INFORMATION

Site Map - Book Reviews

Integrated Security Systems Design

- In recent months I had to read numerous books on security integration and convergence as background study for a series of work projects. All of them now collect dust on my office bookshelf, except one: Integrated Security Systems Design, which I now carry in my briefcase, its pages crammed with yellow sticky notes for quick reference.

Investigating Religious Terrorism and Ritualistic Crimes

- Perlmutter, director of the Institute for the Research of Organized and Ritual Violence, examines in detail groups and religions such as Odinism/Asatru (Germanic "heathenry"), the White Order of Thule (Aryan supremacism), and the Phineas Priesthood (a white-supremacist group, of sorts), depicting the violence their members have wrought.

Terrorism Today: The Past, the Players, the Future, Second Edition

- Like the first edition, this updated version explores various approaches to the study of terrorism and its impact on society. The authors make the point that terrorists have many faces--not just those of Osama bin Laden and his followers, but others such as the U.S. citizen who opens fire in an abortion clinic.

Software Forensics: Collecting Evidence from the Scene of a Digital Crime.

- Author Robert Slade mines solid detail, including listing specific software tools that can be used to identify and track virus creators, however unlikely corporate America might be to invest resources for such an effort. Slade discusses legal rules of evidence and emphasizes the importance of keeping evidence pristine so that its veracity is unshakable.

Global Drug Enforcement: Practical Investigative Techniques

- Drawing on 30 years of experience in law enforcement, Gregory Lee has written a definitive work on criminal drug investigations. Lee offers an objective look at the worldwide illegal-drug industry and describes various methods for conducting investigations, all the while taking care not to understate the dangers involved in undercover work. After all, as he notes, undercover agents have the highest fatality rate of all investigative positions

Modern Jihad: Tracing the Dollars Behind the Terror Networks

- Terrorists need money--and lots of it--to carry out their operations and to sustain themselves. With its intriguing title and an author who is an economist and a journalist, this book promised to offer revealing information on terrorist financial networks. Alas, such is not the case.

The Privatization of Police in America: An Analysis and Case Study

- An attorney and former police officer, the author is particularly strong on legal issues. He raises questions about the applicability of constitutional rights when private security personnel take action, an opportune inquiry at a time when the government looks to the private sector as a major homeland security resource.

Private Security and Public Safety: A Community-Based Approach

- This book examines the concept of private security companies providing community-oriented crime prevention on a contract basis. Borrowing heavily from the experience of security practitioners, it is rich in detail, well thought-out, and comprehensive--a close look at a bold new way to protect neighborhoods with a high risk of crime.

Understanding Terror Networks

- The book reflects a systematic and pragmatic approach based on Sageman's personal experiences and research. Blending his training as a forensic psychiatrist, his experience as a diplomat dealing with Afghani mujaheddin, and his proficiency with various social science methodologies, Sageman has put together an excellent snapshot of the dangers posed by contemporary Islamic terrorists that is a blend of network theory, modeling, empirical analysis, and historical review.

Introduction to Crime Analysis: Basic Resources for Criminal Justice Practice.

- Written by two police crime analysts, the book is replete with resources to assist in gathering evidence for analyzing crime. Moreover, the authors explain the "Ten Commandments" of crime analysis as a way to inculcate best practices in the reader. The first commandment, for example, is "Thy Task is Crime Analysis. Thou Shalt Have No Other Tasks Before It," and the sixth commandment is "Thou Shalt Know Thy Jurisdiction from One End Unto the Other."

Security Warrior

- Ensuing chapters go from the network layer to various software platforms, detailing the precise steps that an attacker will take to enter a network or software application. The vulnerabilities are clearly defined, but the book really shines when it provides detailed instructions on how systems can be protected.

Principles of Security Management

- Whoever titled this book Principles of Security Management may have been overly ambitious. With such a broad title, readers could reasonably expect coverage of such issues as leadership, security surveys, and budgeting. Instead, fully half of the book is devoted to personnel issues. That's fine in and of itself, but a more apt title for this work might have been Personnel Issues in Security Management.

Homeland Security Techniques and Technologies

- Homeland Security Techniques and Technologies also describes methodologies useful for detecting crime associated with terrorism. Data mining is the key technology in the battle against terrorism, Mena states, in that such analysis can help predict specific human behavior.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.