Site Map - Book Reviews

Enhancing Computer Security with Smart Technology

- The goal of the book is to show how to use “smart technology” (which, regrettably, the authors never define) to enhance computer security.

Effective Interviewing and Interrogation Techniques, Second Edition

- This is a “toolbox” book about detecting deception. It clearly and logically explains how to prepare for, structure, and conduct interviews and interrogations using the FAINT model.

Security and Usability: Designing Secure Systems That People Can Use

- The six major parts of the book all have their enlightening moments, whether discussing authentication mechanisms or privacy and anonymity.

Vulnerability Assessment of Physical Protection Systems

- No security professional involved at any level in the VA process for physical protection systems can afford to operate without this field manual.

The Privacy Management Toolkit

- In the early days of nuclear physics, many people scoffed at the notion that splitting an atom could devastate cities. They simply did not understand the power of the atom. In many ways, privacy is akin to the atom: it sits dormant among the minutiae of life until it is split, or invaded, unleashing forces that can have destructive consequences.

Knockoff: The Deadly Trade in Counterfeit Goods

- Lots of people have fake Rolex watches, Coach bags, or movies on DVD. Though some people justify these as “innocent” copies that democratize purchasing power, manufacturers see them as a significant funding source for organized crime, which is destroying the hard work of the world’s watch, designer bag, film, and other industries. But is this trade in counterfeit goods really deadly, as the author of Knockoff claims?

Introduction to Emergency Management, Second Edition

- Authors George Haddow and Jane Bullock examine emergency management with a focus on the Federal Emergency Management Agency (FEMA) and its role in the Department of Homeland Security (DHS). With insiders’ views of their agency born from their time with FEMA in the late 1990s, Haddow and Bullock have special insight into the responsibilities and organization of FEMA.

Infiltration: How Muslim Spies and Subversives Have Penetrated Washington

- If true, this book is terrifying. If false, it’s wildly irresponsible. Sperry writes an alarming exposé of how Muslims have been secretly infiltrating American society, government, and culture, all the while pretending to be peace-loving and patriotic, while actually supporting violent jihad to turn the United States into an Islamic state.

Criminal Justice Technology in the 21st Century, Second Edition

- The book is a compilation of scholarly articles targeted to professors, students, and policymakers, relying heavily on research studies that employ both inferential and descriptive statistics. The material is presented in four sections, with contributions appearing from some of the leading criminal justice experts in the academic community.

Anti-Spam Toolkit

- The book is ideal for system administrators tasked with evaluating antispam products for their organizations, but there is something for every level of user.

Security Education, Awareness and Training: SEAT from Theory to Practice

- By encompassing the TEAM (training, education, awareness, motivation) model, security instruction can be tailored to the specific needs of the audience:

Protect Your Windows Network: From Perimeter to Data

- The distinctive nature of Protect Your Windows Network : From Perimeter to Data is that it suggest ways to secure your Windows workstation and network, but it also takes a much broader approach to security and shows you how to address the issue of securing systems as a whole. This panoptic approach to securing systems is quite refreshing, and it makes the book a fascinating read.

Mapping Security: The Corporate Security Sourcebook for Today’s Global Economy

- In Mapping Security: The Corporate Security Sourcebook for Today’s Global Economy, authors Tom Patterson and Scott Gleeson Blue offer a holistic view of what today’s chief security officers must consider when protecting corporate interests during partnerships with foreign companies.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.