09/21/2007 - Metrics can be created for virtually every security effort, the authors show. For the purposes of this book, they divide security metrics management into administrative security, physical security, and operations security.
09/21/2007 - One Web-based video camera system described in the book was released with a flaw that would allow a misspelled Web address to bypass all authentication mechanisms in the system, granting the user full administrative access to the devices.
09/20/2007 - Examine the differences between the powers enjoyed by police officers and those available to private security guards under British law and how well guards themselves understand those differences.
09/14/2007 - Transportation companies must weave their way through complex security requirements and a baffling array of resources. This directory does readers a service by pulling together many of these requirements and resources.