Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Maritime Security: An Introduction (Butterworth-Heinemann Homeland Security) Review

Maritime Security: An Introduction (Butterworth-Heinemann Homeland Security)
Average Reviews:

(More customer reviews)
Are you looking to buy Maritime Security: An Introduction (Butterworth-Heinemann Homeland Security)? Here is the right place to find the great deals. we can offer discounts of up to 90% on Maritime Security: An Introduction (Butterworth-Heinemann Homeland Security). Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Maritime Security: An Introduction (Butterworth-Heinemann Homeland Security) ReviewI have only just received this volume and had a good look at it. As an introductory book on this topic, it is excellent. The text is easy to read and relevant. Some of the pictures are a bit unclear but overall the book is well worth the investment.Maritime Security: An Introduction (Butterworth-Heinemann Homeland Security) Overview

Want to learn more information about Maritime Security: An Introduction (Butterworth-Heinemann Homeland Security)?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition Review

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition
Average Reviews:

(More customer reviews)
Are you looking to buy The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition? Here is the right place to find the great deals. we can offer discounts of up to 90% on The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition ReviewI bought this book as a door prize, where Doug is speaking at our request to local security professional trade groups. Have not read it. It's current and relevant to our field, but ... expensive.The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition Overview

Want to learn more information about The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

CompTIA Security+ SYO-201 Cert Guide Review

CompTIA Security+ SYO-201 Cert Guide
Average Reviews:

(More customer reviews)
Are you looking to buy CompTIA Security+ SYO-201 Cert Guide? Here is the right place to find the great deals. we can offer discounts of up to 90% on CompTIA Security+ SYO-201 Cert Guide. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

CompTIA Security+ SYO-201 Cert Guide ReviewWhat an "easy to read" CompTIA Security+ SYO-201 book. I bought the new book on Friday 12/10/10. Read the book cover to cover on Saturday, Sunday and Monday. And I passed my exam today 12/14/10 with an 884 out of 900.
I highly recommend this book to anyone who wants to pass the current Security+ 2008 exam. BTW I didn't use any other material to study except reading this book, answering the questions at the end of each chapter and the practices test at the end of the book and watching the videos on the DVD that comes with the book.
I'm sure everyone will think that I'm going a bit overboard. But I never thought I could pass this test after only 3 days of studying!
I hope this book helps you as much as it helped me.CompTIA Security+ SYO-201 Cert Guide Overview

Want to learn more information about CompTIA Security+ SYO-201 Cert Guide?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Terrorism on American Soil: A Concise History of Plots and Perpetrators from the Famous to the Forgotten Review

Terrorism on American Soil: A Concise History of Plots and Perpetrators from the Famous to the Forgotten
Average Reviews:

(More customer reviews)
Are you looking to buy Terrorism on American Soil: A Concise History of Plots and Perpetrators from the Famous to the Forgotten? Here is the right place to find the great deals. we can offer discounts of up to 90% on Terrorism on American Soil: A Concise History of Plots and Perpetrators from the Famous to the Forgotten. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Terrorism on American Soil: A Concise History of Plots and Perpetrators from the Famous to the Forgotten ReviewDeftly chronicling over three dozen cases from the 1865 assassination of Abraham Lincoln to the anthrax mail attacks that rocked the nation in 2001, this unique book places "9-11" and the modern threat of terrorism in appropriate historical and cultural perspective. A compelling and fascinating blend of history and psychology, Terrorism on American Soil is a must-read for anyone interested in understanding the historical antecedents and causes of the terror threat America faces today. McCann's thorough, lucid and exceptionally well-reasoned historical analysis of terrorism in the United States gives new and urgent meaning to the old adage that those ignorant of history are doomed to repeat it.Terrorism on American Soil: A Concise History of Plots and Perpetrators from the Famous to the Forgotten Overview

Want to learn more information about Terrorism on American Soil: A Concise History of Plots and Perpetrators from the Famous to the Forgotten?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Strategic Security Management: A Risk Assessment Guide for Decision Makers Review

