Book Reviews: Homeland Security
05/15/2012 - The authors spent two-and-a-half years attempting to document the top secret component of the government agencies dealing with counterterrorism and the private sector contractors supporting this effort (and on whom the government has become increasingly dependent).
Book Reviews: Security Management
05/15/2012 - The book is thoughtfully organized and well-written, with pertinent historical examples. It also discusses current best practices, including useful technology.
Book Reviews: Risk Management
05/15/2012 - The authors of Mission-Based Policing have developed an interesting approach to urban policing in high-crime areas. The counterinsurgency paradigm advanced by Lt. General David H. Petraeus and Lt. General James F. Amos is the impetus of their mission-based policing.
Book Reviews: Investigations
05/15/2012 - This is a comprehensive survey of social engineering concepts, techniques, and frameworks. It is a great reference in need of better editing to sharpen it into a more readable format.
Book Reviews: Crime
03/20/2012 - The authors first note that preventing workplace and school-based violence starts with the understanding that no one can predict violence; rather, the goal is to assess dangerousness based on observations and reports of a person’s behavior.
Book Reviews: Contingency Planning \ Disaster Management
03/20/2012 - The Emergency Film Group (EFG) has released another training video in its excellent series.
Book Reviews: Physical Security
03/20/2012 - Blurring Military and Police Roles is a fascinating collection of scholarly essays on this subject from both the police and military points of view, as well as from historical, organizational, and operational perspectives.
Book Reviews: Terrorism
03/20/2012 - The Day Wall Street Exploded is an account of the events surrounding the September 16, 1920, explosion that killed 38 people and rocked America.
Book Reviews: IT Security
03/20/2012 - The Computer Security Handbook’s 77 comprehensive chapters, in two volumes, cover all 10 domains of the Common Body of Knowledge as defined by the International Information Systems Security Certification Consortium (ISC)2.
Book Reviews: Investigations
02/25/2012 - This book provides an in-depth explanation of the background investigation process and the considerations that must be made when assessing an applicant’s suitability for federal employment, access credentials, or a security clearance.
Book Reviews: Proprietary Information Protection
02/25/2012 - The book familiarizes readers with terms such as “silent slashes,” “evil clones,” and “jihad by proxy” as the authors describe the “seven swords of digital assassination” that damage entities’ reputations.
Book Reviews: Privacy
02/25/2012 - Books about these issues are equally plentiful, but none that I have seen addresses the issue in more detail or with greater insight than this work by Daniel Solove, a professor at George Washington University’s Law School.
Book Reviews: Training
02/25/2012 - This book, which covers an important issue, can help anyone responsible for fraud prevention and intellectual property protection.