INFORMATION

Site Map - Book Reviews

Physical Security for IT

- Everyone asks whether the company network is safe from hackers, and IT and security departments pour lots of money and energy into making it so. A related question is often overlooked.

Johnny May’s Guide to Preventing Identity Theft

-

Corporate Crooks: How Rogue Executives Ripped Off Americans…and Congress Helped Them Do It!

- The period from the late 1990s into the early years of the 21st century is likely the best-documented era of corporate scandal in history.  In Corporate Crooks, Greg Farrell, an investigative reporter for USA Today, offers a simple primer on the subject.

Security Operations Management, Second Edition

- With the technological advances and world events of the past 25 years, security management has evolved greatly and become both a vital business function and an academic discipline. Recognizing this, Robert D. McCrie has wisely chosen to update this classic reference source for students, practitioners, and business managers alike.

Safe Passage Travel Companion

- In today’s uncertain world, those responsible for the safety of travelers are always on the lookout for good security tools and resources to aid that mission. The tools offered by the Safe Passage Travel Companion provide basic, necessary security information for both the novice and the seasoned traveler.

The Bodyguard’s Bible

- Author James Brown says “the mark of a good bodyguard is that he keeps a level head in a crisis, reassesses the situation, and then embarks on the correct next course of action.” That quote constitutes the thesis of The Bodyguard’s Bible, a well-written book with 38 chapters that flow nicely, informing the reader and maintaining his or her interest. Brown does an excellent job of disassociating “bouncers” from security professionals who protect the rich, famous, and powerful. To that point, he notes that the term Close Protection Officer (CPO) is replacing the term “bodyguard” in the field.  

Strategic Security Management: A Risk Assessment Guide for Decision Makers

- This book takes on the ambitious goal of bridging the gap between theory and reality in risk-assessment-based security management—and achieves it handily. The author emphasizes the fundamental responsibilities of today’s security managers: to assess risks, demonstrate them to justify costs, and accurately measure security’s effectiveness to manage it properly.

Exploits of the Nigerian Con Man

- Named for the section of the 1958 Nigerian Criminal Code that makes it illegal, the modus operandi should be familiar to all readers: a powerful person’s relative has access to huge money and needs your help laundering it.

Protective Actions: Evacuation/Shelter in Place

- Government and private institutions will find this a valuable tool to help them plan for those situations in which evacuation is impossible or ill-advised. If the purchase price for the video is too high, it is worth renting.

First In: An Insider’s Account of How the CIA Spearheaded the War on Terror in Afghanistan

- First In is one of those uncommon cases. In it, author Gary C. Schroen offers a fascinating firsthand account of the logistical and operational planning behind the CIA’s implementation of the war on terror in Afghanistan.

Introduction to Emergency Management

- An outstanding text for students and a good source of information for anyone wanting to improve their fundamental knowledge of the subject.

Privacy Lost: How Technology is Endangering Your Privacy

- This book provides a clear overview of the risks to privacy in the Digital Age, who the perpetrators are, and what we can do about it.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.