Library Holdings

  • Explore some of our Guarini library holdings:

    For more information try searching OSCAR with by these relevant subject terms: corporations security measures, cryptography, data protection, facility management, electronic intelligence, emergency management, espionage, intelligence service, jihad, military intelligence, spies, and terrorism.

    Information Assurance/Cyber Security:

    .NET security
    Publisher: Apress;
    Publication Date: 2002
    Annotation: When you use .NET to create client-and server-side applications, you have to address a new and large set of security issues.,NET Security shows you what you need to know by covering different aspects of the .NET security mode...
    Call Number: HF5548.32 .N478 2002

    Assessing and managing security risk in IT systems : a structured methodology
    Authors(s): McCumber, John, 1956-
    Publisher: Auerbach Publications
    Publication Date: 2005
    Annotation: The information security implementation and assessment methodology presented in this work is applicable to any system and is not affected by the rapid technological change that characterizes information technology, argues the...
    Call Number: QA76.9 .A25 M4284 2005

    Best truth : intelligence and security in the Information Age
    Authors(s): Berkowitz, Bruce D., 1956-
    Publisher: Yale University Press
    Publication Date: 2000
    Annotation: Bruce D. Berkowitz and Allan E. Goodman call for fundamental, radical reforms in the organization and approach of Americas intelligence agencies. They show why traditional approaches to intelligence fall short today, and they...
    Call Number: QA76.9.A25 B48 2000

    Brute force: cracking the data encryption standard
    Authors(s): Curtin, Matt.
    Publisher: Copernicus Books
    Publication Date: 2005
    Annotation: DES, the workhorse of cryptography and the U.S. government encryption standard for just shy of twenty years (from 1978 to 1997), was used to protect a vast array of sensitive information in the United Stated and throughout th...
    Call Number: QA76.9 .A25 C873 2005

    Computer forensics : computer crime scene investigation
    Authors(s): Vacca, John R.
    Publisher: Charles River Media
    Publication Date: 2005
    Annotation: Describes techniques for analyzing risks to a computer system, extracting and documenting computer evidence stored as data or magnetically encoded information, and implementing a security policy that protects information asse...
    Call Number: QA76.9 .A25 V33 2005

    Computer network attack and international law
    Authors(s): Symposium on Computer Network Attack and International Law (1999 : Naval War College)
    Publisher: Naval War College
    Publication Date: 2002
    Call Number: JX1295 .U4 vol. 76

    Computer network security and cyber ethics
    Authors(s): Kizza, Joseph Migga.
    Publisher: McFarland
    Publication Date: 2002
    Annotation: This book increases awareness of cyber vandalism and shows how to protect cyber security. After an overview of the infrastructure and communication protocols necessary for understanding computer crimes, chapters address motiv...
    Call Number: TK5105.59 .K58 2002

    Computer security
    Authors(s): Gollmann, Dieter.
    Publisher: Wiley
    Publication Date: 2006
    Call Number: QA76.9 .A25 G65 2006

    Corporate computer and network security
    Authors(s): Panko, R. R.
    Publisher: Pearson Prentice Hall
    Publication Date: 2004
    Annotation: This textbook provides a framework for thinking about security, with attention to specific types of security problems and the tools for addressing them. Specific chapters discuss firewalls, host security, cryptography, applic...
    Call Number: QA76.9 .A25 P36 2003

    Crypto: how the code rebels beat the government, saving privacy in the digital age
    Authors(s): Levy, Steven.
    Publisher: Viking
    Publication Date: 2001
    Annotation: Levy, a Newsweek writer, author of Hackers, and crack storyteller, relates the 30-year history of the crypto rebels whose work made it possible for encryption technology to oil the workings of the digital age instead of being...
    Call Number: QA76.9.A25 L49 2001

    Cryptography and network security: principles and practice
    Authors(s): Stallings, William.
    Publisher: Pearson/Prentice Hall
    Publication Date: 2006
    Annotation: Fully updated to reflect the latest trends and technologies, this is the definitive guide to encryption and network security principles, techniques, and effective usage. Renowned author and consultant William Stallings system...
    Call Number: TK5105.59 .S713 2006