Strategic Security Management: A Risk Assessment Guide for Decision Makers
Average Reviews:

(More customer reviews)
Are you looking to buy Strategic Security Management: A Risk Assessment Guide for Decision Makers? Here is the right place to find the great deals. we can offer discounts of up to 90% on Strategic Security Management: A Risk Assessment Guide for Decision Makers. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Strategic Security Management: A Risk Assessment Guide for Decision Makers ReviewThe author delivers in depth analysis, provacative scenarios and practical applications useful for any security student or security professional. The book incorporates original ideas from the author as well as key contributions from other professionals in the field. Highly recommended.Strategic Security Management: A Risk Assessment Guide for Decision Makers Overview

Want to learn more information about Strategic Security Management: A Risk Assessment Guide for Decision Makers?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments Review

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments
Average Reviews:

(More customer reviews)
Are you looking to buy The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments? Here is the right place to find the great deals. we can offer discounts of up to 90% on The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments ReviewI manage information risks for a large organization on a professional basis and this is one of the best books I have read on this important topic. What I found most useful about this book is that it complements rather than competes with formal risk management methods. This book explains techniques and methods that you can use to enhance your existing risk assessment process like data gathering, impact analysis, evaluations and so on. This book should belong on every risk managers bookshelf.The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments Overview

Want to learn more information about The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD Review

Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
Average Reviews:

(More customer reviews)
Are you looking to buy Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD? Here is the right place to find the great deals. we can offer discounts of up to 90% on Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD ReviewI have just finished a marathon session of reading "Stealing the Network: The Complete Series Collector's Edition" and I have a very conditional review of it: It's a must-have if you don't already own the previous editions of these guilty pleasures. If you are already a fan, however, prepare to be let-down by the compilation.
The stories of the Stealing the Network series entertain in the same way that "war stories" from fellow hackers and security professionals often keeps a more intimate audience's interest: by mixing intriguing situations with juicy technical detail that can serve as a useful take-away. No one will accuse these books of containing fine literature, but that's not really the point. The stories are well written enough to keep you wanting to know what will happen next, while the technical information is as accurate as you're likely to see in fiction. Segments involving hacking are written and illustrated with enough attention to detail and length to serve as introductory educational tutorials for the topics (including web application hacking, reverse engineering, and wireless security). Most of these scenarios are believable as parts of larger-scale operations.
The first book of the series consists of independent short-stories based around characters of the authors' creation. The other three books in the compilation tell an over-arching story of a larger "operation", which involves many characters and their independent stories. The second book, "How to Own a Continent", is probably my favorite, along with the first ("How to Own a Box"), for keeping things simple, technical, and focusing on the individual stories. The third book, "How to Own an Identity" suffers from having worse editing then the rest of the series, and may lose some readers' interest. The fourth book ("How to Own a Shadow") reads a lot better, and wraps the overall story up well, however it focuses only on a relative handful of the series' characters.
As a compilation, this Collector's Edition leaves much to be desired. While the original description for this edition described the books contained within as being "author-annotated", this is not the case. The individual books are reproduced exactly as they were in their original editions, with no additional commentary from the authors, and with all the same problems as the originals. For example, screenshots in the first chapter of the first book are the same illegible black squares that were in the original edition of the book published 7 years ago. The annotations along with other features described in the original description (emails, photographs) that would provide a lot of interesting background material, would have made this compilation a must-buy.
The extra content that you are receiving is a brief new forward by Jeff Moss, and a "Final Chapter" by Ryan Russell. The new chapter is about 20 pages long, and gives the story-line a proper ending. I won't ruin anything about it, but I will say that I enjoyed it. Syngress has promised in the description of the book to make this content available separately in electronic form in six months.
The included DVD is described on the back-cover copy as being "full" of behind-the-scenes stories. In reality, you will only find 20 minutes of interviews with a few of the authors. I enjoyed these interviews, however, much like the print companion, I felt like more should have been done. Also beware that there are problems with the audio on the DVD. When played on my MacBook, there was noticeable crackling/popping in the audio of the DVD. The same noise was present, but less noticeable when played through a stand-alone DVD player through a television.
To summarize, I like the books, and find them as entertaining as I did when they were originally published, and I like the new hardcover binding. I do think that it is unfortunate that the "Stealing the Network: The Complete Series Collector's Edition" does not meet its potential to be more than the sum of its parts. There seems to have been intent at some point to add value to the set, but it wound up simply being a rough concatenation of the individual books.
If you haven't read these books, then I very much recommend picking up this set. It's 1,000 pages of interesting stories and technical material. If you already have the previous editions of the Stealing the Network Series, however, you might find it hard to justify paying for them again.Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD Overview

