Site Map - Book Reviews

Fraud Investigations: A Textbook on How to Conduct White Collar Crime and Financial Fraud Investigations

- Author Rory J. McMahon states that this book is a compilation of notes used as an outline in a fraud investigations section for a private investigator program at Career City College in Fort Lauderdale, Florida, where McMahon was an instructor. He adds that Rene Champagne developed the first editions of this book and that McMahon expanded on those, resulting in this self-published effort.

The Trauma of Terrorism: Sharing Knowledge and Shared Care.

- This is not a book so much as a collection of essays, monographs, and first-person accounts of the effects of terrorism from ground zero—the point of impact—to the human effects years afterward.

Risk Management for Computer Security: Protecting Your Network and Information Assets

- Pick up any security publication nowadays and you’re sure to see an article on the convergence of traditional corporate security with the more technical world of information systems security. Without extensive computer experience, it can be difficult to understand the threats to and vulnerabilities of automated information systems.

Facility Manager’s Guide to Security: Protecting Your Assets

- Among the topics discussed here are perimeter security, locks, entry tracking, CCTV, audio surveillance, background checks, drug testing, and emergency response.

Proactive Security Administration

- Ever heard of CPED? You probably think the “T” is missing from CPTED—crime prevention through environmental design—and you’d be right. But the authors of Proactive Security Administration inexplicably eschew the well-known “CPTED” acronym, using in its place “CPED,” standing for “crime prevention planning by environmental design,” which really should be CPPED in any case.

Web Mapping Illustrated

- Google Earth now lets computer users zoom through space to specific sites all over the world. Mapping is also making great strides in the law enforcement world, where geographic information systems (GIS) have been replacing pin maps. Systems such as New York City’s COMPSTAT have been highly successful in mapping and depicting virtually any combination of crime/arrest locations, crime hot spots, and other information in real time.

Hunting Terrorists: A Look at the Psychopathology of Terror

- Navarro explores the motivations and personae of terrorists, similarities among terrorists, and behavior patterns. This broad overview would be fine for students studying introductory criminal justice or psychology, but experienced investigators need to know much more about the mind-sets of terrorists and the structure of terrorist organizations.

Darknet: Hollywood’s War Against the Digital Generation


The Business Case for Network Security: Advocacy, Governance, and ROI

- Convincing executive management of the merits of a stable and secure network infrastructure is a difficult and ongoing battle for IT managers

Licensed to Kill: Hired Guns in the War on Terror

- Robert Young Pelton, perhaps best known as the author of The World’s Most Dangerous Places, has given us a snapshot of life in the world of the PMC and the independent contractors who populate it. Licensed to Kill: Hired Guns in the War on Terror is an entertaining look at how so-called mercenaries have come to play an increasingly critical role in Iraq and how their metamorphosis into the more-expansive PMCs could go astray.

Intrusion Prevention Fundamentals: An Introduction to Network Attack Mitigation with IPS

- The principal benefit of the book might be its good organization. Intrusion prevention is introduced in the first part, followed by an explanation of the two levels of intrusion prevention in Part Two. The final part of the book is devoted to sample deployment solutions.

Introduction to Homeland Security, Second Edition

- No sooner was the term “homeland security” coined than did a cavalcade of books appear with that buzz phrase in the title. In its first edition, this book merited the right to use that term, and it continues to do so in this second edition.

Executive Protection: New Solutions for a New Era

- New tomes on executive protection, homeland security, and the rise of private military companies in the post-9-11 world draw rave reviews.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.