INFORMATION

Site Map - How-to

Dogs and Detection

- Guidelines have been proposed pertaining to how explosives-detection dogs should be trained and certified, among other issues. There’s still time to comment on the drafts.

Preventing Identity Theft in Your Business: How to Protect Your Business, Customers, and Employees

- Despite widespread attention, identity theft and identity crimes continue to flourish. Judith M. Collins, an expert in ID theft in the business world, asserts that it is both the employer’s responsibility and a good business practice to protect staff and client personal information. This book attempts to be a guide for helping managers and employers to protect these assets.

New in Plaintext

- Browse the bookstore for a beginner’s text on computers and it’s easy to come away feeling digitally inadequate. Titles that refer to the reader as a “dummy” or worse seem to be the only ones that, with wit and easy-to-understand language, can make technology accessible to the average reader.

Quick Bytes: Text on Net annoyances

- Need to know everything there is to know about Web-based dangers and annoyances? Looking for a one-stop shop for the tips and tools that will prevent spam from hitting your computer or spyware from taking it over? Point your browser to a free online text by Dan Sullivan called The Definitive Guide to Controlling Malware, Spyware, Phishing, and Spam.

Quick Bytes: The chemistry of security

- The American Chemistry Council’s Chemical Information Technology Council has released a guidance document “to educate and inform member companies, customers and the public” about cybersecurity concerns.

Quick Bytes: Text on Net annoyances

- Need to know everything there is to know about Web-based dangers and annoyances? Looking for a one-stop shop for the tips and tools that will prevent spam from hitting your computer or spyware from taking it over? Point your browser to a free online text by Dan Sullivan called The Definitive Guide to Controlling Malware, Spyware, Phishing, and Spam.

Safe Internet Practices

- NIST has issued a number of new draft guides containing recommendations on various aspects of Internet security, including e-mail and Web applications.

Cyberthreats at Chemical Plants

- A new guide from the chemical industry informs companies about cybersecurity concerns.

Court Threat

- The Justice Department’s Bureau of Justice Assistance bulletin outlines a ten-step threat management process.

Effective Interviewing and Interrogation Techniques, Second Edition

- This is a “toolbox” book about detecting deception. It clearly and logically explains how to prepare for, structure, and conduct interviews and interrogations using the FAINT model.

New in Plaintext

- Nancy Flynn, in her new book Blog Rules: A Business Guide to Managing Policy, Public Relations, and Legal Issues, doesn’t waste time in getting to the statistics.

Check Fraud

- The FBI gives tips for how governmental agencies and organizations can avoid a check fraud scam that targets expired checks.

A Guide to the 2006 ASIS Exhibits

- Check out the exhibitors at the ASIS International 52nd Annual Seminar & Exhibits.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.