    Database nation: the death of privacy in the 21st century
    Authors(s): Garfinkel, Simson.
    Publisher: OReilly
    Publication Date: 2000
    Annotation: A frequent writer on computer themes and a weekly columnist for the Boston Globe, Garfinkel describes the death of due process, biometrics, the misuse of medical information, the systematic capture of everyday events, the com...
    Call Number: JC596.2.U5 G37 2000

    Defending the digital frontier : practical security for management
    Authors(s): Babiak, Jan.
    Publisher: Wiley
    Publication Date: 2005
    Annotation: Partners in a business providing information security services in the UK and the Americas discuss the challenges of the increasing complexity of information technologies as well as the threat of terrorism. The guide includes ...
    Call Number: TK5105.59 .D65 2003

    Enterprise information systems assurance and system security : managerial and technical issues
    Publisher: Idea Group Pub.
    Publication Date: 2006
    Annotation: Information technology and computer science professionals from academia, industry, and military in the Americas, Europe, and Asia examine management aspects of computer system security. The 16 chapters can be read independent...
    Call Number: QA76.9 .A25 E5455 2006

    Guide to computer forensics and investigations
    Publisher: Thomson Course Technology
    Publication Date: 2008
    Annotation: The four authors of this guide represent professional, educational, and legal positions in the field of computer forensics and investigation. Students should be familiar with networking and A+ and Network+ fundamentals to understand chapter topics that include: recovery of image files, network forensics, how to process crime and incident scenes,...
    Call Number: HV8079 .C65 G85 2008

    Information assurance: managing organizational IT security risks
    Authors(s): Boyce, Joseph George, 1951-
    Publisher: Butterworth-Heinemann
    Publication Date: 2002
    Annotation: The authors lay out a detailed strategy for defining information security, establishing IA goals, providing training for security awareness, and conducting airtight incident response to system compromise. Such topics as defen...
    Call Number: QA76.9 .A25 B69 2002

    Information assurance for the enterprise: a roadmap to information security
    Authors(s): Schou, Corey.
    Publisher: McGraw-Hill Irwin
    Publication Date: 2007
    Call Number: QA76.9 .A25 S3523 2007

    Information security: principles and practice
    Authors(s): Stamp, Mark.
    Publisher: Wiley-Interscience
    Publication Date: 2006
    Annotation: Stamp (computer science, San Jose State U.) presents a textbook for a graduate course in information security, and suggests that it would also benefit information technology professionals who are trying to learn more about se...
    Call Number: QA76.9 .A25 S69 2006

    Information security and ethics: social and organizational issues
    Publisher: IRM Press
    Publication Date: 2005
    Annotation: Information Security #38; Ethics: Social #38; Organizational Issues comprises a reference for students, teachers and researchers working in the fields of information ethics. It provokes debate on a range of topical social a...
    Call Number: T14.5 .I55 2005

    Information security risk analysis
    Authors(s): Peltier, Thomas R.
    Publisher: Auerbach Publications
    Publication Date: 2005
    Call Number: QA76.9 .A25 P429 2005

    Inside network perimeter security
    Publisher: Sams Pub.
    Publication Date: 2005
    Annotation: Admonishing network administrators never to trust the operating systems, this guide explains the role of packet filtering, stateful firewalls, proxies, security policy, routers, virtual private networks, host-centric mechanis...
    Call Number: TK5105.59 .I53 2005

    KNOW cyber risk by managing your IT security!
    Authors(s): Litchko, James P.
    Publisher: Know Book Pub.
    Publication Date: 2004
    Annotation: KNOW Cyber Risk provides business professionals, IT managers, and IT security specialists with a quick, informal, and entertaining introduction to successful strategies for: -making IT security decisions based on business nee...
    Call Number: QA76.9 .A25 L582 2004

    Managing information security risks : the OCTAVE approach
    Authors(s): Alberts, Christopher J.
    Publisher: Addison-Wesley
    Publication Date: 2003
    Annotation: Written for people who manage information security risks for their organizations, this book details a security risk evaluation approach called OCTAVE. The book provides a framework for systematically evaluating and managing s...
    Call Number: QA76.9 .A25 A43 2003

