Site Map - Book Reviews

Licensed to Kill: Hired Guns in the War on Terror

- Robert Young Pelton, perhaps best known as the author of The World’s Most Dangerous Places, has given us a snapshot of life in the world of the PMC and the independent contractors who populate it. Licensed to Kill: Hired Guns in the War on Terror is an entertaining look at how so-called mercenaries have come to play an increasingly critical role in Iraq and how their metamorphosis into the more-expansive PMCs could go astray.

Intrusion Prevention Fundamentals: An Introduction to Network Attack Mitigation with IPS

- The principal benefit of the book might be its good organization. Intrusion prevention is introduced in the first part, followed by an explanation of the two levels of intrusion prevention in Part Two. The final part of the book is devoted to sample deployment solutions.

Introduction to Homeland Security, Second Edition

- No sooner was the term “homeland security” coined than did a cavalcade of books appear with that buzz phrase in the title. In its first edition, this book merited the right to use that term, and it continues to do so in this second edition.

Executive Protection: New Solutions for a New Era

- New tomes on executive protection, homeland security, and the rise of private military companies in the post-9-11 world draw rave reviews.

Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures

- New tomes on executive protection, homeland security, and the rise of private military companies in the post-9-11 world draw rave reviews.

Water Supply Systems Security

- Security professionals may need to understand their sector to protect it—no less for water supply systems—but there’s a limit to what they need to know.

Preventing Identity Theft in Your Business: How to Protect Your Business, Customers, and Employees

- Despite widespread attention, identity theft and identity crimes continue to flourish. Judith M. Collins, an expert in ID theft in the business world, asserts that it is both the employer’s responsibility and a good business practice to protect staff and client personal information. This book attempts to be a guide for helping managers and employers to protect these assets.

The Next Attack: The Failure of the War on Terror and a Strategy for Getting It Right

- Benjamin and Simon slam the current administration, claiming that the war in Iraq has caused the United States to lose even more face in the Arab world and has drawn terrorists to Iraq to fight U.S. troops.

Terror on the Internet: The New Arena, The New Challenges

- Gabriel Weimann, professor of communications at Haifa University in Israel, has produced a disturbing analysis of the extraordinarily popular use of the Internet by violent extremist organizations seeking a global forum.

NFPA Pocket Guide to Electronic Security System Installation

- When it released NFPA 730 (Guide to Premises Security) and NFPA 731 (Standard for the Installation of Electronic Premises Security Systems) in 2005, several security industry associations and leaders questioned why a fire-standards organization was getting involved in security

Demystifying Terrorism: Terrorism Awareness Training Course

- Terror on the Internet scores the highest marks this month, followed by a CD on demystifying terrorism.

Hot Property: The Stealing of Ideas in an Age of Globalization

- Part history lesson, part scary bedtime story, Pat Choate’s Hot Property is chockablock with intellectual-property anecdotes spanning the past 200 years.

Executive Roadmap to Fraud Prevention and Internal Control: Creating a Culture of Compliance.

- The book features the authors’ view of the interplay among fraud specialists, corporate security professionals, and IT security practitioners. Clearly favored are the fraud specialists.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.