INFORMATION

Site Map - Book Reviews

Bribery and Corruption: Navigating the Global Risks

- Bribery and corruption in international business have been part of national cultures for as long as individuals have traded goods and services. The authors of this book focus on educating business leaders and employees about how to avoid corrupt practices, and they do it very well.

Cargo Theft, Loss Prevention, and Supply Chain Security

- Supply chain security has become headline news, and this book does a good job of describing the multitude of cargo theft challenges that security professionals face today. The first section of the book details the pervasiveness of the problem and its consequences.

Money Laundering: A Guide for Criminal Investigators, Third Edition

- John Madinger, who has extensive experience as an IRS criminal investigator, has written an outstanding introduction to the complex world of money laundering. It includes interesting sections on the history of money and of money laundering along with other forms of financial crime.

Eyewitness Identification: A Police Perspective

- Law enforcement has the responsibility to arrest the guilty person and an obligation to ensure that the wrong person is not convicted of a crime. Eyewitness Identification acknowledges the increasing awareness that eyewitness identification of criminals is unreliable.

Security Questioning 101

- Security Questioning 101 is the latest addition to the catalog of security-related courses offered by Chame­­le­on Associates—a security training and consulting firm. Its motto, Improving Security through Intelligence, certainly comes to life in this course as the student is taught to improve intelligence through effective questioning techniques.

Staying Safe at School, Second Edition

- This is an interesting and important book. It contains a wealth of practical, down-to-earth, sensible, and reliable information about how to keep our children safe at school.

Low Tech Hacking: Street Smarts for Security Professionals

- Security guru Bruce Schneier has observed that incorrectly deployed cryptography is akin to putting a big flagpole in front of your facility and hoping that it will stop any attackers from breaking in. Of course, attackers will simply go around the flagpole rather than running into it.

Endless Enemies

- Raymond Holcomb spent 23 years in the FBI, spanning the era of J. Edgar Hoover through 9-11 and its aftermath. He played a key role in the transformation of the organization’s primary focus from crime-fighting to national security.

Investigations in the Workplace, Second Edition

- Experienced author and security professional, Eugene F. Ferraro, CPP, PCI, has successfully updated his previous work on the subject.

Cybersecurity: Public Sector Threats and Responses

- Author Kim Andreasson provides an over­view of how government agencies and other public-sector groups can use the Internet without introducing unnecessary risks to their constituents.

The (Honest) Truth About Dishonesty: Why We Lie to Everyone, Especially Ourselves

- Easy-to-read and often humorous, Dan Ariely’s The (Honest) Truth About Dishonesty is highly relevant for security managers, notwithstanding its breezy style. Readers will come away with an understanding of the drivers of dishonesty and how to restructure the environment for better security.

DoD Security Clearance and Contracts Guidebook: What Defense Contractors Need to Know About Their Need to Know

- This book describes certain elements of the National Industrial Security Program, which is the government program for the protection of classified information.

Eternal Battle Against Evil

- Author Paul Chabot takes a bold and sweeping look at all the bad things in the world—terrorists, drugs, gangs, even Somali pirates.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.