INFORMATION

Site Map - Book Reviews

Terrorism and Personal Security: Reduce Your Chances of Becoming a Target

- In an organized, logical fashion, the book leads the reader from an overview of risks to practical recommendations for personal safety.

The Software Vulnerability Guide

- The Software Vulnerability Guide was written to help software developers acquire the methods necessary to write secure code and find existing problems in current software.

Security Metrics Management: How to Manage the Costs of an Assets Protection Program

- Metrics can be created for virtually every security effort, the authors show. For the purposes of this book, they divide security metrics management into administrative security, physical security, and operations security.

Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems

- The book is intended to serve as a guide to help security professionals develop a security audit plan, perform the audit, and implement the resulting recommendations.

Black Hat Physical Device Security: Exploiting Hardware and Software

- One Web-based video camera system described in the book was released with a flaw that would allow a misspelled Web address to bypass all authentication mechanisms in the system, granting the user full administrative access to the devices.

Terrorism: The Present Threat in Context

- An introductory text on one of the most pressing security issues of the new century.

The Handbook of Security

- A collection of separate essays on security studies from the most eminent security scholars today.

Dirty Dealing: The Untold Truth About Global Money Laundering, International Crime and Terrorism, 3rd Edition

- Learn the basics about the most profitable criminal enterprise in the world.

Security Officers and Policing: Powers, Culture, and Control in the Governance of Private Space

- Examine the differences between the powers enjoyed by police officers and those available to private security guards under British law and how well guards themselves understand those differences.

Securing Global Transportation Networks: A Total Security Management Approach

- What is "total security management?" Simply put: Secure all aspects of your operation, ensure your suppliers do the same, and plan for problems.

Forensic Accounting and Fraud Investigation for Non-Experts, Second Edition

- Forensic Accounting and Fraud Investigation for Non-Experts offers an effective primer on how financial fraud occurs, demonstrating the critical need for accounting controls.

Spy Handler: Memoir of a KGB Officer

- Cherkashin served as chief counterintelligence officer at the Soviet embassy in Washington, D.C., where he handled notorious spies Aldrich Ames and Robert Hanssen.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.