Want to learn more information about Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

High-Rise Security and Fire Life Safety Review

High-Rise Security and Fire Life Safety
Average Reviews:

(More customer reviews)
Are you looking to buy High-Rise Security and Fire Life Safety? Here is the right place to find the great deals. we can offer discounts of up to 90% on High-Rise Security and Fire Life Safety. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

High-Rise Security and Fire Life Safety Reviewfor investors, managers, and inspectors of tall buildings, this is an exceptionally useful book. Mr. Graighead combines his Australian roots and his California experience in a clear guide to fire safety and security management of these "vertical villages." I have quoted from this work in forums around the world, and have made this book a special present for colleagues in the fire service and architecture and "authorities having jurisdiction." It is a how- to and why guide to active systems. I recommend it highly. And, given that so many skyscrapers are now being built in Asia and in Latin America, I hope this is translated into Chinese, Korean, Spanish and Portuguese. - Richard A. "Nick" Candee, Executive Director, Global Operations, NFPA InternationalHigh-Rise Security and Fire Life Safety Overview

Want to learn more information about High-Rise Security and Fire Life Safety?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Introduction to Homeland Security, Second Edition (Butterworth-Heinemann Homeland Security) Review

Introduction to Homeland Security, Second Edition (Butterworth-Heinemann Homeland Security)
Average Reviews:

(More customer reviews)
Are you looking to buy Introduction to Homeland Security, Second Edition (Butterworth-Heinemann Homeland Security)? Here is the right place to find the great deals. we can offer discounts of up to 90% on Introduction to Homeland Security, Second Edition (Butterworth-Heinemann Homeland Security). Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Introduction to Homeland Security, Second Edition (Butterworth-Heinemann Homeland Security) ReviewThis is one of the first generation texts on homeland security. As such, it has a somewhat ad hoc feel to it, as though these (and other) authors are feeling out just what a text on homeland security is all about. The purpose of the book is described on page xiv: "The intent of this book is to provide a primer on homeland security for emergency managers, students of emergency management, and for the countless public and private sector individuals who find themselves suddenly thrust into the ever-expanding domain of homeland security."
The scope of the book is wide, as it covers a lot of territory. One necessary consequence of this is that coverage of individual topics can be a bit thin. On the other hand, the breadth of coverage is itself a virtue. One must trade off a bit of depth for breadth.
The book begins with a discussion of an historic overview of terrorist threats. As such, it does "set the table" for the rest of the book. However, there is actually very little on terrorists, their tactics, etc. Thus, the chapter seems to be written in something of a contextual vacuum. At some point in the volume, there should probably be a chapter on what we know about terrorists.
The book also explores the statutory and organizational infrastructure for homeland security. The resulting chapters are serviceable. Chapters proceed with coverage of safety and security; mitigation, prevention, and preparedness; response and recovery; communications; technology. The final chapter is forward looking, exploring the future of homeland security; it also considers the lessons learned from the reorganization of FEMA under the Department of Homeland Security.
Thus, while there is a "generic" sense to this book, it covers a great deal of territory and provides a broad-based introduction to the subject of homeland security. As such, a useful volume.
Introduction to Homeland Security, Second Edition (Butterworth-Heinemann Homeland Security) Overview

