INFORMATION

Site Map - Book Reviews

Homeland Security Assessment Manual: A Comprehensive Organizational Assessment Based on Baldrige Criteria

- Developing metrics to measure performance and benchmark best practices is a must for professional advancement

Crime Opportunity Profiling of Streets (COPS): A Quick Crime Analysis—Rapid Implementation Approach

- COPS looked at commercial centers that suffered from street crime and problems associated with the drug trade.

Computer Evidence: Collection & Preservation

- Deftly, the author ties established forensics principles, developed for physical crimes like murder, to the new field of computer forensics. He explains Locard’s exchange principle, which states that any criminal activity involves an exchange between the criminal and the victim or the crime scene. Fingerprints, hair, fibers, or DNA get left behind, as do digital clues lurking in slack space or swap files

Bombs and Bombings: A Handbook to Protection, Security, Detection, Disposal and Investigation for Industry, Police and Fire Depa

- Bomb technicians and others who seek specialized information about the intricate, multifarious, and perilous work that these professionals perform will find much of value.

Insurgent Iraq: Al Zarqawi and the New Generation

-

Hacking Wireless Networks for Dummies

-

Corporate Homeland Security Desk Reference

- Security manuals and desktop references are certainly not difficult to find—just peruse the ASIS Bookstore—but few publications are as comprehensive as Corporate Homeland Security Desk Reference.

A View from the Eye of the Storm: Terror and Reason in the Middle East

- Conventional wisdom, often cited, is that the longstanding conflict between Israel and its Arab neighbors is a root cause of today’s terrorism.

Terrorism and Personal Security: Reduce Your Chances of Becoming a Target

- In an organized, logical fashion, the book leads the reader from an overview of risks to practical recommendations for personal safety.

The Software Vulnerability Guide

- The Software Vulnerability Guide was written to help software developers acquire the methods necessary to write secure code and find existing problems in current software.

Security Metrics Management: How to Manage the Costs of an Assets Protection Program

- Metrics can be created for virtually every security effort, the authors show. For the purposes of this book, they divide security metrics management into administrative security, physical security, and operations security.

Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems

- The book is intended to serve as a guide to help security professionals develop a security audit plan, perform the audit, and implement the resulting recommendations.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.