INFORMATION

Site Map - Book Reviews

Business Confronts Terrorism: Risks and Response

- Be forewarned: This book does not contain specific security advice. Don't be put off, however. Author Dean C. Alexander has written an effective high-level overview of how terrorist organizations have infiltrated modern society and turned society's apparatuses against the very people who helped develop them.

The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, Second Edition.

- In June 2004, the International Organization for Standardization (known as the ISO) granted certification in the area of information security for the Certified Information Systems Security Professional (CISSP) designation. With ISO certification, the CISSP is gaining in prominence, making The CISSP Prep Guide a timely and informative resource.

Smoking Guns and Paper Trails: How Your Words and Actions in the Workplace Backfire: What You Need to Know to Protect Yourself

- Along the book's 12 chapters, Tapper offers 126 "tips." They include ideas on protecting companies from internal fraud, external fraud, opposing attorneys, and disgruntled employees. One emphasis is on having a document-retention policy, which establishes a holding period for different kinds of information and requires the removal of outdated notes and related materials to eliminate paper trails.

The Terrorist Recognition Handbook.

- The book contains 18 chapters sectioned into four parts: Know the Terrorist, Identifying Cells, Detection of Activities, and Predicting Attacks. When the author discusses the detection of terrorist cells and activities, he is at his best. He explores surveillance, supply chains, cell integration and dis-integration, and various other pertinent topics, both from a high-level intel perspective and a street-level cop-on-the-beat viewpoint.

The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program.

-  Regardless of where you are in the security hierarchy, this is the definitive text for learning what it takes to be an effective information systems security officer (ISSO). The book paints an excellent portrait of an ISSO's duties, challenges, and working environments. It includes everything from how to handle new technologies and threats to how to perform information-security duties in a national-security environment.

Advanced Surveillance

- This title, Advanced Surveillance, is for private investigators and others whose primary focus is conducting surveillance. Author Peter Jenkins clearly knows his subject well and offers a broad range of information about the topic. While word usage and spelling are obviously British, the issues Jenkins raises, including the difficulties and frustrations of surveillance, are universal.

Hardening Windows Systems.

-   Does a week ever go by without a major Windows vulnerability coming to light? It is evident that, prior to Windows XP Service Pack 2, the operating system was geared to file and printer sharing, not security. Among security professionals, the common view is that the best way to secure Windows is to use a more secure operating system such as Linux.

Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001

- Author Steve Coll's reporting is exemplary. Information comes from a range of respected and noted intelligence officers who served in Afghanistan during the Soviet occupation or the rise of the Taliban. Coll details such topics as command of the Northern Alliance and the plan to target Tarnak Farm, where Osama bin Laden stayed with his family. Coll also paints a thorough picture of CIA and State Department achievements and setbacks in the region.

Identifying and Exploring Security Essentials

- An associate professor of criminal justice, Mary Clifford has written a lengthy text that would be especially useful to students pursuing a career in security management. Chapters conclude with discussion and review questions designed to help readers understand the terms and concepts presented. These exercises and the practice scenarios contained in the book are best when considered in a group or classroom setting with an opportunity for feedback.

The Terrorist Threat Mitigation Reference Guide

- Intended for anyone whose duties involve "protection, minimizing risk, hiring employees, security training, manufacturing security technology, integrating security solutions, and mitigating threats," the book gives itself little space, 56 pages, to accomplish all these objectives. Fifteen subject headings carve the text into bite-size offerings, while 66 subheads dice these further into morsels. The result is staccato, with the authors striving to introduce, define, and illustrate one or two concepts per page.

Advanced Interviewing Techniques: Proven Strategies for Law Enforcement, Military, and Security Personnel

- Proper interviewing skills are, of course, crucial to the success of law enforcement and security. Scores of books detail interviewing tactics, many of them providing in-depth explanations on how and why the techniques work. In Advanced Interviewing Techniques, the authors cull the approaches that work best. Drawing from dozens of sources, veteran FBI agents John R. Schafer and Joe Navarro compile the interviewing techniques that have proven effective, without miring the reader in theory and case studies.

Inside the Spam Cartel. By Spammer-X;

- From a technical perspective, the book shows how to determine where a spam e-mail originates and how to read e-mail headers to determine a message's path. Inside the Spam Cartel also explains various phishing scams and how they are propagated. Spam is an enormous irritant, but phishing is so nefarious that it has the potential to disrupt a large sector of the economy.

Spam Kings: The Real Story Behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@ )# Enlargements

- Spam is no longer a nuisance. It has developed into a huge problem for organizations that have to deal with the millions of e-mails that flood their mailboxes, often delivering scams or viruses.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.