Site Map - Book Reviews

Counterfeiting Exposed: Protecting Your Brand and Customers.

- Targeted to owners of intellectual property, including brands, trademarks, patents, and copyrights, the book explains what they can do to protect themselves from counterfeiters. The advice includes something for just about everyone.

The Retail Manager's Guide to Crime and Loss Prevention

-  Retail loss prevention measures are equally important to mom-and-pop stores and major retail chains, but smaller operations may lack the resources to hire a full-time security professional. Here, author Liz Martinez focuses on smaller and less sophisticated retailers that have little or no corporate loss prevention support.

Hacking for Dummies.

- Hacking for Dummies is written on the premise that to catch a hacker, you have to think and behave like one. This is a well-written and engrossing book that helps the reader understand how hackers compromise computer systems and networks. Its clear, easy-to-read style won't intimidate readers unfamiliar with abstruse security terms and concepts.

IT Security: Risking the Corporation.

- This is not a how-to book. Forget about details on securing networks from hackers and insider threats. The book's purpose is to drive home the point that leaving critical data on an unsecured network is tantamount to leaving the doors to the company's headquarters unlocked during a long weekend. Readers learn from real-life examples of how information is at risk on a network and how to start the process of securing it.

Bullying, Peer Harassment, and Victimization in the Schools: The Next Generation of Prevention.

- This book provides extensive documented detail on who is bullied and how it occurs. The editors validate the perception that bullying is most likely to happen to students making the transition from elementary to middle school and from middle school to high school. They also dispel the perception that the bully is a social misfit; he or she is typically popular. Also explored is how bullying varies by gender, race, and ethnic background. Such detail, as well as an abundance of source material, makes this book very interesting reading.

Them and Us: Cult Thinking and the Terrorist Threat.

-  Inspired by such events as the mass suicide in Guyana by members of the People's Temple, Arthur J. Deikman wrote The Wrong Way Home in 1990. In that book, Deikman offered a persuasive look at the nature, dynamics, and impact of cult behavior. In Them and Us, an expansion of that book, Deikman tries to link cult behavior and thinking to the behavior and thinking of terrorists. When the book sticks strictly to cults, it succeeds. It bogs down, though, when it tries to apply cult behavior to all of society and to terrorists in particular.

Cryptography for Dummies

- Cryptography is one of the most intimidating aspects of computer security, conjuring up, as it does, such concepts as hash functions and public-key infrastructures. For the average user who wants to know about cryptography without gaining the proficiency of a cryptographer, Cryptography for Dummies is the perfect introduction.

The Psychology and Law of Workplace Violence: A Handbook for Mental Health Professionals and Employers.

- Security professionals involved in preventing workplace violence will find The Psychology and Law of  Workplace Violence to be an excellent reference. Although the book is long, the information is useful and is presented in an easy writing style.


- The book is heavily weighted toward town center CCTV usage, and while chapter nine reveals the impact of monitored CCTV in a retail environment and highlights the need to train those monitoring the system, there is a noticeable absence of contributions from private sector security practitioners. With CCTV so ubiquitous, it would have been useful to record the experiences, views, and research of security professionals working with video.

Court Security: A Guide for Post 9-11 Environments.

-  It is apparent that author Tony L. Jones--whose bio is nowhere to be found in the book, but who a Web search indicates is an Ohio police officer--has spent many hours researching the specialized field of courthouse security. The resulting work is a comprehensive manual of information culled from many U.S. sources. Information presented comes from a range of respected and noted court security advisors.

Changing the Guard: Private Prisons and the Control of Crime

- Changing the Guard is an examination of prison privatization in the United States and several other nations. It is a story told through four essays by writers with academic backgrounds in law, sociology, economics, and criminology. Breaking the argument into four separate contributions adds strength through diversity of opinion, but it also creates redundancy--the writers often repeat each other's material.

Using the Common Criteria for IT Security Evaluation

- How trustworthy is a computer system? The answer depends on what the system's owner wants in terms of security performance. Usually in a business, governmental, or academic setting, the owner wants the system to enforce certain access rules to restrict users from reading, writing to, or executing certain data elements. How well a system enforces various access controls determines its trustworthiness.

The New Forensics: Investigating Corporate Fraud and the Theft of Intellectual Property

- One fascinating chapter explores the disposition of a bank account dormant since the Holocaust and how forensic investigators cracked the case 60 years after the fact. It describes how a large group of investigators went to Switzerland to determine the beneficiaries of dormant World War II-era Swiss bank accounts. The chapter details methodology used to retrieve documents and to discover what was hidden and who was entitled to it.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.