Velocity Reviews - Computer Hardware Reviews

Velocity Reviews > Newsgroups > Computing > Computer Security > REVIEW: "The Manager's Handbook for Corporate Security", Gerald L. Kovacich/Edward P. Halibozek

Thread Tools

REVIEW: "The Manager's Handbook for Corporate Security", Gerald L. Kovacich/Edward P. Halibozek

Rob Slade, doting grandpa of Ryan and Trevor
Posts: n/a

"The Manager's Handbook for Corporate Security", Gerald L.
Kovacich/Edward P. Halibozek, 2003, 0-7506-7487-3, U$49.99/C$72.50
%A Gerald L. Kovacich
%A Edward P. Halibozek
%C 225 Wildwood Street, Woburn, MA 01801
%D 2003
%G 0-7506-7487-3
%I Butterworth-Heinemann
%O U$49.99/C$72.50 800-366-BOOK fax: 800-446-6520
%P 463 p.
%T "The Manager's Handbook for Corporate Security"

The intent that is asserted in the preface is to provide a state-of-
the-art, holistic, practical, "cut and paste" approach to corporate
asset protection, using examples from a fictional company.

Part one, titularly about the old and new world of the security
professional, provides some historical perspective. Chapter one, "New
Century, New World," says that it is a big, bad, complex, changing,
interconnected world out there now. The argument is somewhat
unconvincing, since the history provided points out that the times
they always have been a-changin'. A standard view of threat and risk
is in chapter two. Corporate security and law enforcement, in chapter
three, is simply a terse history of the military and law enforcement.
Chapter four is a promotional piece for corporate security

Part two, on corporate security management, starts taking itself way
too seriously by coining a new acronym of CSM. Our fictional company
is created in chapter five. Generic security management roles are
dressed up in the fictional company clothes in chapter six. The
corporate security management department that is invented in chapter
seven assumes a clean slate and a perfect world.

Part three outlines some security functions. Where many would assume
that "administrative security" might involve some operational aspects,
chapter eight concentrates on plans, policies, and procedures.
Chapter nine's review of physical security is fairly ordinary,
although it is short on details in areas such as fire protection and
power provision. The usual debate about outsourcing versus in-house
security is somewhat biased in favour of outsourcing, in chapter ten.
Personnel security, in chapter eleven, is limited to background checks
and workplace violence. Chapter twelve looks at security education.
Fire protection is given another run in chapter thirteen, which is big
on procedures but short on detail. Contingency planning, in chapter
fourteen, is broad but vague. Chapter fifteen's view of
investigations is heavily influenced by law enforcement and assumes a
very large staff. Chapter sixteen tells us that dealing with the
government has--surprise!--special requirements. Information has
value and requires protection, says chapter seventeen, which also
generates more new acronyms. Executive protection is examined in more
than the usual level of detail, in chapter eighteen. Chapter nineteen
looks at security for events.

Part four assesses the security profession now and in the future. The
advice about corporate security career development, in chapter twenty,
is equally applicable to any profession. (Is this a commentary on the
lack of distinction of security as a profession?) Chapter twenty one,
entitled "What you can do to help others," is primarily concerned with
self-promotion. Vague opining and some reprints of codes of ethics
makes up chapter twenty two. Chapter twenty three closes the book
with blue-sky futurism.

For those completely new to the security profession, this book does
have some tips, but contains nothing like the practicality of
Sennewald's "Effective Security Management" (cf. BKEFSCMN.RVW).

copyright Robert M. Slade, 2003 BKMNHBCS.RVW 20031107

====================== Removed) (E-Mail Removed) (E-Mail Removed)
"If you do buy a computer, don't turn it on." - Richards' 2nd Law
============= for back issues:
[Base URL] site
or mirror
CISSP refs: [Base URL]mnbksccd.htm
Security Dict.: [Base URL]secgloss.htm
Security Educ.: [Base URL]comseced.htm
Book reviews: [Base URL]mnbk.htm
[Base URL]review.htm
Security Educ.:
Review mailing list: send mail to (E-Mail Removed)

Reply With Quote
Thomas Hertel
Posts: n/a
(E-Mail Removed) (Rob Slade, doting grandpa of Ryan and Trevor)

>For those completely new to the security profession, this book does
>have some tips,

So, you had to find any positive aspect in the end? *smile

Anyway, I like your reviews.

"The opinions expressed herein are subject to change without notice"
Aus dem Copyright-Vermerk einer Studie der Gartner Group
Email für Non-Spam: Meine_Initialen_bei_arcendo_punkt_com
Reply With Quote

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
New book: SystemVerilog Assertions Handbook vhdlcohen VHDL 0 12-01-2004 06:18 PM
Re: Master Mason Handbook Ted Azito Digital Photography 0 07-18-2004 01:43 AM
XMYSpy Handbook -- A Really Bad Book? OldRover XML 6 05-31-2004 04:26 AM
D70 "Handbook"? Dennis Steinauer Digital Photography 4 05-01-2004 11:12 PM
FA: The XML Handbook Third Edition Ben Yates XML 0 02-10-2004 12:48 PM