10/29/2007 - Pick up any security publication nowadays and you’re sure to see an article on the convergence of traditional corporate security with the more technical world of information systems security. Without extensive computer experience, it can be difficult to understand the threats to and vulnerabilities of automated information systems.
10/05/2007 - Ever heard of CPED? You probably think the “T” is missing from CPTED—crime prevention through environmental design—and you’d be right. But the authors of Proactive Security Administration inexplicably eschew the well-known “CPTED” acronym, using in its place “CPED,” standing for “crime prevention planning by environmental design,” which really should be CPPED in any case.
10/05/2007 - Google Earth now lets computer users zoom through space to specific sites all over the world. Mapping is also making great strides in the law enforcement world, where geographic information systems (GIS) have been replacing pin maps. Systems such as New York City’s COMPSTAT have been highly successful in mapping and depicting virtually any combination of crime/arrest locations, crime hot spots, and other information in real time.
10/05/2007 - Navarro explores the motivations and personae of terrorists, similarities among terrorists, and behavior patterns. This broad overview would be fine for students studying introductory criminal justice or psychology, but experienced investigators need to know much more about the mind-sets of terrorists and the structure of terrorist organizations.
09/28/2007 - Robert Young Pelton, perhaps best known as the author of The World’s Most Dangerous Places, has given us a snapshot of life in the world of the PMC and the independent contractors who populate it. Licensed to Kill: Hired Guns in the War on Terror is an entertaining look at how so-called mercenaries have come to play an increasingly critical role in Iraq and how their metamorphosis into the more-expansive PMCs could go astray.
09/28/2007 - The principal benefit of the book might be its good organization. Intrusion prevention is introduced in the first part, followed by an explanation of the two levels of intrusion prevention in Part Two. The final part of the book is devoted to sample deployment solutions.
09/28/2007 - No sooner was the term “homeland security” coined than did a cavalcade of books appear with that buzz phrase in the title. In its first edition, this book merited the right to use that term, and it continues to do so in this second edition.