INFORMATION

Site Map - Book Reviews

Voices of Terror: Manifestos, Writings and Manuals of Al Qaeda, Hamas, and Other Terrorists from Around the World and Throughout

- Voices of Terror allows a peek into the emotions, principles, and rhetoric that often accompany tyranny, revolution, guerilla warfare, and terrorism.

The Grey House Transportation Security Directory & Handbook.

- Transportation companies must weave their way through complex security requirements and a baffling array of resources. This directory does readers a service by pulling together many of these requirements and resources.

Cyber Threat Levels Response Handbook

- In the information systems sphere, this book can help. It is a highly effective handbook designed for both public and private organizations and all levels of law enforcement. It gives guidance on how they should modify their respective security postures to meet a declared alert condition.

Electronic Recording of Interrogations

- On the other hand, private security professionals can learn a lot from this text, especially if they are responsible for investigating embezzlement, fraud, threats, or violence. It can help them interview victims and witnesses and interrogate suspects.

Defend I.T.: Security by Example

- The authors do, however, assume a basic level of network and security understanding. The case studies show what system and network administrators can do to protect their networks from the most common attacks.

Corporate Fraud: Case Studies in Detection and Prevention

- Corporate Fraud provides a clear window into that world. Author John D. O’Gara was the director of internal audit at a Fortune 500 company and has more than 30 years’ experience in the field. He has written a book that will serve both as a training manual for fraud investigators and a guide for security professionals interested in learning more about this field.

The Red Balloon

- It covers commonsense issues such as locking up papers, using shredders, and identifying potential adversaries. Other information might be news even to security professionals. For example, Taylor explains that many spying devices are not illegal to own but are illegal to use.

The Personal Travel Safety Manual: Security for Business People Traveling Overseas

- Corporate security personnel and security consultants will find useful and interesting material throughout. An entire section discusses corporate responsibility and liability for traveling staff. Barnes advises that organizations form a crisis management team and plan for how they would deal with a crisis

Financial Investigation and Forensic Accounting, Second Edition

- The wide range of white-collar crimes and methodologies covered here includes gambling, prostitution, money laundering, and tax havens. Some of the coverage is too brief to be of use to law enforcement experts, but the author’s intent was likely to touch on topics that affect the theory and practice of financial investigation and forensic accounting, not to comprehensively explore them

Spotlight on Security for Real Estate Managers, Second Edition.

- Aiming to help real estate managers reduce crime, deal with the consequences of crime, and reduce liability, the book hits its goal spot on. Five distinct sections cover legal issues, assessment tools, crime prevention strategies, security at various types of properties, and the use of security measures. Examples, tables, lists, outlines, sidebars, and other elements add depth to the narrative.

Terror at Beslan: A Russian Tragedy with Lessons for America’s Schools

- Author John Giduck presents an excellent review and analysis of the attack. He provides diagrams of the school building that are crucial for understanding the difficulties faced by Russian forces, and his photos graphically illustrate the brutality of the attack.

Computer Forensics: Computer Crime Scene Investigation, Second Edition

- For novices or general security practitioners, on the other hand, the information can be bewildering. The information is too detailed and complicated for beginners.

The Geeks of War: The Secretive Labs and Brilliant Minds Behind Tomorrow’s Warfare Technologies

- Similarly neglected are the role of private-sector technology incubators, government funding and venture capital, as well as public-private and university partnerships, and the applicability of technologies to the civilian and security sectors.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.