INFORMATION

Site Map - Book Reviews

Dying to Kill: The Allure of Suicide Terror

- Mia Bloom, an assistant professor of political science at the University of Cincinnati, tries to explain what motivates suicide bombers.

Digital Evidence and Computer Crime, Second Edition

- The bits-and-bytes material is cushioned by rich context, with sections addressing the history of computer crime and the methods and mind-sets of computer criminals.

And the Incorrect Answer Is: “No Comment"

- Why is “No comment” the wrong response to any media question? According to the authors, those words precipitate questions such as, “What are you trying to hide?” and “What’s really going on here?” They offer tips on what needs to be said and how to say it.

19 Deadly Sins of Software Security

- The book covers these 19 programming flaws, which include the most devastating types of coding and architectural errors, such as buffer overflows, format string problems, cross-site scripting, and insufficient encryption.

Aptitude for Destruction: Case Studies of Organizational Learning in Five Terrorist Groups

- Jemaah Islamiyah, Aum Shinrikyo, Hizballah, the Provisional Irish Republican Army, and the radical environmentalist movement are singled out for case studies in volume two of this RAND examination of how terrorists learn.

Aptitude for Destruction: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism

- Readers come to understand the backgrounds, operations and tactics, training methods, logistics, and intelligence operations of these groups.

Internet Guide to Food Safety and Security

-

A Practical Guide to Security Assessments

- Organizations do not function in a vacuum. They must balance and navigate business processes and interdependencies, the Internet, distributed systems, and legislation and regulation, just to name a few factors that influence their environment and posture.

Physical Security for IT

- Everyone asks whether the company network is safe from hackers, and IT and security departments pour lots of money and energy into making it so. A related question is often overlooked.

Johnny May’s Guide to Preventing Identity Theft

-

Corporate Crooks: How Rogue Executives Ripped Off Americans…and Congress Helped Them Do It!

- The period from the late 1990s into the early years of the 21st century is likely the best-documented era of corporate scandal in history.  In Corporate Crooks, Greg Farrell, an investigative reporter for USA Today, offers a simple primer on the subject.

Security Operations Management, Second Edition

- With the technological advances and world events of the past 25 years, security management has evolved greatly and become both a vital business function and an academic discipline. Recognizing this, Robert D. McCrie has wisely chosen to update this classic reference source for students, practitioners, and business managers alike.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.