Site Map - Book Reviews

Privacy on the Line: The Politics of Wiretapping and Encryption

- This updated and expanded 2007 edition provides an incredibly comprehensive insight into the world of encryption and wiretaps, its political machinations, legal aspects, technologies, vulnerabilities, costs, limitations, and near-ubiquity.

National Security Issues in Science, Law, and Technology

- To properly weave together the topics of science, technology, and law under the rubric of national security is a tall order. This text does so perfectly.

Crisis Communications: A Casebook Approach, 3rd Edition

- There are few times in life when proper communication is more critical to an organization than during a crisis. Crisis Communications explains how crisis survival is possible through exhaustive planning, training, rehearsal, and hard work.

Disaster: Hurricane Katrina and the Failure of Homeland Security

- The authors explore the unusual division of responsibilities for maintaining New Orleans’ levees, finding that the approach contributed to the lack of adequate levee protection for the city.

Before the Next Attack: Preserving Civil Liberties in an Age of Terrorism

- Before the Next Attack: Preserving Civil Liberties in an Age of Terrorism is a superlative work focusing on the danger that political reactions to terrorism may infringe on the rights and liberties that are the bedrock of freedom.

Violence and Terrorism, 07/08

- The tenth volume in one of McGraw Hill’s “Annual Editions” college text series is an ambitious anthology of articles covering the broad spectrum of international and domestic terrorism. The book’s 32 articles cover everything from international religious extremism and political violence to terrorist financing, along with a fascinating article on the moral logic behind suicide bombing.

Just the Facts: Investigative Report Writing, 3rd Edition

- If you are interested in a review of the law enforcement report writing process and how it relates to your policies and procedures as a security professional, this book is for you.

Security Metrics: Replacing Fear, Uncertainty, and Doubt

- Andrew Jaquith has provided IT security professionals with a comprehensive guide to capturing security metrics that will help them demonstrate return on investment to decision makers in the executive suite.

Weapons of Mass Destruction and Terrorism

- In the post-9-11 world it is all the more important that security managers know exactly what threats exist from weapons of mass destruction and terrorism. This text is a credible reference that fills that need.

Strategies for Coordinating Disaster Responses

- Security professionals involved in disaster planning or response should recognize the name Thomas Drabek. For decades, he has been among the preeminent scholars in disaster management. With Drabek's upcoming retirement from the University of Denver, this may be the professor's last major publication, and it updates his thinking on how emergency managers operate.

Privacy Handbook: Guidelines, Exposures, Policy Implementation and International Issues

- The authors present a clear explanation of privacy--what it is, to what it may apply, and why it is important. The listing of resources and laws on specific privacy issues is helpful as well, including advocacy groups and organizations that can explain such laws as the USA Patriot Act.

HackNotes Network Security Portable Reference

- The great strength of this work is the balance of its rigorous content and accessible presentation. Dividing the book into three parts allows readers to choose their level of detail. The first section provides easily understandable network principles and methodologies. A more detailed section, on hacking techniques and defenses, follows. At the most detailed level, readers can probe specialist areas such as wireless networks and Web application security.

Cybersecurity Operations Handbook.

- The first 19 chapters (and 700 pages) discuss technologies such as firewalls and VPNs. While these are well-written, there is nothing here that hasn't been published before; all of the information is easily accessible via the Internet for free.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.