01/30/2008 - Before the Next Attack: Preserving Civil Liberties in an Age of Terrorism is a superlative work focusing on the danger that political reactions to terrorism may infringe on the rights and liberties that are the bedrock of freedom.
01/30/2008 - The tenth volume in one of McGraw Hill’s “Annual Editions” college text series is an ambitious anthology of articles covering the broad spectrum of international and domestic terrorism. The book’s 32 articles cover everything from international religious extremism and political violence to terrorist financing, along with a fascinating article on the moral logic behind suicide bombing.
01/30/2008 - Andrew Jaquith has provided IT security professionals with a comprehensive guide to capturing security metrics that will help them demonstrate return on investment to decision makers in the executive suite.
01/30/2008 - In the post-9-11 world it is all the more important that security managers know exactly what threats exist from weapons of mass destruction and terrorism. This text is a credible reference that fills that need.
Book Reviews: Contingency Planning \ Disaster Management
12/18/2007 - Security professionals involved in disaster planning or response should recognize the name Thomas Drabek. For decades, he has been among the preeminent scholars in disaster management. With Drabek's upcoming retirement from the University of Denver, this may be the professor's last major publication, and it updates his thinking on how emergency managers operate.
12/18/2007 - The authors present a clear explanation of privacy--what it is, to what it may apply, and why it is important. The listing of resources and laws on specific privacy issues is helpful as well, including advocacy groups and organizations that can explain such laws as the USA Patriot Act.
12/18/2007 - The great strength of this work is the balance of its rigorous content and accessible presentation. Dividing the book into three parts allows readers to choose their level of detail. The first section provides easily understandable network principles and methodologies. A more detailed section, on hacking techniques and defenses, follows. At the most detailed level, readers can probe specialist areas such as wireless networks and Web application security.
12/18/2007 - The first 19 chapters (and 700 pages) discuss technologies such as firewalls and VPNs. While these are well-written, there is nothing here that hasn't been published before; all of the information is easily accessible via the Internet for free.
12/18/2007 - Need a brief but powerful tool for teaching employees the importance of information security? This high-quality, well-acted 17-minute video offers a glimpse into the world of information security.
12/18/2007 - Well-outlined and comprehensive, the book harnesses the expertise of knowledgeable security veterans. Various authors share their wisdom and experience on environmental and threat considerations, design concepts, protection technologies, and security practices.
12/18/2007 - Until just before publication, Computer Security Sourcebook and Communications Security Sourcebook constituted a single work, but they were broken into two books due to the sheer volume of material included. Both books are compilations of previously published material, much if not all of it available free online or in periodical archives at a university library.
12/18/2007 - A collection of 41 articles that provides a variety of opinions and points of view on an extremely broad and controversial topic, making the format an excellent fit for the subject matter.