INFORMATION

Site Map - Best Practices \ Case Studies

Philippine Security in the Age of Terror: National, Regional, and Global Challenges in the Post-9/11 World

- Philippine security scholar Rommel Banlaoi states that “this book is my humble, yet daring, attempt to discuss Philippine security in the context of national, regional, and global security challenges after 9/11.” He need not be humble, and his daring may lie in the daunting breadth of the work, writes James T. Dunne, CPP.

City Surveillance Success

- The surveillance system launched in Davenport, Iowa, has helped the police as intended, but the city has been surprised by the positive response from both businesses and the public.

Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings

- Glenn P. Govern's Targeted Violence somehow breaks down 900 violent incidents into a readable and easy-to-understand analysis.

Delivering on Diversity's Promise

- Companies can implement policies to prevent hostile work environment claims while also presenting a strong defense if they are charged.

Bridging the Gap

- Illuminators, facial-recognition cameras, and license-plate-capture technology are helping to secure a key border crossing.

Ferreting Out Fakers

- How one lab working with victimized companies analyzes counterfeit goods to find the methods used and the criminals behind the schemes.

State Perspective - Delaware

- Security Management interviews Lewis D. Schiliro, secretary of the Delaware Department of Safety and Homeland Security.   --------------------------------------------------------------------------------

Police Chief 101: Practical Advice for the Law Enforcement Leader

- Ignore the title, this book is a true primer on leadership and executive career survival skills.

The Illusion of Due Diligence: Notes from the CISO Underground

- The Illusion of Due Diligence isn't a security textbook, it's CISO war stories from inside the corporate belly.

Data Breach Preparedness Plan

- An integral, but often overlooked, part of any corporate data security plan is caring for customers after an incident.

SM Archives: The Importance of Behavioral Threat Assessment Teams

- The release of incident reports from Jared L. Loughner's community college demonstrate the importance of identifying people on campus who may pose a threat to themselves or others.

Best Practices

- The American Public Transportation Association, together with the Transportation Security Administration and other sector partners, are developing a growing set of recommended practices to help transportation security managers maximize the effectiveness of their security programs. In addition, the Federal Transit Administration offers a list of 20 action items that reflect the minimum elements of a sound mass transit security program.

A Command Performance

- The Dallas Police Department designs a mobile command unit to meet the city's specific needs.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.