INFORMATION

Site Map - How-to

The Right Way to Go Wireless

- A favorite hacking target, wireless networks can be secured with the right mix of policy and technical solutions.

Security Clearance Manual: How to Reduce the Time It Takes to Get Your Government Clearance

- Thinking of getting a government job that requires a security clearance? If so, this book is for you.

Learning Bomb-Making Secrets

- A Web portal sponsored by the government provides IED techniques to qualified bomb technicians.

Privacy Handbook: Guidelines, Exposures, Policy Implementation and International Issues

- The authors present a clear explanation of privacy--what it is, to what it may apply, and why it is important. The listing of resources and laws on specific privacy issues is helpful as well, including advocacy groups and organizations that can explain such laws as the USA Patriot Act.

Cybersecurity Operations Handbook.

- The first 19 chapters (and 700 pages) discuss technologies such as firewalls and VPNs. While these are well-written, there is nothing here that hasn't been published before; all of the information is easily accessible via the Internet for free.

Security Planning and Design: A Guide for Architects and Building Design Professionals.

- Well-outlined and comprehensive, the book harnesses the expertise of knowledgeable security veterans. Various authors share their wisdom and experience on environmental and threat considerations, design concepts, protection technologies, and security practices.

Computer Security Sourcebook and Communications Security Sourcebook

- Until just before publication, Computer Security Sourcebook and Communications Security Sourcebook constituted a single work, but they were broken into two books due to the sheer volume of material included. Both books are compilations of previously published material, much if not all of it available free online or in periodical archives at a university library.

PDR Guide to Biological and Chemical Warfare Response

- Largely viewed as a remote risk as recently as a few years ago, chemical and biological attacks have now taken center stage in terrorism prevention and response planning. As with all threats that first enter the public consciousness, there's a lot of misunderstanding about these kinds of attacks. This guide will help. Fifty-one toxic agents are discussed, including signs and symptoms as well as possible treatments.

Quick Bytes: Criminal case files go online

- The Judicial Conference of the United States has released a guide for allowing remote electronic access to criminal case files. This guidance states that if a document would be available to a member of the public at the courthouse, it should be available through the court's electronic access system. It also calls for the redaction of Social Security numbers and other sensitive data, and explains the types of documents--such as arrest warrants and juvenile records--that will not be available electronically. A separate document provides a model rule for compliance. @ Both documents are at SM Online

Criminal case files go online

- The Judicial Conference of the United States has released a guide for allowing remote electronic access to criminal case files. This guidance states that if a document would be available to a member of the public at the courthouse, it should be available through the court's electronic access system. It also calls for the redaction of Social Security numbers and other sensitive data, and explains the types of documents--such as arrest warrants and juvenile records--that will not be available electronically. A separate document provides a model rule for compliance.

The Security Handbook, Second Edition

- This book addresses the issue of providing professional training to security officers and supervisors who seek a career in security. A user-friendly text, it is filled with checklists covering topics such as how to improve job performance and prepare for a job interview.

Control and Security of E-Commerce

- Checklists, though mundane, are a key component of many jobs. They help ensure that key issues aren't overlooked, and they serve as guideposts for anyone auditing the work. This book provides technology managers with a very good preparatory set of details and checklists for their e-commerce infrastructure. The book can also show a corporate auditor what to look for to ensure that appropriate controls are in place.

Google Eyes

- The search engine Google has achieved such ubiquity that it's already become a verb. Who hasn't googled an old friend, high-school flame, or job applicant? But its success has a dark side: It has become a chief source of information for hackers and virus writers who have learned how to use the search engine to dig up information that Web sites did not intend to make public. Johnny Long, a security expert and ethical hacker with Computer Sciences Corporation, recently released The Google Hacker's Guide: Understanding and Defending Against the Google Hacker to instruct the security community in the ways that Google is being used as a hacking tool. A paper by security company Imperva titled Web Application Worms: Myth or Reality? gives this practice another name: war searching.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.