Site Map - Book Reviews

NFPA Pocket Guide to Electronic Security System Installation

- When it released NFPA 730 (Guide to Premises Security) and NFPA 731 (Standard for the Installation of Electronic Premises Security Systems) in 2005, several security industry associations and leaders questioned why a fire-standards organization was getting involved in security

Demystifying Terrorism: Terrorism Awareness Training Course

- Terror on the Internet scores the highest marks this month, followed by a CD on demystifying terrorism.

Hot Property: The Stealing of Ideas in an Age of Globalization

- Part history lesson, part scary bedtime story, Pat Choate’s Hot Property is chockablock with intellectual-property anecdotes spanning the past 200 years.

Executive Roadmap to Fraud Prevention and Internal Control: Creating a Culture of Compliance.

- The book features the authors’ view of the interplay among fraud specialists, corporate security professionals, and IT security practitioners. Clearly favored are the fraud specialists.

Enhancing Computer Security with Smart Technology

- The goal of the book is to show how to use “smart technology” (which, regrettably, the authors never define) to enhance computer security.

Effective Interviewing and Interrogation Techniques, Second Edition

- This is a “toolbox” book about detecting deception. It clearly and logically explains how to prepare for, structure, and conduct interviews and interrogations using the FAINT model.

Security and Usability: Designing Secure Systems That People Can Use

- The six major parts of the book all have their enlightening moments, whether discussing authentication mechanisms or privacy and anonymity.

Vulnerability Assessment of Physical Protection Systems

- No security professional involved at any level in the VA process for physical protection systems can afford to operate without this field manual.

The Privacy Management Toolkit

- In the early days of nuclear physics, many people scoffed at the notion that splitting an atom could devastate cities. They simply did not understand the power of the atom. In many ways, privacy is akin to the atom: it sits dormant among the minutiae of life until it is split, or invaded, unleashing forces that can have destructive consequences.

Knockoff: The Deadly Trade in Counterfeit Goods

- Lots of people have fake Rolex watches, Coach bags, or movies on DVD. Though some people justify these as “innocent” copies that democratize purchasing power, manufacturers see them as a significant funding source for organized crime, which is destroying the hard work of the world’s watch, designer bag, film, and other industries. But is this trade in counterfeit goods really deadly, as the author of Knockoff claims?

Introduction to Emergency Management, Second Edition

- Authors George Haddow and Jane Bullock examine emergency management with a focus on the Federal Emergency Management Agency (FEMA) and its role in the Department of Homeland Security (DHS). With insiders’ views of their agency born from their time with FEMA in the late 1990s, Haddow and Bullock have special insight into the responsibilities and organization of FEMA.

Infiltration: How Muslim Spies and Subversives Have Penetrated Washington

- If true, this book is terrifying. If false, it’s wildly irresponsible. Sperry writes an alarming exposé of how Muslims have been secretly infiltrating American society, government, and culture, all the while pretending to be peace-loving and patriotic, while actually supporting violent jihad to turn the United States into an Islamic state.

Criminal Justice Technology in the 21st Century, Second Edition

- The book is a compilation of scholarly articles targeted to professors, students, and policymakers, relying heavily on research studies that employ both inferential and descriptive statistics. The material is presented in four sections, with contributions appearing from some of the leading criminal justice experts in the academic community.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.