    Minoli-Cordovanas authoritative computer & network security dictionary
    Authors(s): Minoli, Daniel, 1952-
    Publisher: Wiley-Interscience
    Publication Date: 2006
    Annotation: Unique in its format and comprehensive in its approach, this dictionary is broad enough for the novice while also deep enough for the expert. Some 5,500 entries include references to hosts, systems, databases, storage, inform...
    Call Number: QA76.9 .A25 M583 2006

    Outsourcing information security
    Authors(s): Axelrod, C. Warren.
    Publisher: Artech House
    Publication Date: 2004
    Annotation: Axelrod provides a timely resource in this guide to recognizing, evaluating and managing the security risks of information technology outsourcing. He approaches outsourcing by balancing the benefits of relationships with the ...
    Call Number: QA76.9 .A25 A88 2004

    Phishing and countermeasures : understanding the increasing problem of electronic identity theft
    Publisher: Wiley-Interscience
    Publication Date: 2007
    Annotation: Mostly American researchers introduce the practice of retrieving confidential or sensitive credentials about legitimate computer users by mimicking electronic communications from a trustworthy or public organization, and meas...
    Call Number: HV6773 .J345 2007

    Physical and logical security convergence powered by enterprise security management
    Publisher: Syngress Publishing
    Publication Date: 2007
    Annotation: While physical and logical security disciplines are disparate, todays threats are such that they need to be addressed in tandem. This text explains why convergence is the next phase of evolution in enterprise-level security i...
    Call Number: QA76.9 .A25 P49 2007

    Secrets and lies : digital security in a networked world
    Authors(s): Schneier, Bruce, 1963-
    Publisher: Wiley
    Publication Date: 2004, 2000
    Annotation: Viruses. Identity theft. Corporate espionage. National secrets compromised. Can anyone promise security in our digital world? The man who introduced cryptography to the boardroom says no. But in this fascinating read, he show...
    Call Number: QA76.9 .A25 S352 2004

    Security engineering : a guide to building dependable distributed systems
    Authors(s): Anderson, Ross, 1956-
    Publisher: Wiley
    Publication Date: 2001
    Annotation: The first quick reference guide to the dos and donts of creating high quality security systems. Ross Anderson, widely recognized as one of the worlds foremost authorities on security engineering, presents a comprehensive desi...
    Call Number: QA76.9 .A25 A54 2001

    Security in computing
    Authors(s): Pfleeger, Charles P., 1948-
    Publisher: Prentice Hall PTR
    Publication Date: 2003
    Annotation: The authors, an information security consultant and an information scientist, intend this book for students and computer professionals seeking either a broad survey or deeper, more specialized discussion of the nuts and bolts...
    Call Number: QA76.9 .A25 P45 2003

    Silence on the wire: a field guide to passive reconnaissance and indirect attacks
    Authors(s): Zalewski, Michal.
    Publisher: No Starch Press
    Publication Date: 2005
    Annotation: Zalewski, a security researcher whos made a name for himself finding and resolving network security flaws, explains how computers and networks work, how information is processed and delivered, and what security threats lurk. ...
    Call Number: TK5105.59 .Z35 2005

    The art of computer virus research and defense
    Authors(s): Szor, Peter.
    Publisher: Addison-Wesley
    Publication Date: 2005
    Annotation: Szor, a security architect, explains virus threats, defense techniques, and analysis tools in this guide for IT and security professionals responsible for protecting their organizations against malware. He presents the state ...
    Call Number: QA76.76 .C68 S96 2005

    The art of deception : controlling the human element of security
    Authors(s): Mitnick, Kevin D. (Kevin David), 1963-
    Publisher: Wiley
    Publication Date: 2002
    Annotation: This book builds on the foundation of Bruce Schneiers book Secrets #38; Lies. Mitnick claims that computer security is more than just hardware and software--it lies with the companys own employees....
    Call Number: QA76.9 .A25 M585 2002

    The information systems security officers guide : establishing and managing an information protection program
    Authors(s): Kovacich, Gerald L.
    Publisher: Butterworth-Heinemann
    Publication Date: 2003
    Annotation: This essential guide covers everything from effective communication to career guidance for the information security officer. Readers get practical information and advice on establishing and managing a successful information p...
    Call Number: QA76.9 .A25 K68 2003