Want to learn more information about Introduction to Homeland Security, Second Edition (Butterworth-Heinemann Homeland Security)?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Introduction to Executive Protection: Second Edition Review

Introduction to Executive Protection: Second Edition
Average Reviews:

(More customer reviews)
Are you looking to buy Introduction to Executive Protection: Second Edition? Here is the right place to find the great deals. we can offer discounts of up to 90% on Introduction to Executive Protection: Second Edition. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Introduction to Executive Protection: Second Edition Reviewvery easy to understand, quick references as you need them you will know if your cut out for this type of work highly recomend it i hate reading but read this cover to cover always going back to chapters of interest.Introduction to Executive Protection: Second Edition Overview

Want to learn more information about Introduction to Executive Protection: Second Edition?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Introduction to Private Security Review

Introduction to Private Security
Average Reviews:

(More customer reviews)
Are you looking to buy Introduction to Private Security? Here is the right place to find the great deals. we can offer discounts of up to 90% on Introduction to Private Security. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Introduction to Private Security ReviewGreat book for basic security concepts. Some sections (electronics/internet, etc) are outdated, but the book is still very helpful.Introduction to Private Security Overview

Want to learn more information about Introduction to Private Security?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

SSCP Systems Security Certified Practitioner All-in-One Exam Guide Review

SSCP Systems Security Certified Practitioner All-in-One Exam Guide
Average Reviews:

(More customer reviews)
Are you looking to buy SSCP Systems Security Certified Practitioner All-in-One Exam Guide? Here is the right place to find the great deals. we can offer discounts of up to 90% on SSCP Systems Security Certified Practitioner All-in-One Exam Guide. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

SSCP Systems Security Certified Practitioner All-in-One Exam Guide ReviewPursuing the SSCP has been daunting, to say the least. With a few other security certs under my belt, but not a lot of hands-on experience in the field, I was looking forward to gaining the SSCP to get a push into a security analyst/engineer position. Darril's SSCP study guide was exactly what I was waiting for, since all the other SSCP books out there are pretty bland. This topic can be bland at times though, we all know that, yet still Darril has a way of bringing things to life what seem dead and boring on surface.
PDF version is superb, and I usually use that one on the go and the paperback stays at home.
SSCP Systems Security Certified Practitioner All-in-One Exam Guide Overview

Want to learn more information about SSCP Systems Security Certified Practitioner All-in-One Exam Guide?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems Review

Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems
Average Reviews:

(More customer reviews)
Are you looking to buy Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems? Here is the right place to find the great deals. we can offer discounts of up to 90% on Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems ReviewBy Jeffrey W. Bennett, ISP, author of ISP Certification-The Industrial Security Professional Exam Manual and
Insider's Guide to Security Clearances
This book goes into great detail about security systems without being too simplified. My security background until recently had been in safeguarding information on a team of 22 security professionals. Recently I took a new job as the head of corporate security and had to develop new security systems. Of course I hired professionals to bid on the job, but I lacked experience to really understand what I needed. I consulted some colleagues and of course went to ASIS international for recommendations.
In the process, I was pleased to have discovered Physical Security Systems Handbook. It really helped me to work with the vendors to help them understand what I needed and better understand what they recommended. This book does an excellent job of breaking down the components of the security system (ie. strike plates, crash bars, cameras, alarms and etc). It also goes into great detail to show you how to survey existing sytems and improve them. In my case, we had to start from scratch and this book helped me through the process.
If you have had similar experiences or are looking for study material for the CPP, ISP or other certifications, get this book.Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems Overview

Want to learn more information about Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Defeating the Hacker: A non-technical guide to computer security Review

Defeating the Hacker: A non-technical guide to computer security
Average Reviews:

