INFORMATION

Site Map - Book Reviews

Encyclopedia of Security Management, Second Edition

- In today’s rapidly expanding and increasingly complex security environment, practitioners need all the help they can get. Because of that, there is an ever-increasing tendency to call outside consultants who specialize in specific fields for their advice and counsel.  This book will save security professionals both phone calls and consultant fees, placing the experts’ know-how within reach.

Biometric Technologies and Verification Systems

- Security professionals looking for texts on the cutting edge of technology often find few on the shelf. They will, however, benefit from this finely honed text by John R. Vacca.

Countering Terrorism and WMD: Creating a Global Counter-Terrorism Network

- Learn how informal international networks trump formal international ones in the battle against terrorism and WMDs.

Encyclopedia of World Terrorism: 1996-2002.

- This two-volume Encyclopedia of World Terrorism follows a 1996 effort by the same publisher. Appropriately enough, the work begins with an in-depth review of the 9-11 attacks, including studies of the victims, hijackers, first responders, and media. Two following chapters examine the tragedy's impact on the United States and the world, as well as the U.S. response and the impact on airport security, homeland security, the U.S. economy, and the intelligence community.

Inside the Security Mind: Making the Tough Decisions

- Developing a security mind, contends Day, involves moving from a focus on details to an overarching sensitivity to basic virtues and rules of security. Fundamental to the security mind are four security virtues and eight rules of IT security.

Buy, Lie, and Sell High: How Investors Lost Out on Enron and the Internet Bubble.

- Virtually everyone in the stock market in 2001 and 2002 was blindsided by the Internet bubble and various corporate frauds. How did it happen? Who is to blame? For insightful, authoritative answers, a good place to turn is to Harvard Business School Professor D. Quinn Mills's book .

The Security Handbook, Second Edition

- This book addresses the issue of providing professional training to security officers and supervisors who seek a career in security. A user-friendly text, it is filled with checklists covering topics such as how to improve job performance and prepare for a job interview.

Control and Security of E-Commerce

- Checklists, though mundane, are a key component of many jobs. They help ensure that key issues aren't overlooked, and they serve as guideposts for anyone auditing the work. This book provides technology managers with a very good preparatory set of details and checklists for their e-commerce infrastructure. The book can also show a corporate auditor what to look for to ensure that appropriate controls are in place.

High-Rise Security and Fire Life Safety, Second Edition.

- Highly acclaimed in its first edition, the update of Geoff Craighead's High-Rise Security and Fire Life Safety manages to outdo the original. The thoroughly referenced work picks up where the last edition left off, detailing advances in practices and technology as well as discussing the impact of the destruction of the Twin Towers. It's destined to be a bible to building security professionals, an in-depth overview for other security professionals, and an engaging read for laypersons.

Violence: A Contemporary Reader

- Violence exists in myriad forms, from school bullying, to workplace brutality, to large-scale terrorist attacks. In this volume, the editors have compiled articles that address violence from many angles, including its social implications and origins, as well as the patterns and psychology of various types of violent criminals. Detailed accounts of violent crimes are accompanied by statistical charts and graphs.

Understanding Water and Terrorism.

- The first half of the book provides a history and description of water systems and their vulnerabilities, primarily in the United States. But scarcely nine pages are devoted to terrorists themselves. In a section called "Who are the Terrorists?" less than a single page is devoted to answering that question. Subsequent pages outline terrorist groups only in a general sense.

Introduction to Emergency Management.

- Not so this book on emergency management, where the protagonists--disasters--take center stage. The authors load the book with bracing case studies and examples, which have infinitely more impact than generalizations and theories.

Beyond Competitive Intelligence: The Practice of Counterintelligence and Trade Secrets Protection.

- The preface to chapter four of this book describes that section as "a layman's introduction." That description can be applied to the entire work. Author Mark Robinson introduces competitive intelligence (CI) concepts to neophytes and peppers his book with charts, lists, and graphics that underscore his lessons. That's good as far as it goes, but it fails to provide the comprehensive study expected from a how-to book.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.