    The unwanted gaze: the destruction of privacy in America
    Authors(s): Rosen, Jeffrey, 1964-
    Publisher: Random House
    Publication Date: 2000
    Annotation: A legal-affairs analyst for The New Republic explores the legal, technological, and cultural changes associated with the gradual erosion of privacy rights for Americans and proposes ways of countering the invasion of privacy....
    Call Number: KF1262 .R67 2000

    Users guide to cryptography and standards
    Authors(s): Dent, Alexander W.
    Publisher: Artech House
    Publication Date: 2005
    Annotation: Designers, developers, students, and committed users are finding encryption to be the essential element of security systems for computers and networks. In this comprehensive text Dent and Mitchell (both information security, ...
    Call Number: QA76.9 .A25 D465 2005

    Corporate Security:

    Best practices in school crisis prevention and intervention
    Publisher: NASP Publications
    Publication Date: 2002
    Call Number: LB2866.5 .B47 2002

    Crisis communications: a casebook approach
    Authors(s): Fearn-Banks, Kathleen.
    Publisher: Lawrence Erlbaum Associates
    Publication Date: 2002
    Annotation: Crisis Communications presents case studies of organizational and individual problems that have the potential to become crises, and the communication responses to these situations. Helping professionals prepare for crises and...
    Call Number: HD59 .F37 2002

    Crisis in organizations II
    Authors(s): Barton, Laurence, 1956-
    Publisher: South-Western College Pub.
    Publication Date: 2001
    Annotation: Crisis in Organizations is the most definitive and thorough work in the field of crisis management, providing detailed research and sound advice on preventing and managing crisis. Readers explore the array of incidents that f...
    Call Number: HD49 .B373 2001

    Crisis management: planning for the inevitable
    Authors(s): Fink, Steven.
    Publisher: IUniverse
    Publication Date: 2002
    Annotation: Every major executive in America ought to read at least one book on crisis managemnt...The question is: Is Steven Finks book one that busy executives ought to read? The answer is a resounding yes. The Los Angeles Times, Sunda...
    Call Number: HD49 .F56 2002

    Effective response to school violence : a guide for educators and law enforcement personnel
    Authors(s): Jones, Tony L.
    Publisher: Charles C. Thomas
    Publication Date: 2001
    Call Number: LB3013.3 .J69 2001

    Effective risk management : some keys to success
    Authors(s): Conrow, E. H. (Edmund H.), 1949-
    Publisher: American Institute of Aeronautics and Astronautics
    Publication Date: 2003
    Annotation: Written for project managers and technical practitioners, this volume describes the processes of risk planning, the identification and analysis of risk, development and implementation of plans for handling risks, progress mon...
    Call Number: HD61 .C663 2003

    Failsafe strategies: profit and grow from risks that others avoid
    Authors(s): Chatterjee, Sayan.
    Publisher: Wharton School Pub.
    Publication Date: 2005
    Annotation: In a book based on his research on risk and value creation and experience as a consultant and executive, Chatterjee (management policy, Case Western Reserve U.), stresses the theme that risk reduction requires clarifying wher...
    Call Number: HD61 .C533 2005

    Global edge: using the opacity index to manage the risks of cross-border business
    Authors(s): Kurtzman, Joel.
    Publisher: Harvard Business School Press
    Publication Date: 2007
    Annotation: Drawing on a decade of field work with organizations and governments, this vital resource presents a new way to anticipate, analyze, and manage hidden global business risks. In an age when a systematic understanding of global...
    Call Number: HD62.4 .K873 2007

    Global risk : business success in turbulent times
    Authors(s): Cleary, Sean, 1948-
    Publisher: Palgrave Macmillan
    Publication Date: 2007
    Annotation: In todays rapidly changing and increasingly complex business world, successful risk management is the key to survival and success....
    Call Number: HD61 .C596 2007

    Handbook of crisis and emergency management
    Publisher: Marcel Dekker
    Publication Date: 2001
    Annotation: In preparing this encyclopedic handbook, Farazmand (Florida Atlantic U., Fort Lauderdale) was driven by the lack of a single source of information on three main subjects: putting political, economic, environmental and other c...
    Call Number: HV551.3 .H36 2001

