INFORMATION

Site Map - Book Reviews

Violence: A Contemporary Reader

- Violence exists in myriad forms, from school bullying, to workplace brutality, to large-scale terrorist attacks. In this volume, the editors have compiled articles that address violence from many angles, including its social implications and origins, as well as the patterns and psychology of various types of violent criminals. Detailed accounts of violent crimes are accompanied by statistical charts and graphs.

Understanding Water and Terrorism.

- The first half of the book provides a history and description of water systems and their vulnerabilities, primarily in the United States. But scarcely nine pages are devoted to terrorists themselves. In a section called "Who are the Terrorists?" less than a single page is devoted to answering that question. Subsequent pages outline terrorist groups only in a general sense.

Introduction to Emergency Management.

- Not so this book on emergency management, where the protagonists--disasters--take center stage. The authors load the book with bracing case studies and examples, which have infinitely more impact than generalizations and theories.

Beyond Competitive Intelligence: The Practice of Counterintelligence and Trade Secrets Protection.

- The preface to chapter four of this book describes that section as "a layman's introduction." That description can be applied to the entire work. Author Mark Robinson introduces competitive intelligence (CI) concepts to neophytes and peppers his book with charts, lists, and graphics that underscore his lessons. That's good as far as it goes, but it fails to provide the comprehensive study expected from a how-to book.

Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis, and Investigations.

-  Like any perceived phenomenon or rapid growth area, global terrorism has inspired many authors to venture into the security and intelligence fields. That's not surprising given that there is an avid audience, not least in the security profession itself, keen to grasp the essential knowledge and skills needed to manage the current and emerging terrorist threat.

Security Risk Assessment and Control

- The book had its genesis in an assignment to conduct a risk assessment on an (unnamed) international telecommunications company. The authors try to bring the reader into the process, but gaps interrupt a smooth narrative flow. One suspects overly aggressive editing, the result being that the book is neither easy nor enjoyable to read.

A Law Enforcement and Security Officers' Guide to Responding to Bomb Threats:

-  Security professionals sometimes forget just how little they knew when they began their careers and how valuable they found references that successfully covered the basics. This book, by a captain in the Dothan (Alabama) Police Department, is a good example of such a book.

Black Ice: The Invisible Threat of Cyber-Terrorism

-  Cyberterrorism is not just about cyberattacks. It also includes physical attacks against critical infrastructures. Yet few people outside of those with national security backgrounds, such as former presidential advisers Richard Clarke and Howard Schmidt, think about the problem in those terms. Author Dan Verton insists that as we think about cyberattacks, the focus should be on the terrorists' intended goals and impacts, not simply the mode of the attack, be it physical or electronic.

Managing A Network Vulnerability Assessment.

- With the evolution of IT technology, security managers are faced with the ever-evolving, intimidating responsibility to protect the organization's computer and network infrastructure. That's the impetus behind this book.

Counterfeiting Exposed: Protecting Your Brand and Customers.

- Targeted to owners of intellectual property, including brands, trademarks, patents, and copyrights, the book explains what they can do to protect themselves from counterfeiters. The advice includes something for just about everyone.

The Retail Manager's Guide to Crime and Loss Prevention

-  Retail loss prevention measures are equally important to mom-and-pop stores and major retail chains, but smaller operations may lack the resources to hire a full-time security professional. Here, author Liz Martinez focuses on smaller and less sophisticated retailers that have little or no corporate loss prevention support.

Hacking for Dummies.

- Hacking for Dummies is written on the premise that to catch a hacker, you have to think and behave like one. This is a well-written and engrossing book that helps the reader understand how hackers compromise computer systems and networks. Its clear, easy-to-read style won't intimidate readers unfamiliar with abstruse security terms and concepts.

IT Security: Risking the Corporation.

- This is not a how-to book. Forget about details on securing networks from hackers and insider threats. The book's purpose is to drive home the point that leaving critical data on an unsecured network is tantamount to leaving the doors to the company's headquarters unlocked during a long weekend. Readers learn from real-life examples of how information is at risk on a network and how to start the process of securing it.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.