Site Map - Book Reviews

Modern Jihad: Tracing the Dollars Behind the Terror Networks

- Terrorists need money--and lots of it--to carry out their operations and to sustain themselves. With its intriguing title and an author who is an economist and a journalist, this book promised to offer revealing information on terrorist financial networks. Alas, such is not the case.

The Privatization of Police in America: An Analysis and Case Study

- An attorney and former police officer, the author is particularly strong on legal issues. He raises questions about the applicability of constitutional rights when private security personnel take action, an opportune inquiry at a time when the government looks to the private sector as a major homeland security resource.

Private Security and Public Safety: A Community-Based Approach

- This book examines the concept of private security companies providing community-oriented crime prevention on a contract basis. Borrowing heavily from the experience of security practitioners, it is rich in detail, well thought-out, and comprehensive--a close look at a bold new way to protect neighborhoods with a high risk of crime.

Understanding Terror Networks

- The book reflects a systematic and pragmatic approach based on Sageman's personal experiences and research. Blending his training as a forensic psychiatrist, his experience as a diplomat dealing with Afghani mujaheddin, and his proficiency with various social science methodologies, Sageman has put together an excellent snapshot of the dangers posed by contemporary Islamic terrorists that is a blend of network theory, modeling, empirical analysis, and historical review.

Introduction to Crime Analysis: Basic Resources for Criminal Justice Practice.

- Written by two police crime analysts, the book is replete with resources to assist in gathering evidence for analyzing crime. Moreover, the authors explain the "Ten Commandments" of crime analysis as a way to inculcate best practices in the reader. The first commandment, for example, is "Thy Task is Crime Analysis. Thou Shalt Have No Other Tasks Before It," and the sixth commandment is "Thou Shalt Know Thy Jurisdiction from One End Unto the Other."

Security Warrior

- Ensuing chapters go from the network layer to various software platforms, detailing the precise steps that an attacker will take to enter a network or software application. The vulnerabilities are clearly defined, but the book really shines when it provides detailed instructions on how systems can be protected.

Principles of Security Management

- Whoever titled this book Principles of Security Management may have been overly ambitious. With such a broad title, readers could reasonably expect coverage of such issues as leadership, security surveys, and budgeting. Instead, fully half of the book is devoted to personnel issues. That's fine in and of itself, but a more apt title for this work might have been Personnel Issues in Security Management.

Homeland Security Techniques and Technologies

- Homeland Security Techniques and Technologies also describes methodologies useful for detecting crime associated with terrorism. Data mining is the key technology in the battle against terrorism, Mena states, in that such analysis can help predict specific human behavior.

Business Confronts Terrorism: Risks and Response

- Be forewarned: This book does not contain specific security advice. Don't be put off, however. Author Dean C. Alexander has written an effective high-level overview of how terrorist organizations have infiltrated modern society and turned society's apparatuses against the very people who helped develop them.

The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, Second Edition.

- In June 2004, the International Organization for Standardization (known as the ISO) granted certification in the area of information security for the Certified Information Systems Security Professional (CISSP) designation. With ISO certification, the CISSP is gaining in prominence, making The CISSP Prep Guide a timely and informative resource.

Smoking Guns and Paper Trails: How Your Words and Actions in the Workplace Backfire: What You Need to Know to Protect Yourself

- Along the book's 12 chapters, Tapper offers 126 "tips." They include ideas on protecting companies from internal fraud, external fraud, opposing attorneys, and disgruntled employees. One emphasis is on having a document-retention policy, which establishes a holding period for different kinds of information and requires the removal of outdated notes and related materials to eliminate paper trails.

The Terrorist Recognition Handbook.

- The book contains 18 chapters sectioned into four parts: Know the Terrorist, Identifying Cells, Detection of Activities, and Predicting Attacks. When the author discusses the detection of terrorist cells and activities, he is at his best. He explores surveillance, supply chains, cell integration and dis-integration, and various other pertinent topics, both from a high-level intel perspective and a street-level cop-on-the-beat viewpoint.

The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program.

-  Regardless of where you are in the security hierarchy, this is the definitive text for learning what it takes to be an effective information systems security officer (ISSO). The book paints an excellent portrait of an ISSO's duties, challenges, and working environments. It includes everything from how to handle new technologies and threats to how to perform information-security duties in a national-security environment.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.