REVIEW: "The Manager's Handbook for Corporate Security", Gerald L. Kovacich/Edward P. Halibozek

Discussion in 'Computer Security' started by Rob Slade, doting grandpa of Ryan and Trevor, Jan 12, 2004.

  1. BKMNHBCS.RVW 20031107

    "The Manager's Handbook for Corporate Security", Gerald L.
    Kovacich/Edward P. Halibozek, 2003, 0-7506-7487-3, U$49.99/C$72.50
    %A Gerald L. Kovacich
    %A Edward P. Halibozek
    %C 225 Wildwood Street, Woburn, MA 01801
    %D 2003
    %G 0-7506-7487-3
    %I Butterworth-Heinemann
    %O U$49.99/C$72.50 800-366-BOOK fax: 800-446-6520
    %P 463 p.
    %T "The Manager's Handbook for Corporate Security"

    The intent that is asserted in the preface is to provide a state-of-
    the-art, holistic, practical, "cut and paste" approach to corporate
    asset protection, using examples from a fictional company.

    Part one, titularly about the old and new world of the security
    professional, provides some historical perspective. Chapter one, "New
    Century, New World," says that it is a big, bad, complex, changing,
    interconnected world out there now. The argument is somewhat
    unconvincing, since the history provided points out that the times
    they always have been a-changin'. A standard view of threat and risk
    is in chapter two. Corporate security and law enforcement, in chapter
    three, is simply a terse history of the military and law enforcement.
    Chapter four is a promotional piece for corporate security

    Part two, on corporate security management, starts taking itself way
    too seriously by coining a new acronym of CSM. Our fictional company
    is created in chapter five. Generic security management roles are
    dressed up in the fictional company clothes in chapter six. The
    corporate security management department that is invented in chapter
    seven assumes a clean slate and a perfect world.

    Part three outlines some security functions. Where many would assume
    that "administrative security" might involve some operational aspects,
    chapter eight concentrates on plans, policies, and procedures.
    Chapter nine's review of physical security is fairly ordinary,
    although it is short on details in areas such as fire protection and
    power provision. The usual debate about outsourcing versus in-house
    security is somewhat biased in favour of outsourcing, in chapter ten.
    Personnel security, in chapter eleven, is limited to background checks
    and workplace violence. Chapter twelve looks at security education.
    Fire protection is given another run in chapter thirteen, which is big
    on procedures but short on detail. Contingency planning, in chapter
    fourteen, is broad but vague. Chapter fifteen's view of
    investigations is heavily influenced by law enforcement and assumes a
    very large staff. Chapter sixteen tells us that dealing with the
    government has--surprise!--special requirements. Information has
    value and requires protection, says chapter seventeen, which also
    generates more new acronyms. Executive protection is examined in more
    than the usual level of detail, in chapter eighteen. Chapter nineteen
    looks at security for events.

    Part four assesses the security profession now and in the future. The
    advice about corporate security career development, in chapter twenty,
    is equally applicable to any profession. (Is this a commentary on the
    lack of distinction of security as a profession?) Chapter twenty one,
    entitled "What you can do to help others," is primarily concerned with
    self-promotion. Vague opining and some reprints of codes of ethics
    makes up chapter twenty two. Chapter twenty three closes the book
    with blue-sky futurism.

    For those completely new to the security profession, this book does
    have some tips, but contains nothing like the practicality of
    Sennewald's "Effective Security Management" (cf. BKEFSCMN.RVW).

    copyright Robert M. Slade, 2003 BKMNHBCS.RVW 20031107


    "If you do buy a computer, don't turn it on." - Richards' 2nd Law
    ============= for back issues:
    [Base URL] site
    or mirror
    CISSP refs: [Base URL]mnbksccd.htm
    Security Dict.: [Base URL]secgloss.htm
    Security Educ.: [Base URL]comseced.htm
    Book reviews: [Base URL]mnbk.htm
    [Base URL]review.htm
    Security Educ.:
    Review mailing list: send mail to
    Rob Slade, doting grandpa of Ryan and Trevor, Jan 12, 2004
    1. Advertisements

  2. (Rob Slade, doting grandpa of Ryan and Trevor)

    >For those completely new to the security profession, this book does
    >have some tips,

    So, you had to find any positive aspect in the end? *smile

    Anyway, I like your reviews.

    "The opinions expressed herein are subject to change without notice"
    Aus dem Copyright-Vermerk einer Studie der Gartner Group
    Email für Non-Spam: Meine_Initialen_bei_arcendo_punkt_com
    Thomas Hertel, Jan 12, 2004
    1. Advertisements

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. Thad

    DP Review Leica Digilux 2 Review

    Thad, May 11, 2004, in forum: Digital Photography
    May 12, 2004
  2. DVD Specials
    DVD Specials
    Nov 16, 2003
  3. Mike McGee
    Mike McGee
    Dec 4, 2003
  4. DVD Verdict
    DVD Verdict
    Dec 20, 2005
  5. Rob Slade, doting grandpa of Ryan and Trevor

    REVIEW: "Byte Wars", Edward Yourdon

    Rob Slade, doting grandpa of Ryan and Trevor, Jan 19, 2004, in forum: Computer Security
    Rob Slade, doting grandpa of Ryan and Trevor
    Jan 19, 2004

Share This Page