INFORMATION

Site Map - Book Reviews

Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies

- The United States and other nations continually deploy new tactics and techniques to combat terrorists and disrupt their operations. The enemy, however, has responded to counterterrorism efforts with their own countermeasures and counter- countermeasures.

The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets

- How companies can strike a balance between protecting themselves against insider threats and respecting employees' privacy.

Principles and Practices of Business Continuity: Tools and Techniques

- Responding to threats to your organization by creating a comprehensive and well-functioning business continuity plan.

Fighting Fraud: How to Establish and Manage an Anti-Fraud Program

- Get the practical advice needed to develop a successful anti-fraud program.

Security Clearance Manual: How to Reduce the Time It Takes to Get Your Government Clearance

- Thinking of getting a government job that requires a security clearance? If so, this book is for you.

Capturing Jonathan Pollard: How One of the Most Notorious Spies in American History Was Brought to Justice

- The agent that secured the spy Jonathan Pollard's confession tells how he nabbed the man behind one of the greatest national security breaches in U.S. history.

The Art of War for Security Managers

- How does the ancient Chinese strategist's wisdom apply  to the job of the professional security manager today?

A Risk Management Approach to Business Continuity: Aligning Business Continuity with Corporate Governance

- A helpful text for security professionals in need of  guidance when creating and maintaining business continuity plans.

Gatekeeper: A Memoir of a CIA Polygraph Examiner

- The personal history of a CIA polygraph examiner during the height of the Cold War.

Privacy on the Line: The Politics of Wiretapping and Encryption

- This updated and expanded 2007 edition provides an incredibly comprehensive insight into the world of encryption and wiretaps, its political machinations, legal aspects, technologies, vulnerabilities, costs, limitations, and near-ubiquity.

National Security Issues in Science, Law, and Technology

- To properly weave together the topics of science, technology, and law under the rubric of national security is a tall order. This text does so perfectly.

Crisis Communications: A Casebook Approach, 3rd Edition

- There are few times in life when proper communication is more critical to an organization than during a crisis. Crisis Communications explains how crisis survival is possible through exhaustive planning, training, rehearsal, and hard work.

Disaster: Hurricane Katrina and the Failure of Homeland Security

- The authors explore the unusual division of responsibilities for maintaining New Orleans’ levees, finding that the approach contributed to the lack of adequate levee protection for the city.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.