03/20/2012 - Blurring Military and Police Roles is a fascinating collection of scholarly essays on this subject from both the police and military points of view, as well as from historical, organizational, and operational perspectives.
03/20/2012 - The Computer Security Handbook’s 77 comprehensive chapters, in two volumes, cover all 10 domains of the Common Body of Knowledge as defined by the International Information Systems Security Certification Consortium (ISC)2.
02/25/2012 - This book provides an in-depth explanation of the background investigation process and the considerations that must be made when assessing an applicant’s suitability for federal employment, access credentials, or a security clearance.
02/25/2012 - The book familiarizes readers with terms such as “silent slashes,” “evil clones,” and “jihad by proxy” as the authors describe the “seven swords of digital assassination” that damage entities’ reputations.
02/25/2012 - Books about these issues are equally plentiful, but none that I have seen addresses the issue in more detail or with greater insight than this work by Daniel Solove, a professor at George Washington University’s Law School.
01/20/2012 - Novices may find value in the thorough introduction to subjects such as the smart grid, hacking, and IT threats. It’s unlikely that the text would be a consistently helpful working reference, however, for those already engaged in smart grid security.
01/20/2012 - The chief contribution of this book to the body of literature on corporate espionage is a unique examination of individuals who straddle the public and private sectors in the practice of their tradecraft.