INFORMATION

Site Map - Book Reviews

Stolen Access: Keeping Information Secure.

- Need a brief but powerful tool for teaching employees the importance of information security? This high-quality, well-acted 17-minute video offers a glimpse into the world of information security.

Security Planning and Design: A Guide for Architects and Building Design Professionals.

- Well-outlined and comprehensive, the book harnesses the expertise of knowledgeable security veterans. Various authors share their wisdom and experience on environmental and threat considerations, design concepts, protection technologies, and security practices.

Computer Security Sourcebook and Communications Security Sourcebook

- Until just before publication, Computer Security Sourcebook and Communications Security Sourcebook constituted a single work, but they were broken into two books due to the sheer volume of material included. Both books are compilations of previously published material, much if not all of it available free online or in periodical archives at a university library.

Homeland Security, 2nd Edition

- A collection of 41 articles that provides a variety of opinions and points of view on an extremely broad and controversial topic, making the format an excellent fit for the subject matter.

Effective Physical Security, Third Edition

- Asset protection and management pose unique and ever-shifting challenges, but the foundation principles on which these fields are based remain the same. For those basic components of physical security controls, one need look no further than the third edition of this Lawrence Fennelly work. It's a compilation of informative essays written by security professionals expert in various topics.

Closed Circuit Television, Third Edition

- Want a good overview of CCTV systems, their history and their evolution? Then this book is for you.

PDR Guide to Biological and Chemical Warfare Response

- Largely viewed as a remote risk as recently as a few years ago, chemical and biological attacks have now taken center stage in terrorism prevention and response planning. As with all threats that first enter the public consciousness, there's a lot of misunderstanding about these kinds of attacks. This guide will help. Fifty-one toxic agents are discussed, including signs and symptoms as well as possible treatments.

Terrorism and Counterterrorism: Understanding the New Security Environment, Readings, and Interpretations

- No matter what view you take on the West's current approach to countering terrorism, you will be challenged by this text.

Encyclopedia of Security Management, Second Edition

- In today’s rapidly expanding and increasingly complex security environment, practitioners need all the help they can get. Because of that, there is an ever-increasing tendency to call outside consultants who specialize in specific fields for their advice and counsel.  This book will save security professionals both phone calls and consultant fees, placing the experts’ know-how within reach.

Biometric Technologies and Verification Systems

- Security professionals looking for texts on the cutting edge of technology often find few on the shelf. They will, however, benefit from this finely honed text by John R. Vacca.

Countering Terrorism and WMD: Creating a Global Counter-Terrorism Network

- Learn how informal international networks trump formal international ones in the battle against terrorism and WMDs.

Encyclopedia of World Terrorism: 1996-2002.

- This two-volume Encyclopedia of World Terrorism follows a 1996 effort by the same publisher. Appropriately enough, the work begins with an in-depth review of the 9-11 attacks, including studies of the victims, hijackers, first responders, and media. Two following chapters examine the tragedy's impact on the United States and the world, as well as the U.S. response and the impact on airport security, homeland security, the U.S. economy, and the intelligence community.

Inside the Security Mind: Making the Tough Decisions

- Developing a security mind, contends Day, involves moving from a focus on details to an overarching sensitivity to basic virtues and rules of security. Fundamental to the security mind are four security virtues and eight rules of IT security.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.