(More customer reviews)
Are you looking to buy Defeating the Hacker: A non-technical guide to computer security? Here is the right place to find the great deals. we can offer discounts of up to 90% on Defeating the Hacker: A non-technical guide to computer security. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Defeating the Hacker: A non-technical guide to computer security ReviewHave you ever wished for a security book that covers nearly all the potential security risks one can face with computers, but without going into mind-numbing detail on it all? Robert Schifreen does a pretty good job of that in his book Defeating the Hacker : A nontechnical guide to computer security.
Contents: Introduction; A Hacker is Made; Preparation and Planning; International Laws and Standards; Passwords and Beyond; Your Information Security Policy; Security Awareness Training; Patch Management; Windows Workstation Security; Basic Server Security; Understanding Firewalls; Protecting Your Website; Wireless Networking; Penetration Testing; Security Through Obscurity; Windows Vista; Email; The Curse of Spam; Viruses; Spyware, Adware and Rogue Dialers; Piracy; File Sharing and 'P2P'; Backups and Archives; Preventing Internet Misuse; Document Security; Data Theft; Encryption; Employees' Own Computers; How Hackers Use Search Engines; Denial of Service Attacks; Provisioning and Identity Management; Data Interception; Out of the Office; Social Engineering; E-Commerce Fraud; Intrusion Detection Systems; Outsourcing; Securing your Premises; Forensics; Planning for the Worst; Hardware Theft; Let's Be Careful Out There; Index
As you can see from the table of contents, Schifreen covers quite a bit of ground. Each chapter is relatively short (7 to 10 pages) and covers the subject from a conceptual and practical view. It's more along the lines of "here's a problem, here's how it affects you, and here's what you need to do to address it in your organization." Schifreen was an active hacker who has turned "white hat", so it's not like all this is just theoretical material that he's not actually experienced. He's done a lot (most?) of this stuff at one time or another, so he knows of what he speaks. It's also somewhat unique in that it views things from a distinctly English viewpoint. Since he lives in Great Britain, his writing and choice of words are a little unusual to an American. For instance, taking something to the dump is referred to as the "tip". Prices are stated in pounds, and many of the examples are located in various places in Europe. This particular slant will probably be welcomed by those who are tired of authors who assume that the United States is where all IT takes place.
The only real issue I have with the book is the stated target audience. It is indeed a nontechnical guide to IT security, and much of the emphasis is on protecting your organization. I'm not sure how much value an organization would get out of this unless you're a small shop who really hasn't thought much about your computer(s). For a large organization, there's not enough here to allow you to implement solutions completely (from a technical perspective), and you probably already have techno-geeks that do that. For the small shop, this would open your eyes to potential problems, but again there might not be enough to allow the non-techy user to properly implement AND maintain their security. Still, if the reader is someone who really hasn't thought much about computer security beyond the occasional virus scan, this book will open their eyes.
Good book, and surprisingly readable given the amount of material covered. Just don't go into it thinking that this single book will make your company hack-proof and turn you into a security expert...Defeating the Hacker: A non-technical guide to computer security Overview

Want to learn more information about Defeating the Hacker: A non-technical guide to computer security?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Hacking the Human Review

Hacking the Human
Average Reviews:

(More customer reviews)
Are you looking to buy Hacking the Human? Here is the right place to find the great deals. we can offer discounts of up to 90% on Hacking the Human. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Hacking the Human ReviewI enjoyed reading this book far more than I had anticipated, it is a thriller and an amazing window into the humans psyche.
Hacking the Human is a book about Social Engineering Techniques and Security Countermeasures. It should be a must read to all Physical security management, and Information security professionals, I always thought it would be really hard to map the ISO27002 controls with Social Engineering and yet the entire book is written around the ISO27001 standards this alone is worth the price (little high) of the book.
The book is divided into 3 sections
.- The Risks
.- Understanding Human Vulnerabilities
.- Countermeasures
I wish I could tell you which section or what chapter is important so you don't have to read the whole thing, but I couldn't they are all equally important. Except for some deviations away from information security topics the entire book is like a Symphony by Mozart; Mozart's question sums it all up "Which few did you have in mind, Majesty? " when told by Emperor Joseph II "Your work is ingenious. It's quality work. And there are simply too many notes, that's all. Just cut a few and it will be perfect."
You may say "....but I have read The Art of Deception by Kevin D. Mitnick (and William L. Simon)" which was a great book and also a must read to further learn the human behavior, however in comparison to the Hacking the Human they are totally different. Kevin does not dwell on standards simply concentrates on the brain's vulnerabilities, Ian on the other hand wrote the book as a manual for an existing Information Security Management System, he is even almost apologetic for headlining risks identified "which may not be fully ISO 27001 compliant risk assessment" as seen in chapter 12 - Testing.
I seriously recommend this book as a great Information Security learning tool. Can also come in handy for Poker players.
Best Fishes and thank you for reading.
Hacking the Human Overview

