INFORMATION

Site Map - Book Reviews

Risk Analysis and the Security Survey, Fourth Edition

- Written in two parts, the book takes the reader beyond merely conducting the risk analysis in part one to what happens should preparedness fail.

Terrorist Financing, Money Laundering, and Tax Evasion

- This book covers a crucial element in the worldwide battle against terror and provides an academic viewpoint of many of the issues surrounding the ability to quantitatively measure the performance of financial intelligence units.

Digging for Disclosure: Tactics for Protecting Your Firm’s Assets from Swindlers, Scammers, and Imposters

- The authors have written a most interesting and useful book with a fresh look at an old problem.

Cyber Warfare: Techniques, Tactics, and Tools for Security Practitioners

- Apparently aimed at a military audience, this book offers concepts and examples largely from the U.S. military.

Eco-Warriors, Nihilistic Terrorists and the Environment

- All in all, this book has some merits. It gives a comprehensive view of the current status of terrorism and presents some stimulating thoughts and ideas.

Thor’s Microsoft Security Bible

- This book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes, and meth­odologies uniquely illustrated through real-world process examples.

Liars & Outliers: Enabling the Trust That Society Needs to Thrive

- Without a broad base of trust, society and all of our institutions would fail to function. This is the focus of Bruce Schneier’s new­est book, Liars & Outliers: Enabling the Trust That Society Needs to Thrive.

Smart Grid Security: An End-to-End View of Security in the New Electrical Grid

- Reviewer: For those looking to get a handle on how to secure the evolving and dynamic smart grid, Smart Grid Security: An End-to-End View of Security in the New Electrical Grid is an excellent reference.

Electronic Access Control

- This book is likely one of the most current and comprehensive works available in this subject area, says reviewer Paul D. Barnard, CPP, CISM, SFPC.

How to Do Financial Asset Investigations

- An overall theme in the book is to obey the law when conducting investigations. It is critical that investigators be aware of the specifics of the Fair Credit Reporting Act and the Gramm-Leach-Bliley Act as well as other state and federal laws.

ISO27001 in a Windows Environment

- Anyone who will be using ISO27001 in a Windows environment and wants to make its implementation easier should certainly have this reference at their side.

Terrorist Rehabilitation: The U.S. Experience in Iraq

- In their excellent book, Ami Angell and Rohan Gun­ar­atna provide a detailed account of a program that covered everything from the complexity of detainee operations to the challenges involved in rehabilitation programs.

Wanted Dead or Alive: Manhunts from Geronimo to Bin Laden

- Beginning with Geronimo and ending with Osama Bin Laden, this book describes strategic manhunts conducted by the United States military in pursuit of America’s enemies.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.