Book Reviews: Contingency Planning \ Disaster Management
11/01/2007 - Jim Kennedy’s chapter, “Business Continuity and Disaster Recovery,” deserves special mention because it is an excellent overview of the changes to traditional disaster planning brought about by the World Trade Center attacks. Less successful is a chapter entitled “Blending Corporate Governance with Corporate Security,” which discusses Sarbanes-Oxley. The author asserts that Section 404 of the act deals with “systems of control,” which he says are by their very nature computer information systems. Yet Section 404 does not specifically mention computer systems, and any security requirements beyond those necessary to ensure accurate financial accounting and reporting are beyond the scope of Sarbanes-Oxley. To flatly state that increased information security measures are required under this law is misleading.
Book Reviews: Access Control
10/29/2007 - Learn the skills and tools necessary to install and maintain effective intrusion alarm devices and systems.
Book Reviews: Terrorism
10/29/2007 - What makes Islamist terrorism tick?
Book Reviews: Financial Markets
10/29/2007 - Financial scandals follow a pattern, and learning how this pattern plays out is essential to preventing future business crime and financial meltdowns.
Book Reviews: Legal Issues
10/29/2007 - Author James F. Pastor weaves together security standards, best practices, and the law to help lawyers who litigate civil premises liability cases.
Book Reviews: Homeland Security
10/29/2007 - The term "instant classic" is an oxymoron, but it nevertheless may apply to Counterdeception Principles and Applications for National Security.
Book Reviews: Terrorism
10/29/2007 - Among the many books that purport to point the way forward for America in the wake of 9-11, this one stands out, chiefly for its clarity and sensibility. It is often difficult to deny the common sense of Brian Michael Jenkins' commentary.
Book Reviews: IT Security
Book Reviews: Loss Prevention
10/29/2007 - Author Rory J. McMahon states that this book is a compilation of notes used as an outline in a fraud investigations section for a private investigator program at Career City College in Fort Lauderdale, Florida, where McMahon was an instructor. He adds that Rene Champagne developed the first editions of this book and that McMahon expanded on those, resulting in this self-published effort.
Book Reviews: International
10/29/2007 - This is not a book so much as a collection of essays, monographs, and first-person accounts of the effects of terrorism from ground zero—the point of impact—to the human effects years afterward.
Book Reviews: Risk Management
10/29/2007 - Pick up any security publication nowadays and you’re sure to see an article on the convergence of traditional corporate security with the more technical world of information systems security. Without extensive computer experience, it can be difficult to understand the threats to and vulnerabilities of automated information systems.
Book Reviews: How-to
10/29/2007 - Among the topics discussed here are perimeter security, locks, entry tracking, CCTV, audio surveillance, background checks, drug testing, and emergency response.
Book Reviews: Academic \ Educational Programs
10/05/2007 - Ever heard of CPED? You probably think the “T” is missing from CPTED—crime prevention through environmental design—and you’d be right. But the authors of Proactive Security Administration inexplicably eschew the well-known “CPTED” acronym, using in its place “CPED,” standing for “crime prevention planning by environmental design,” which really should be CPPED in any case.