Site Map - Book Reviews

Security Law and Methods

- Author James F. Pastor weaves together security standards, best practices, and the law to help lawyers who litigate civil premises liability cases.

Counterdeception Principles and Applications for National Security

- The term "instant classic" is an oxymoron, but it nevertheless may apply to Counterdeception Principles and Applications for National Security.

Unconquerable Nation: Knowing Our Enemy, Strengthening Ourselves

- Among the many books that purport to point the way forward for America in the wake of 9-11, this one stands out, chiefly for its clarity and sensibility. It is often difficult to deny the common sense of Brian Michael Jenkins' commentary.  

Slamming Spam: A Guide for System Administrators


Fraud Investigations: A Textbook on How to Conduct White Collar Crime and Financial Fraud Investigations

- Author Rory J. McMahon states that this book is a compilation of notes used as an outline in a fraud investigations section for a private investigator program at Career City College in Fort Lauderdale, Florida, where McMahon was an instructor. He adds that Rene Champagne developed the first editions of this book and that McMahon expanded on those, resulting in this self-published effort.

The Trauma of Terrorism: Sharing Knowledge and Shared Care.

- This is not a book so much as a collection of essays, monographs, and first-person accounts of the effects of terrorism from ground zero—the point of impact—to the human effects years afterward.

Risk Management for Computer Security: Protecting Your Network and Information Assets

- Pick up any security publication nowadays and you’re sure to see an article on the convergence of traditional corporate security with the more technical world of information systems security. Without extensive computer experience, it can be difficult to understand the threats to and vulnerabilities of automated information systems.

Facility Manager’s Guide to Security: Protecting Your Assets

- Among the topics discussed here are perimeter security, locks, entry tracking, CCTV, audio surveillance, background checks, drug testing, and emergency response.

Proactive Security Administration

- Ever heard of CPED? You probably think the “T” is missing from CPTED—crime prevention through environmental design—and you’d be right. But the authors of Proactive Security Administration inexplicably eschew the well-known “CPTED” acronym, using in its place “CPED,” standing for “crime prevention planning by environmental design,” which really should be CPPED in any case.

Web Mapping Illustrated

- Google Earth now lets computer users zoom through space to specific sites all over the world. Mapping is also making great strides in the law enforcement world, where geographic information systems (GIS) have been replacing pin maps. Systems such as New York City’s COMPSTAT have been highly successful in mapping and depicting virtually any combination of crime/arrest locations, crime hot spots, and other information in real time.

Hunting Terrorists: A Look at the Psychopathology of Terror

- Navarro explores the motivations and personae of terrorists, similarities among terrorists, and behavior patterns. This broad overview would be fine for students studying introductory criminal justice or psychology, but experienced investigators need to know much more about the mind-sets of terrorists and the structure of terrorist organizations.

Darknet: Hollywood’s War Against the Digital Generation


The Business Case for Network Security: Advocacy, Governance, and ROI

- Convincing executive management of the merits of a stable and secure network infrastructure is a difficult and ongoing battle for IT managers

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.