Want to learn more information about Hacking the Human?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

The Workplace Violence Prevention Handbook Review

The Workplace Violence Prevention Handbook
Average Reviews:

(More customer reviews)
Are you looking to buy The Workplace Violence Prevention Handbook? Here is the right place to find the great deals. we can offer discounts of up to 90% on The Workplace Violence Prevention Handbook. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

The Workplace Violence Prevention Handbook ReviewI found the book arranged in good logical order and to be very useful as a reference while putting together a training program on the topic of "Violence in the Workplace." I also found it full of good statistics and references that I could look up for additional data.The Workplace Violence Prevention Handbook Overview

Want to learn more information about The Workplace Violence Prevention Handbook?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Encyclopedia of Security Management, Second Edition Review

Encyclopedia of Security Management, Second Edition
Average Reviews:

(More customer reviews)
Are you looking to buy Encyclopedia of Security Management, Second Edition? Here is the right place to find the great deals. we can offer discounts of up to 90% on Encyclopedia of Security Management, Second Edition. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Encyclopedia of Security Management, Second Edition ReviewEncyclopedia of Security Management, Second Edition is a must have for any security manager or anyone aspiring to be in security management. It touches on every topic relevant to the industry.Encyclopedia of Security Management, Second Edition Overview

Want to learn more information about Encyclopedia of Security Management, Second Edition?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Digital Evidence and Computer Crime, Third Edition: Forensic Science, Computers, and the Internet Review

Digital Evidence and Computer Crime, Third Edition: Forensic Science, Computers, and the Internet
Average Reviews:

