INFORMATION

Site Map - Book Reviews

Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures

- New tomes on executive protection, homeland security, and the rise of private military companies in the post-9-11 world draw rave reviews.

Water Supply Systems Security

- Security professionals may need to understand their sector to protect it—no less for water supply systems—but there’s a limit to what they need to know.

Preventing Identity Theft in Your Business: How to Protect Your Business, Customers, and Employees

- Despite widespread attention, identity theft and identity crimes continue to flourish. Judith M. Collins, an expert in ID theft in the business world, asserts that it is both the employer’s responsibility and a good business practice to protect staff and client personal information. This book attempts to be a guide for helping managers and employers to protect these assets.

The Next Attack: The Failure of the War on Terror and a Strategy for Getting It Right

- Benjamin and Simon slam the current administration, claiming that the war in Iraq has caused the United States to lose even more face in the Arab world and has drawn terrorists to Iraq to fight U.S. troops.

Terror on the Internet: The New Arena, The New Challenges

- Gabriel Weimann, professor of communications at Haifa University in Israel, has produced a disturbing analysis of the extraordinarily popular use of the Internet by violent extremist organizations seeking a global forum.

NFPA Pocket Guide to Electronic Security System Installation

- When it released NFPA 730 (Guide to Premises Security) and NFPA 731 (Standard for the Installation of Electronic Premises Security Systems) in 2005, several security industry associations and leaders questioned why a fire-standards organization was getting involved in security

Demystifying Terrorism: Terrorism Awareness Training Course

- Terror on the Internet scores the highest marks this month, followed by a CD on demystifying terrorism.

Hot Property: The Stealing of Ideas in an Age of Globalization

- Part history lesson, part scary bedtime story, Pat Choate’s Hot Property is chockablock with intellectual-property anecdotes spanning the past 200 years.

Executive Roadmap to Fraud Prevention and Internal Control: Creating a Culture of Compliance.

- The book features the authors’ view of the interplay among fraud specialists, corporate security professionals, and IT security practitioners. Clearly favored are the fraud specialists.

Enhancing Computer Security with Smart Technology

- The goal of the book is to show how to use “smart technology” (which, regrettably, the authors never define) to enhance computer security.

Effective Interviewing and Interrogation Techniques, Second Edition

- This is a “toolbox” book about detecting deception. It clearly and logically explains how to prepare for, structure, and conduct interviews and interrogations using the FAINT model.

Security and Usability: Designing Secure Systems That People Can Use

- The six major parts of the book all have their enlightening moments, whether discussing authentication mechanisms or privacy and anonymity.

Vulnerability Assessment of Physical Protection Systems

- No security professional involved at any level in the VA process for physical protection systems can afford to operate without this field manual.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.