Site Map - Book Reviews

Loss Prevention Threats and Strategies: How People Steal from Your Business and What You Can Do to Stop It.

- Loss Prevention Threats and Strategies provides one good alternative for nonexperts. It encourages owners and managers to take responsibility for prevention and training, and it furnishes the necessary tools that managers will need to develop an effective security strategy.

Sleuthing 101: Background Checks and the Law

- Databases have assumed a large role in background checks, but Nadell cautions readers about depending on databases when they conduct any criminal history searches. The larger the database, the more potential for inaccurate information. The state criminal repositories, if available, are frequently out of date, at times by months. Information obtained from a database should be verified through direct contact with the courts, Nadell advises.

Pickett’s Primer on Explosives.

- Mike Pickett, a veteran firefighter and educator, has produced a primer on explosives, including four videos and a short manual entitled Explosives Identification Guide, Second Edition. The first three videos deal with, respectively, commercial explosives, military ordnance, and bomb threats and searches. The fourth video provides basic information on weapons of mass destruction (WMDs). The accompanying guide complements this material.

Security Management: An Introduction. Second Edition.

- It’s a pleasant surprise, then, that this introductory book is tight and on point—an efficient use of reading time. Intended to assist in preparation for the CPP exam, the book introduces learning objectives at the beginning of each chapter, followed by well-explained concepts and concise examples. Each chapter ends with a useful list of key terms and extremely beneficial discussion questions and exercises.

Information Security Policies and Procedures: A Practitioner’s Reference. Second Edition

- Part one covers infosec policies and procedures, and part two is an information security reference guide. The journey through both is pleasant, but familiar, somewhat like an afternoon stroll through well-trod terrain. Neither part contains any revelations, but each is well constructed and brims with relevant information that is easy to find.

Disaster and Recovery Planning: A Guide for Facility Managers.

- Specific disasters including fires, bomb threats, and earthquakes receive individual attention. Probably to illustrate the extent and magnitude of disasters, Gustin includes lists of disaster and emergency declarations made in 2002 and 2003 that run for pages, from flooding in Arkansas to typhoons in the Federated States of Micronesia. The author’s good intentions aside, the lists don’t merit that much space.

Essentials of the Reid Technique: Criminal Interrogation and Confessions

- Many experts consider the Reid Technique to be the leading method on interviewing and interrogation and Criminal Interrogation and Confessions to be the seminal textbook on the subject. Now the developers of the Reid Technique have created an abridged version of the classic textbook, called Essentials of the Reid Technique: Criminal Interrogation and Confessions.

Secrets of Computer Espionage: Tactics and Countermeasures

- Just who is spying on whom? The author explains that the typical person might be a target of bosses, friends, family members, hackers, and many others. Even people with nothing confidential or of value on their computers risk getting caught up in espionage and other cyber capers. For instance, hackers can use their computers as vehicles for staging attacks or as a location for storing illicit files, such as child pornography. And as more cell phones and PDAs connect to the Internet, the risks multiply.

Imperial Hubris: Why the West Is Losing the War on Terror.

- If only the location of Osama bin Laden were as easy to discover as the identity of the “anonymous” author of Imperial Hubris, an insider’s view of the search for bin Laden and a critique of the overall war on terrorism. A new edition names Michael Scheuer, a counterterrorism expert from the CIA assigned to the bin Laden “team,” who quickly surfaced as the author, appearing on talk shows to defend his book’s controversial positions.

Chaos Organization and Disaster Management

- Kirschenbaum will make readers question their own motivations and choices. With that in mind, he leads readers down an avenue of constant exploration, probing the considerations of various stakeholders, the plethora of constraints on effective disaster management, and the bureaucratic inertia that can all too quickly subsume disaster management.

Have Passport, Will Travel: Field Notes for the Modern Bodyguard.

- Paul Markel, a former U.S. marine, ex-police officer, and current executive protection agent, has written an advice book for fledgling bodyguards. The book covers critical topics such as communications, confrontation, defensive tools, professionalism, legal issues, intelligence gathering, and foreign travel. It is not detailed enough to be considered a textbook on executive protection, but it probably was not meant to be.

Stepping Through the IS Audit: What to Expect, How to Prepare

- Many an executive on a business trip abroad has suffered the embarrassment of making an error in protocol or local custom. The “thumbs up” or “V for victory” gestures that are symbols of approval in the United States may have derogatory meanings elsewhere, for example. By brushing up on local culture in advance, these executives could have saved themselves heartache, embarrassment, and lost business.

The Open Society Paradox: Why the 21st Century Calls for More Openness, Not Less.

- To some extent, everyone zealously guards his or her own privacy and fights to preserve it. But what are the chances we are fighting to secure the wrong thing? What if greater openness and transparency could protect our society better than fighting to preserve privacy at all costs? This is the thesis of The Open Society Paradox, in which author Dennis Bailey argues forcefully for a homeland identification card, openness in government and society, and the use of sophisticated information analysis as a powerful triple play to reduce the risk of cybercrime and terrorism.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.