    Integrated risk management: techniques and strategies for managing corporate risk
    Authors(s): Doherty, Neil A.
    Publisher: McGraw-Hill
    Publication Date: 2000
    Annotation: Over the years, risk management has developed separately in both the insurance and financial fields. Today, the two are finding value in each others tools and techniques. Integrated Risk Management combines the best of the tw...
    Call Number: HD61 .D643 2000

    Managing crises before they happen: what every executive and manager needs to know about crisis man(...)
    Authors(s): Mitroff, Ian I.
    Publisher: AMACOM
    Publication Date: 2001
    Annotation: From tragic accidents to public relations fiascos, we live in an increasingly crisis-ridden society. In fact, half of the major industrial accidents of the past century occurred in the last 20 years. Incidents such as Bhopal ...
    Call Number: HD49 .M5678 2001

    Managing risk in organizations: a guide for managers
    Authors(s): Frame, J. Davidson.
    Publisher: Jossey-Bass
    Publication Date: 2003
    Annotation: This guide examines the risks routinely encountered in business, offers prescriptions to assess the effects of various risks, and details strategies to cope with risks. Illustrating major principles with case studies, the boo...
    Call Number: HD61 .F726 2003

    National incident management system : principles and practice
    Publisher: Jones and Bartlett Publishers
    Publication Date: 2005
    Annotation: Intended for emergency personnel, this guidebook explains Americas homeland security strategies and the basic elements of the national incident management system (NIMS) established in March 2004. It describes each component o...
    Call Number: HV551.3 .N375 2005

    Project management: the managerial process
    Authors(s): Gray, Clifford F.
    Publisher: McGraw-Hill/Irwin
    Publication Date: 2006
    Annotation: Not long ago project management was perceived as a highly technical endeavor with applications to highly specialized industries. Times have changed-and so have the collective perceptions about project management....
    Call Number: HD69 .P75 G72 2006

    Project risk management
    Authors(s): Barkley, Bruce, 1939-
    Publisher: McGraw-Hill
    Publication Date: 2004
    Annotation: An essential reference for project and program managers, this book provides simplified concepts and the tools necessary to assess, prioritize, and manage high-risk projects and tasks. Delivers practical information, including...
    Call Number: HD69 .P75 B384 2004

    Project risk management: an essential tool for managing and controlling projects
    Authors(s): Well-Stam, Daniella van.
    Publisher: Kogan Page
    Publication Date: 2004
    Annotation: Three Dutch civil engineers outline the steps for identifying a large projects risks and deciding which control measures to implement, and apply the method to a high-speed train line, a river control project, an underground t...
    Call Number: HD69 .P75 W4513 2004

    Public health management of disasters: the practice guide
    Authors(s): Landesman, Linda Young.
    Publisher: American Public Health Association
    Publication Date: 2005
    Call Number: RA645.9 .L36 2005

    Risk and choice in maternity care : an international perspective
    Publisher: Churchill Livingstone Elsevier
    Publication Date: 2006
    Annotation: This book explores the complex interrelationship between risk and choice in maternity care, taking a close look at how high and low risk are defined and what impact this has on a womans ability to exercise informed choices th...
    Call Number: RG940 .R57 2006

    Risk from the CEO and board perspective
    Authors(s): McCarthy, Mary Pat.
    Publisher: McGraw-Hill
    Publication Date: 2004
    Annotation: The world of business is changing fast. As a corporate decision maker or board member it is your job to navigate the environment with one eye on the present and the other on the risks behind each decision you make and every a...
    Call Number: HD61 .M385 2004

    Risk Management: challenge and opportunity
    Publisher: Springer
    Publication Date: 2005
    Annotation: Dealing with all aspects of risk management that have undergone significant innovation in recent years, this book aims at being a reference work in its field. Different to other books on the topic, it addresses the challenges...
    Call Number: HD61 .R5697 2005

    Risk transfer : derivatives in theory and practice
    Authors(s): Culp, Christopher L.
    Publisher: J. Wiley
    Publication Date: 2004
    Annotation: Risk Transfer provides a basic understanding of the driving economic theory behind derivatives and risk transfer, then examines the advanced application and implementation of derivative instruments by corporations and institu...
    Call Number: HG6024 .A3 C85 2004

