In this multiauthor text, leading government stakeholders share the strategies that have bolstered their states and cities' emergency preparedness.

Peddling Peril: How the Secret Nuclear Trade Arms America’s Enemies

- The true story of how greed and weak export controls allowed Pakistani A.Q. Khan to steal and proliferate nuclear technology to rogue states.

Border Security in the Al-Qaeda Era

- Experts weigh in on border security in the age of al Qaeda in this well written, citation-heavy text.

Hospital and Healthcare Security, Fifth Edition

- The fifth edition of a classic text,  with updates and revisions based on the changing landscape of hospital and healthcare security.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.