INFORMATION

Site Map - Book Reviews

How to Do Financial Asset Investigations

- An overall theme in the book is to obey the law when conducting investigations. It is critical that investigators be aware of the specifics of the Fair Credit Reporting Act and the Gramm-Leach-Bliley Act as well as other state and federal laws.

ISO27001 in a Windows Environment

- Anyone who will be using ISO27001 in a Windows environment and wants to make its implementation easier should certainly have this reference at their side.

Terrorist Rehabilitation: The U.S. Experience in Iraq

- In their excellent book, Ami Angell and Rohan Gun­ar­atna provide a detailed account of a program that covered everything from the complexity of detainee operations to the challenges involved in rehabilitation programs.

Wanted Dead or Alive: Manhunts from Geronimo to Bin Laden

- Beginning with Geronimo and ending with Osama Bin Laden, this book describes strategic manhunts conducted by the United States military in pursuit of America’s enemies.

The Basics of Information Security

- This is a thin book on a broad and deep topic, which gave me pause initially, but as it turns out, the book is thoughtfully written and will definitely be useful for educating managers and security professionals who need to broaden their thinking beyond physical security.

Creating Cultural Monsters: Serial Murder in America

- Law enforcement personnel, sociologists, and criminal justice majors will find this book valuable and educational, as well as an excellent reference guide.

The Counterterrorism Handbook: Tactics, Procedures, and Techniques

- The book overall is well presented with an audience of security and law enforcement professionals in mind. Its point of view is not from a single author, but from a panel of experts, and their specialization shows.

Protective Operations: A Handbook for Security and Law Enforcement

- Author Glenn McGovern introduces the concept of protective operations as a continuum, ranging from situational awareness, at its most basic level, to protective details, safe houses, and new identities, at its increasingly complex levels.

Money Laundering Prevention: Deterring, Detecting, and Resolving Financial Fraud

- Turner accurately and succinctly explains this form of criminal operation.

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Syste

- For those looking to get a handle on how to effectively secure critical infrastructure networks, Industrial Network Security is an excellent reference.

Catastrophic Disaster Planning and Response

- Oliver does an excellent job of covering this topic, providing tips even seasoned professionals can learn from and building the reader’s knowledge base with a historical perspective.

The Quiet Threat: Fighting Industrial Espionage in America

- This second edition updates its treatment of the topic with additions on tradecraft of the industrial spy and data mining of business information.

Emergency Management Exercises: From Response to Recovery

- There is no shortage of books available to help security managers deal comprehensively with creating, conducting, and evaluating emergency exercises. This is the latest to tackle this subject. And it does an excellent job of pulling together the key elements in this area.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.