(More customer reviews)
Are you looking to buy Digital Evidence and Computer Crime, Third Edition: Forensic Science, Computers, and the Internet? Here is the right place to find the great deals. we can offer discounts of up to 90% on Digital Evidence and Computer Crime, Third Edition: Forensic Science, Computers, and the Internet. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Digital Evidence and Computer Crime, Third Edition: Forensic Science, Computers, and the Internet ReviewWhen it comes to a physical crime scene and the resulting forensics, investigators can ascertain that a crime took place and gather the necessary evidence. When it comes to digital crime, the evidence is often at the byte level, deep in the magnetics of digital media, initially invisible from the human eye. That is just one of the challenges of digital forensics, where it is easy to destroy crucial evidence, and often difficult to preserve correctly.
For those looking for an authoritative guide, Digital Evidence and Computer Crime is an invaluable book that can be used to ensure that any digital investigation is done in a formal manner, that can ultimately be used to determine what happened, and if needed, used as evidence in court.
Written by Eoghan Casey, a leader in the field of digital forensics, in collaboration with 10 other experts, the book's 24 chapters and nearly 800 pages provide an all-encompassing reference. Every relevant topic in digital forensics is dealt with in this extraordinary book. Its breadth makes it relevant to an extremely large reading audience: system and security administrators, incident responders, forensic analysts, law enforcement, lawyers and more.
In the introduction, Casey writes that one of the challenges of digital forensics is that the fundamental aspects of the field are still in development. Be it the terminology, tools, definitions, standards, ethics and more, there is a lot of debate amongst professionals about these areas. One of the book's goals is to assist the reader in tackling these areas and to advance the field. To that end, it achieves its goals and more.
Chapter 1 is appropriately titled Foundation of Digital Forensics, and provides a fantastic overview and introduction to the topic. Two of the superlative features in the book are the hundreds of case examples and practitioners' tips. The book magnificently integrates the theoretical aspects of forensics with real-world examples to make it an extremely decipherable guide.
Casey notes that one of the most important advances in the history of digital forensics took place in 2008 when the American Academy of Forensic Sciences created a new section devoted to digital and multimedia sciences. That development advanced digital forensics as a scientific discipline and provided a common ground for the varied members of the forensic science community to share knowledge and address current challenges.
In chapter 3 - Digital Evidence in the Courtroom - Casey notes that the most common mistake that prevents digital evidence from being admitted in court is that it is obtained without authorization. Generally, a warrant is required to search and seize evidence. This and other chapters go into detail on how to ensure that evidence gathered is ultimately usable in court.
Chapter 6 - Conducting Digital Investigations - is one of the best chapters in the book. Much of this chapter details how to apply the scientific method to digital investigations. The chapter is especially rich with tips and examples, which are crucial, for if an investigation is not conducted in a formal and consistent manner, a defense attorney will attempt to get the evidence dismissed.
Chapter 6 and other chapters reference the Association of Chief Police Officer's Good Practice Guide for Computer-Based Electronic Evidence as one of the most mature and practical documents to use when handling digital crime scenes. The focus of the guide is to help digital investigators handle the most common forms of digital evidence, including desktops, laptops and mobile devices.
The Good Practice Guide is important in that digital evidence comes in many forms, including audit trails, application, badge reader and ISP and IDS logs, biometric data, application metadata, and much more. The investigator needs to understand how all of these work and interoperate to ensure that they are collecting and interpreting the evidence correctly.
Chapter 9 - Modus Operandi - by Brent Turvey is a fascinating overview of how and why criminals commit crimes. He writes that while technologies and tools change, the underlying psychological needs and motives of the offenders and their associated criminal behavior has not changed through the ages.
Chapter 10 - Violent Crime and Digital Evidence - is another extremely fascinating and insightful chapter. Casey writes that whatever the circumstances of a violent crime, information is key to determining and thereby understanding the victim-offender relationship, and to developing an ongoing investigative strategy. Any details gleaned from digital evidence can be important, and digital investigators must develop the ability to prioritize what can be overwhelming amounts of evidence.
Chapter 13 - Forensic Preservation of Volatile Data - deals with the age-old forensic issue: to shut down or not to shut down? It provides a highly detailed sample volatile data preservation process for an investigator to follow to preserve volatile data from a system. There is also a fascinating section on the parallels between arson and digital intrusion investigations.
Part 4 of the book is Computers, in which the authors note that although digital investigators can use sophisticated software to recover deleted files and perform advanced analysis of computer hard drives, it is important for them to understand what is happening behind the scenes. A lack of understanding of how computers function and the processes that sophisticated tools have automated make it more difficult for digital investigators to explain their findings in court and can lead to incorrect interpretations of digital evidence.
Chapter 17 - File Systems - has an interesting section on dates and times. Given the importance of dates and times when investigating computer-related crimes, investigators need an understanding of how these values are stored and converted. The chapter has a table of the date-time stamp behavior on both FAT and NTFS file systems. Time stamps are not a trivial issue, as there are many different actions involved (file moved, deletion, copy, etc.) that can affect the date-time stamp in very different ways.
A better title for Digital Evidence and Computer Crime might be the Comprehensive Guide to Everything You Need to Know About Digital Forensics. One is hard pressed to find another book overflowing with so many valuable details and real-world examples.
The book is also relevant for those who are new to the field, as it provides a significant amount of introductory material that delivers a broad overview to the core areas of digital forensics.
The book progresses to more advanced and cutting-edge topics, including sections on various operating systems, from Windows and Unix to Macintosh.
This is the third edition of the book and completely upda#ted and reedited. When it comes to digital forensics, this is the reference guide that all books on the topic will be measured against.
With a list price of $70.00, this book is an incredible bargain given the depth and breadth of topics discussed, with each chapter written by an expert in the field. For those truly serious about digital forensics, Digital Evidence and Computer Crime is an equally serious book.
Digital Evidence and Computer Crime, Third Edition: Forensic Science, Computers, and the Internet Overview

