Site Map - How-to

Money laundering

- The Office of the Comptroller of the Currency (OCC) has issued guidance to financial institutions about when OCC will cite banks for violations or take other enforcement actions against them to prevent money laundering. @ The guidance is available through SM Online.

Nonlethal weapons.

- Restraint systems, pepper-spray dispensers, laser "flashlights," and other weapons are cataloged by the Justice Department.

The Terrorist Threat Mitigation Reference Guide

- Intended for anyone whose duties involve "protection, minimizing risk, hiring employees, security training, manufacturing security technology, integrating security solutions, and mitigating threats," the book gives itself little space, 56 pages, to accomplish all these objectives. Fifteen subject headings carve the text into bite-size offerings, while 66 subheads dice these further into morsels. The result is staccato, with the authors striving to introduce, define, and illustrate one or two concepts per page.

Advanced Interviewing Techniques: Proven Strategies for Law Enforcement, Military, and Security Personnel

- Proper interviewing skills are, of course, crucial to the success of law enforcement and security. Scores of books detail interviewing tactics, many of them providing in-depth explanations on how and why the techniques work. In Advanced Interviewing Techniques, the authors cull the approaches that work best. Drawing from dozens of sources, veteran FBI agents John R. Schafer and Joe Navarro compile the interviewing techniques that have proven effective, without miring the reader in theory and case studies.

Inside the Spam Cartel. By Spammer-X;

- From a technical perspective, the book shows how to determine where a spam e-mail originates and how to read e-mail headers to determine a message's path. Inside the Spam Cartel also explains various phishing scams and how they are propagated. Spam is an enormous irritant, but phishing is so nefarious that it has the potential to disrupt a large sector of the economy.

Network Security Assessment.

- That's where Network Security Assessment comes in. This well-organized book presents the tools and techniques necessary to identify and assess risks in computer networks. A professional security tester who has successfully penetrated many networks, the author explains how to conduct a structured and logical network security assessment.

Security Consulting, Third Edition

- Sennewald divides security consulting into three specialties: security management consulting (covering issues such as organizational change and policy development), forensic consulting (such as analyzing evidence for lawsuits), and security technical or engineering consulting (which includes recommending equipment or hardware). The book explicitly focuses on the first two--Sennewald admits to having no technical experience--but the lessons from the book could apply to all three.

New in Plaintext

- This book is a good place to start. Geier, a consultant and author who is a member of the Wi-Fi Alliance and has served as chairman of the IEEE International Conference on Wireless LAN Implementation, aims the book not at technical staff but at managers. He lays out technical terms and illustrates them with easy-to-understand explanations that are backed up by clear graphics, charts, and photos.

The 39 Steps to IT Security

- The IT Governance Institute (ITGI) has released a downloadable publication to help executives prevent data loss resulting from viruses, hacks, or theft. The paper, aimed at senior executives, offers a host of questions that senior executives need to ask about their company's IT security.

The Very Model of a Modern CSO

- Security professionals are forging a new path to ensure that they can be effective stewards of their companies' assets.

Pickett’s Primer on Explosives.

- Mike Pickett, a veteran firefighter and educator, has produced a primer on explosives, including four videos and a short manual entitled Explosives Identification Guide, Second Edition. The first three videos deal with, respectively, commercial explosives, military ordnance, and bomb threats and searches. The fourth video provides basic information on weapons of mass destruction (WMDs). The accompanying guide complements this material.

Information Security Policies and Procedures: A Practitioner’s Reference. Second Edition

- Part one covers infosec policies and procedures, and part two is an information security reference guide. The journey through both is pleasant, but familiar, somewhat like an afternoon stroll through well-trod terrain. Neither part contains any revelations, but each is well constructed and brims with relevant information that is easy to find.

Disaster and Recovery Planning: A Guide for Facility Managers.

- Specific disasters including fires, bomb threats, and earthquakes receive individual attention. Probably to illustrate the extent and magnitude of disasters, Gustin includes lists of disaster and emergency declarations made in 2002 and 2003 that run for pages, from flooding in Arkansas to typhoons in the Federated States of Micronesia. The author’s good intentions aside, the lists don’t merit that much space.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.