INFORMATION

Site Map - Book Reviews

Anti-Spam Toolkit

- The book is ideal for system administrators tasked with evaluating antispam products for their organizations, but there is something for every level of user.

Security Education, Awareness and Training: SEAT from Theory to Practice

- By encompassing the TEAM (training, education, awareness, motivation) model, security instruction can be tailored to the specific needs of the audience:

Protect Your Windows Network: From Perimeter to Data

- The distinctive nature of Protect Your Windows Network : From Perimeter to Data is that it suggest ways to secure your Windows workstation and network, but it also takes a much broader approach to security and shows you how to address the issue of securing systems as a whole. This panoptic approach to securing systems is quite refreshing, and it makes the book a fascinating read.

Mapping Security: The Corporate Security Sourcebook for Today’s Global Economy

- In Mapping Security: The Corporate Security Sourcebook for Today’s Global Economy, authors Tom Patterson and Scott Gleeson Blue offer a holistic view of what today’s chief security officers must consider when protecting corporate interests during partnerships with foreign companies.

Homeland Security Assessment Manual: A Comprehensive Organizational Assessment Based on Baldrige Criteria

- Developing metrics to measure performance and benchmark best practices is a must for professional advancement

Crime Opportunity Profiling of Streets (COPS): A Quick Crime Analysis—Rapid Implementation Approach

- COPS looked at commercial centers that suffered from street crime and problems associated with the drug trade.

Computer Evidence: Collection & Preservation

- Deftly, the author ties established forensics principles, developed for physical crimes like murder, to the new field of computer forensics. He explains Locard’s exchange principle, which states that any criminal activity involves an exchange between the criminal and the victim or the crime scene. Fingerprints, hair, fibers, or DNA get left behind, as do digital clues lurking in slack space or swap files

Bombs and Bombings: A Handbook to Protection, Security, Detection, Disposal and Investigation for Industry, Police and Fire Depa

- Bomb technicians and others who seek specialized information about the intricate, multifarious, and perilous work that these professionals perform will find much of value.

Insurgent Iraq: Al Zarqawi and the New Generation

-

Hacking Wireless Networks for Dummies

-

Corporate Homeland Security Desk Reference

- Security manuals and desktop references are certainly not difficult to find—just peruse the ASIS Bookstore—but few publications are as comprehensive as Corporate Homeland Security Desk Reference.

A View from the Eye of the Storm: Terror and Reason in the Middle East

- Conventional wisdom, often cited, is that the longstanding conflict between Israel and its Arab neighbors is a root cause of today’s terrorism.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.