Want to learn more information about Digital Evidence and Computer Crime, Third Edition: Forensic Science, Computers, and the Internet?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Retail Crime, Security, and Loss Prevention: An Encyclopedic Reference Review

Retail Crime, Security, and Loss Prevention: An Encyclopedic Reference
Average Reviews:

(More customer reviews)
Are you looking to buy Retail Crime, Security, and Loss Prevention: An Encyclopedic Reference? Here is the right place to find the great deals. we can offer discounts of up to 90% on Retail Crime, Security, and Loss Prevention: An Encyclopedic Reference. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Retail Crime, Security, and Loss Prevention: An Encyclopedic Reference ReviewThis work of Mr. Sennewald and Mr. Christman has surpassed anything yet published
on Loss Prevention and Retail Security. Every Security/LossPrevention professional should own a copy, and, where possible, provide a copy for each store Security Department. A much needed addition to any retail security professional's library.
Don WagnerRetail Crime, Security, and Loss Prevention: An Encyclopedic Reference Overview

Want to learn more information about Retail Crime, Security, and Loss Prevention: An Encyclopedic Reference?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Contemporary Security Management, Third Edition Review

Contemporary Security Management, Third Edition
Average Reviews:

(More customer reviews)
Are you looking to buy Contemporary Security Management, Third Edition? Here is the right place to find the great deals. we can offer discounts of up to 90% on Contemporary Security Management, Third Edition. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Contemporary Security Management, Third Edition ReviewThe main word to notice in the title of "Contemporary Security Management" by John J. Fay is the word management. This is a college type textbook for those in security management. Please take this into consideration if you are thinking this is either a book on security, or a popular type management book. It does not fit those categories. Therefore, if that is what you are looking for, you will need to look elsewhere. However, if you are studying to be employed in security management, are enrolled in a class that is using this text, or happen to want a college style textbook on the topic for self-study because you are employed in such a position, this is a very detailed and good book on the topic.
Many large organizations, and now even smaller ones, have a security department. This text teaches security professionals how to operate an efficient security department and how to collaborate smoothly with other groups inside and outside their own organization. The book provides a comprehensive introduction to security and IT security management principles, which overlap with other management principles. So this is a management text aimed at the Chief Security Officer or others in positions in the security industry that aim for management.
Like many college textbooks, each chapter starts with a brief section on what you will learn, and ends with review questions and references. There are ample side bars, check lists, and graphs throughout. The book's four hundred and fifty pages are divided into twenty-five chapters. These include: Historical Roots, Organizing, Managing People, Leadership and Management Skills, Strategy, Budget Management, Managing Change, Making Decisions, Managing Risks, Managing Guard Operations, Managing Physical Security, Managing Access Control, Managing Investigations, Pre-Employment Screening, Emergency Management, Business Continuity, Managing Information Security, Substance Abuse, Executive Protection, Workplace Violence, Employee Awareness Program, Vulnerability Assessment, Security Program Design, Critical Infrastructures and Key Resources, and The Terrorist Threat. The book also contains an Index at the end.
If you are not a professional actively working in such a position, needing guidance, or if you are not in a class where this book is required, you may find the reading a bit tedious, like many management text books. (I read quite a few getting my undergraduate degree in Business Administration with a management emphasis.) And a lot of the management principles, such as hiring people and dealing with budgets are universal, not just to security management, so don't get this book thinking it is all about security.
Bottom line, if you are in the security management field, or want to enter that field, this is a comprehensive textbook on the topic. There is a lot of useful information in this single volume, and it will be very valuable for those working in such management positions.
Reviewed by Alain Burrese, J.D., author of Hard-Won Wisdom From the School of Hard Knocks.Contemporary Security Management, Third Edition Overview

Want to learn more information about Contemporary Security Management, Third Edition?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...