Site Map - Book Reviews

Advanced Surveillance

- This title, Advanced Surveillance, is for private investigators and others whose primary focus is conducting surveillance. Author Peter Jenkins clearly knows his subject well and offers a broad range of information about the topic. While word usage and spelling are obviously British, the issues Jenkins raises, including the difficulties and frustrations of surveillance, are universal.

Hardening Windows Systems.

-   Does a week ever go by without a major Windows vulnerability coming to light? It is evident that, prior to Windows XP Service Pack 2, the operating system was geared to file and printer sharing, not security. Among security professionals, the common view is that the best way to secure Windows is to use a more secure operating system such as Linux.

Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001

- Author Steve Coll's reporting is exemplary. Information comes from a range of respected and noted intelligence officers who served in Afghanistan during the Soviet occupation or the rise of the Taliban. Coll details such topics as command of the Northern Alliance and the plan to target Tarnak Farm, where Osama bin Laden stayed with his family. Coll also paints a thorough picture of CIA and State Department achievements and setbacks in the region.

Identifying and Exploring Security Essentials

- An associate professor of criminal justice, Mary Clifford has written a lengthy text that would be especially useful to students pursuing a career in security management. Chapters conclude with discussion and review questions designed to help readers understand the terms and concepts presented. These exercises and the practice scenarios contained in the book are best when considered in a group or classroom setting with an opportunity for feedback.

The Terrorist Threat Mitigation Reference Guide

- Intended for anyone whose duties involve "protection, minimizing risk, hiring employees, security training, manufacturing security technology, integrating security solutions, and mitigating threats," the book gives itself little space, 56 pages, to accomplish all these objectives. Fifteen subject headings carve the text into bite-size offerings, while 66 subheads dice these further into morsels. The result is staccato, with the authors striving to introduce, define, and illustrate one or two concepts per page.

Advanced Interviewing Techniques: Proven Strategies for Law Enforcement, Military, and Security Personnel

- Proper interviewing skills are, of course, crucial to the success of law enforcement and security. Scores of books detail interviewing tactics, many of them providing in-depth explanations on how and why the techniques work. In Advanced Interviewing Techniques, the authors cull the approaches that work best. Drawing from dozens of sources, veteran FBI agents John R. Schafer and Joe Navarro compile the interviewing techniques that have proven effective, without miring the reader in theory and case studies.

Inside the Spam Cartel. By Spammer-X;

- From a technical perspective, the book shows how to determine where a spam e-mail originates and how to read e-mail headers to determine a message's path. Inside the Spam Cartel also explains various phishing scams and how they are propagated. Spam is an enormous irritant, but phishing is so nefarious that it has the potential to disrupt a large sector of the economy.

Spam Kings: The Real Story Behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@ )# Enlargements

- Spam is no longer a nuisance. It has developed into a huge problem for organizations that have to deal with the millions of e-mails that flood their mailboxes, often delivering scams or viruses.

Network Security Assessment.

- That's where Network Security Assessment comes in. This well-organized book presents the tools and techniques necessary to identify and assess risks in computer networks. A professional security tester who has successfully penetrated many networks, the author explains how to conduct a structured and logical network security assessment.

Terrorism: Strategies for Intervention

- Scholarly books are dry--it's almost inevitable. Luckily, this book, a compilation of articles on terrorism intervention strategies, is an exception. Though erudite, the book is captivating and easy to read, offering something for almost anyone with an interest in terrorism or in preparing for mitigation and emergency response. By placing problems, issues, and incidents in a highly relational situational context, it promotes reader understanding.

Business Under Fire: How Israeli Companies Are Succeeding in the Face of Terror--and What We Can Learn From Them.

- Information from interviews is presented as Q&A, then discussed. The author interviews an Israeli CEO, for example, then discusses the main points. A summary follows. The book proceeds like this through three sectors: hotel/tourism, high technology, and transportation.

The Disaster Recovery Handbook.

- Disaster planning need not be merely a necessary administrative burden. It can be a marketing tool. As the authors of The Disaster Recovery Handbook shrewdly observe, disaster preparedness and recovery is really a service for the client. Customers in effect enter into a partnership with their suppliers for their business essentials, so a disruption in supply can be catastrophic to a customer. Thus, disaster planning can be sold to customers as a pledge that the provider will keep their businesses going even in adverse situations.

Security Consulting, Third Edition

- Sennewald divides security consulting into three specialties: security management consulting (covering issues such as organizational change and policy development), forensic consulting (such as analyzing evidence for lawsuits), and security technical or engineering consulting (which includes recommending equipment or hardware). The book explicitly focuses on the first two--Sennewald admits to having no technical experience--but the lessons from the book could apply to all three.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.