09/24/2007 - Deftly, the author ties established forensics principles, developed for physical crimes like murder, to the new field of computer forensics. He explains Locard’s exchange principle, which states that any criminal activity involves an exchange between the criminal and the victim or the crime scene. Fingerprints, hair, fibers, or DNA get left behind, as do digital clues lurking in slack space or swap files
09/21/2007 - Security manuals and desktop references are certainly not difficult to find—just peruse the ASIS Bookstore—but few publications are as comprehensive as Corporate Homeland Security Desk Reference.
09/21/2007 - Metrics can be created for virtually every security effort, the authors show. For the purposes of this book, they divide security metrics management into administrative security, physical security, and operations security.