01/30/2008 - In the post-9-11 world it is all the more important that security managers know exactly what threats exist from weapons of mass destruction and terrorism. This text is a credible reference that fills that need.
Book Reviews: Contingency Planning \ Disaster Management
12/18/2007 - Security professionals involved in disaster planning or response should recognize the name Thomas Drabek. For decades, he has been among the preeminent scholars in disaster management. With Drabek's upcoming retirement from the University of Denver, this may be the professor's last major publication, and it updates his thinking on how emergency managers operate.
12/18/2007 - The authors present a clear explanation of privacy--what it is, to what it may apply, and why it is important. The listing of resources and laws on specific privacy issues is helpful as well, including advocacy groups and organizations that can explain such laws as the USA Patriot Act.
12/18/2007 - The great strength of this work is the balance of its rigorous content and accessible presentation. Dividing the book into three parts allows readers to choose their level of detail. The first section provides easily understandable network principles and methodologies. A more detailed section, on hacking techniques and defenses, follows. At the most detailed level, readers can probe specialist areas such as wireless networks and Web application security.
12/18/2007 - The first 19 chapters (and 700 pages) discuss technologies such as firewalls and VPNs. While these are well-written, there is nothing here that hasn't been published before; all of the information is easily accessible via the Internet for free.
12/18/2007 - Need a brief but powerful tool for teaching employees the importance of information security? This high-quality, well-acted 17-minute video offers a glimpse into the world of information security.
12/18/2007 - Well-outlined and comprehensive, the book harnesses the expertise of knowledgeable security veterans. Various authors share their wisdom and experience on environmental and threat considerations, design concepts, protection technologies, and security practices.
12/18/2007 - Until just before publication, Computer Security Sourcebook and Communications Security Sourcebook constituted a single work, but they were broken into two books due to the sheer volume of material included. Both books are compilations of previously published material, much if not all of it available free online or in periodical archives at a university library.
12/18/2007 - A collection of 41 articles that provides a variety of opinions and points of view on an extremely broad and controversial topic, making the format an excellent fit for the subject matter.
12/18/2007 - Asset protection and management pose unique and ever-shifting challenges, but the foundation principles on which these fields are based remain the same. For those basic components of physical security controls, one need look no further than the third edition of this Lawrence Fennelly work. It's a compilation of informative essays written by security professionals expert in various topics.
12/18/2007 - Largely viewed as a remote risk as recently as a few years ago, chemical and biological attacks have now taken center stage in terrorism prevention and response planning. As with all threats that first enter the public consciousness, there's a lot of misunderstanding about these kinds of attacks. This guide will help. Fifty-one toxic agents are discussed, including signs and symptoms as well as possible treatments.