INFORMATION

Site Map - Book Reviews

Financial Investigation and Forensic Accounting, Second Edition

- The wide range of white-collar crimes and methodologies covered here includes gambling, prostitution, money laundering, and tax havens. Some of the coverage is too brief to be of use to law enforcement experts, but the author’s intent was likely to touch on topics that affect the theory and practice of financial investigation and forensic accounting, not to comprehensively explore them

Spotlight on Security for Real Estate Managers, Second Edition.

- Aiming to help real estate managers reduce crime, deal with the consequences of crime, and reduce liability, the book hits its goal spot on. Five distinct sections cover legal issues, assessment tools, crime prevention strategies, security at various types of properties, and the use of security measures. Examples, tables, lists, outlines, sidebars, and other elements add depth to the narrative.

Terror at Beslan: A Russian Tragedy with Lessons for America’s Schools

- Author John Giduck presents an excellent review and analysis of the attack. He provides diagrams of the school building that are crucial for understanding the difficulties faced by Russian forces, and his photos graphically illustrate the brutality of the attack.

Computer Forensics: Computer Crime Scene Investigation, Second Edition

- For novices or general security practitioners, on the other hand, the information can be bewildering. The information is too detailed and complicated for beginners.

The Geeks of War: The Secretive Labs and Brilliant Minds Behind Tomorrow’s Warfare Technologies

- Similarly neglected are the role of private-sector technology incubators, government funding and venture capital, as well as public-private and university partnerships, and the applicability of technologies to the civilian and security sectors.

Dying to Kill: The Allure of Suicide Terror

- Mia Bloom, an assistant professor of political science at the University of Cincinnati, tries to explain what motivates suicide bombers.

Digital Evidence and Computer Crime, Second Edition

- The bits-and-bytes material is cushioned by rich context, with sections addressing the history of computer crime and the methods and mind-sets of computer criminals.

And the Incorrect Answer Is: “No Comment"

- Why is “No comment” the wrong response to any media question? According to the authors, those words precipitate questions such as, “What are you trying to hide?” and “What’s really going on here?” They offer tips on what needs to be said and how to say it.

19 Deadly Sins of Software Security

- The book covers these 19 programming flaws, which include the most devastating types of coding and architectural errors, such as buffer overflows, format string problems, cross-site scripting, and insufficient encryption.

Aptitude for Destruction: Case Studies of Organizational Learning in Five Terrorist Groups

- Jemaah Islamiyah, Aum Shinrikyo, Hizballah, the Provisional Irish Republican Army, and the radical environmentalist movement are singled out for case studies in volume two of this RAND examination of how terrorists learn.

Aptitude for Destruction: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism

- Readers come to understand the backgrounds, operations and tactics, training methods, logistics, and intelligence operations of these groups.

Internet Guide to Food Safety and Security

-

A Practical Guide to Security Assessments

- Organizations do not function in a vacuum. They must balance and navigate business processes and interdependencies, the Internet, distributed systems, and legislation and regulation, just to name a few factors that influence their environment and posture.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.