INFORMATION

Site Map - Book Reviews

European Security in NATO's Shadow: Party Ideologies and Institution Building

- Author Stephanie Hofmann offers a fresh look at European party ideologies that make a difference depending on one’s perspective on global issues.

Convergence: Illicit Networks and National Security in the Age of Globalization

- The current problem of networked transnational organized crime and the continued threat it poses to global stability are carefully outlined in this book.

Cyber Crime, Security and Digital Intelligence

- This original and creative book describes the risks to data and systems—from inside jobs to complex external attacks—and presents some defensive strategies.  

Take Down: Inside the Hunt for Al Qaeda

- Primarily the book focuses on events after 9-11 including the development of the CIA’s Threat Matrix, which brings current threats into an understandable form for analysis.

Handbook of SCADA/Control Systems Security

- This book represents a comprehensive overview of SCADA and control system security issues and analysis.

Crime Prevention Through Environmental Design, Third Edition

- This book touches on most of the areas security professionals handle every day: schools, parking lots, airports, housing areas, banks, and service locations are likely candidates for criminal activity.

Industrial Espionage: Developing a Counterespionage Program

- This book is intended to supply guidelines for establishing a program to prevent and thwart threats against proprietary information and assets.

Crime Lab Manual

- This manual is a step-by-step guide on how to process the scene of an investigation and solve a crime.

The New Digital Age: Reshaping the Future of People, Nations and Business

- Amid the sea of information technology and computer books destined to line the shelves of security professionals, this one is uniquely crafted to aid truly long-term planning.

Foundations of Psychological Profiling: Terrorism, Espionage, and Deception

- The disclosures this past year of the National Security Agency’s massive data mining of telephone calls and Internet activity of individuals is yet another example of the “hot” nature of the issue of profiling.

Eavesdropping Surveillance & Espionage: Threats, Techniques & Counter-Measures

- The overarching message of Eavesdropping Surveillance & Espionage is that security professionals must “grasp the serious nature of these threats and understand available counter-measures.”

Countering Fraud

- All companies are affected by fraud. It’s a disease that can cripple or even collapse a company no matter its size.

Emergency Planning Guide for Utilities

- A toolbox book, Emergency Planning Guide for Utilities is a practical, detailed, and sequential guide to building and testing emergency response plans.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.