INFORMATION

Site Map - Book Reviews

Zen and the Art of Information Security

- One might assume by the title that  Zen and the Art of Information Security is another cheesy motivational book. Nothing could be further from the truth.

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

- Two information security experts sound the "everything over IP" wake-up call.

Terror: How Israel Has Coped and What America Can Learn

- What can the United States learn from Israeli counterterrorism policies?

The Sentinel CEO: Perspectives on Security, Risk, and Leadership in a Post-9/11 World

- Risk-based, integrated security is a prerequisite for growth, argues a former CEO.

Business Background Investigations: Tools and Techniques for Solution Driven Due Diligence

- A quality resource for background investigators who find it difficult to navigate through the myriad sources of information.

Security Convergence: Managing Enterprise Security Risk

- The text is an eye-opener for security professionals unfamiliar with the parallels between the dual disciplines of physical and logical security.

Document Security: Protecting Physical and Electronic Content

- Document security has evolved with technology, but the most critical element is still the human one.

Security Design Consulting

- Find the basics of security design consulting in this book.

Police Analysis and Planning for Homicide Bombings, 2nd Edition

- Using the more accurate concept, homicide bombing, this work is a superior foundation for security professionals who seek to prevent, or prepare to respond to, terrorist bombings.

Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies

- The United States and other nations continually deploy new tactics and techniques to combat terrorists and disrupt their operations. The enemy, however, has responded to counterterrorism efforts with their own countermeasures and counter- countermeasures.

The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets

- How companies can strike a balance between protecting themselves against insider threats and respecting employees' privacy.

Principles and Practices of Business Continuity: Tools and Techniques

- Responding to threats to your organization by creating a comprehensive and well-functioning business continuity plan.

Fighting Fraud: How to Establish and Manage an Anti-Fraud Program

- Get the practical advice needed to develop a successful anti-fraud program.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.