09/25/2007 - Authors George Haddow and Jane Bullock examine emergency management with a focus on the Federal Emergency Management Agency (FEMA) and its role in the Department of Homeland Security (DHS). With insiders’ views of their agency born from their time with FEMA in the late 1990s, Haddow and Bullock have special insight into the responsibilities and organization of FEMA.
09/25/2007 - If true, this book is terrifying. If false, it’s wildly irresponsible. Sperry writes an alarming exposé of how Muslims have been secretly infiltrating American society, government, and culture, all the while pretending to be peace-loving and patriotic, while actually supporting violent jihad to turn the United States into an Islamic state.
09/25/2007 - The book is a compilation of scholarly articles targeted to professors, students, and policymakers, relying heavily on research studies that employ both inferential and descriptive statistics. The material is presented in four sections, with contributions appearing from some of the leading criminal justice experts in the academic community.
09/24/2007 - The distinctive nature of Protect Your Windows Network : From Perimeter to Data is that it suggest ways to secure your Windows workstation and network, but it also takes a much broader approach to security and shows you how to address the issue of securing systems as a whole. This panoptic approach to securing systems is quite refreshing, and it makes the book a fascinating read.
09/24/2007 - In Mapping Security: The Corporate Security Sourcebook for Today’s Global Economy, authors Tom Patterson and Scott Gleeson Blue offer a holistic view of what today’s chief security officers must consider when protecting corporate interests during partnerships with foreign companies.
09/24/2007 - Deftly, the author ties established forensics principles, developed for physical crimes like murder, to the new field of computer forensics. He explains Locard’s exchange principle, which states that any criminal activity involves an exchange between the criminal and the victim or the crime scene. Fingerprints, hair, fibers, or DNA get left behind, as do digital clues lurking in slack space or swap files