INFORMATION

Site Map - Book Reviews

Web Mapping Illustrated

- Google Earth now lets computer users zoom through space to specific sites all over the world. Mapping is also making great strides in the law enforcement world, where geographic information systems (GIS) have been replacing pin maps. Systems such as New York City’s COMPSTAT have been highly successful in mapping and depicting virtually any combination of crime/arrest locations, crime hot spots, and other information in real time.

Hunting Terrorists: A Look at the Psychopathology of Terror

- Navarro explores the motivations and personae of terrorists, similarities among terrorists, and behavior patterns. This broad overview would be fine for students studying introductory criminal justice or psychology, but experienced investigators need to know much more about the mind-sets of terrorists and the structure of terrorist organizations.

Darknet: Hollywood’s War Against the Digital Generation

-

The Business Case for Network Security: Advocacy, Governance, and ROI

- Convincing executive management of the merits of a stable and secure network infrastructure is a difficult and ongoing battle for IT managers

Licensed to Kill: Hired Guns in the War on Terror

- Robert Young Pelton, perhaps best known as the author of The World’s Most Dangerous Places, has given us a snapshot of life in the world of the PMC and the independent contractors who populate it. Licensed to Kill: Hired Guns in the War on Terror is an entertaining look at how so-called mercenaries have come to play an increasingly critical role in Iraq and how their metamorphosis into the more-expansive PMCs could go astray.

Intrusion Prevention Fundamentals: An Introduction to Network Attack Mitigation with IPS

- The principal benefit of the book might be its good organization. Intrusion prevention is introduced in the first part, followed by an explanation of the two levels of intrusion prevention in Part Two. The final part of the book is devoted to sample deployment solutions.

Introduction to Homeland Security, Second Edition

- No sooner was the term “homeland security” coined than did a cavalcade of books appear with that buzz phrase in the title. In its first edition, this book merited the right to use that term, and it continues to do so in this second edition.

Executive Protection: New Solutions for a New Era

- New tomes on executive protection, homeland security, and the rise of private military companies in the post-9-11 world draw rave reviews.

Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures

- New tomes on executive protection, homeland security, and the rise of private military companies in the post-9-11 world draw rave reviews.

Water Supply Systems Security

- Security professionals may need to understand their sector to protect it—no less for water supply systems—but there’s a limit to what they need to know.

Preventing Identity Theft in Your Business: How to Protect Your Business, Customers, and Employees

- Despite widespread attention, identity theft and identity crimes continue to flourish. Judith M. Collins, an expert in ID theft in the business world, asserts that it is both the employer’s responsibility and a good business practice to protect staff and client personal information. This book attempts to be a guide for helping managers and employers to protect these assets.

The Next Attack: The Failure of the War on Terror and a Strategy for Getting It Right

- Benjamin and Simon slam the current administration, claiming that the war in Iraq has caused the United States to lose even more face in the Arab world and has drawn terrorists to Iraq to fight U.S. troops.

Terror on the Internet: The New Arena, The New Challenges

- Gabriel Weimann, professor of communications at Haifa University in Israel, has produced a disturbing analysis of the extraordinarily popular use of the Internet by violent extremist organizations seeking a global forum.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.