    Security metrics: replacing fear, uncertainty, and doubt
    Authors(s): Jaquith, Andrew.
    Publisher: Addison-Wesley
    Publication Date: 2007
    Annotation: Using case studies and war stories from his work in the software, aerospace, and financial services industries, Jaquith, a security consultant and program manager, shows how to establish effective metrics for an organization ...
    Call Number: HD61 .J37 2007

    Seeds of disaster, roots of response : how private action can reduce public vulnerability
    Publisher: Cambridge University Press
    Publication Date: 2006
    Annotation: In the wake of 9/11 and Hurricane Katrina, executives and policymakers are more motivated than ever to reduce the vulnerability of social and economic systems to disasters. Most prior work on critical infrastructure protectio...
    Call Number: HV551.2 .S44 2006

    The complete guide to business risk management
    Authors(s): Sadgrove, Kit.
    Publisher: Gower
    Publication Date: 2005
    Annotation: Sadgrove, a management consultant, explains how to identity and control threats to a business, from computer failure to terrorism. He examines key areas including finance, product quality, health and safety, security, and the...
    Call Number: HD61 .S2 2005

    The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
    Authors(s): Wallace, Michael, 1960-
    Publisher: American Management Association
    Publication Date: 2004
    Annotation: Wallace, an IT strategy and disaster recovery consultant, and Webber, a certified project manager, show businesses how to survive any type of major disruption, from electrical outages to terrorism, in this book/CD-ROM package...
    Call Number: HD49 .W36 2004

    The four pillars of high performance: how robust organizations achieve extraordinary results
    Authors(s): Light, Paul Charles.
    Publisher: McGraw-Hill
    Publication Date: 2005
    Annotation: How to stay on course and achieve extraordinary performance in a sea of change In todays change-or-die business environment, companies that achieve the highest levels of performance are robust organizations--those that adapt...
    Call Number: HD58.8 .L54 2005

    Too far from home: a story of life and death in space
    Authors(s): Jones, Chris (Chris Alexander)
    Publisher: Doubleday
    Publication Date: 2007
    Annotation: Too Far from Home captures the hazardous realities of space travel. Every time an astronaut makes the trip into space, he faces the possibility of death from the slightest mechanical error or instance of bad luck: a cracked O...
    Call Number: TL867 .J66 2007

    Why some companies emerge stronger and better from a crisis: 7 essential lessons for surviving disaster
    Authors(s): Mitroff, Ian I.
    Publisher: American Management Association
    Publication Date: 2005
    Annotation: Mitroff (Marshall School of Business, Annenberg School for Communications, U. of Southern California) recommends seven different IQs--emotional, creative, social/political, integrative, technical, aesthetic and spiritual--to ...
    Call Number: HD49 .M572 2005

    National Security:

    Body of secrets: anatomy of the ultra-secret National Security Agency
    Authors(s): Bamford, James.
    Publisher: Anchor Books
    Publication Date: 2002
    Annotation: The National Security Agency is the worlds most powerful, most far-reaching espionage. Now with a new afterword describing the security lapses that preceded the attacks of September 11, 2001, Body of Secrets takes us to the i...
    Call Number: UB256 .U6 B36 2002

    Building a new Afghanistan
    Publisher: World Peace Foundation ;
    Publication Date: 2007
    Call Number: DS371.4 .B83 2007

    Bush at war
    Authors(s): Woodward, Bob.
    Publisher: Simon & Schuster
    Publication Date: 2002
    Annotation: #60; b #62;A #1 New York Times Bestseller #60; /b #62; #60; p #62;With his unmatched investigative skills, veteran journalist andeight-time No. 1 nationalbestselling author Bob Woodward tells the behind-the-scenes story of ho...
    Call Number: E903.3 .W66 2002

    China: the balance sheet : what the world needs to know now about the emerging superpower
    Publisher: Public Affairs
    Publication Date: 2006
    Annotation: Put together by the Center for Strategic and International Studies and the Institute for International Economics, this volume examines the prospects for Chinese economic, political, and military developments from the perspect...
    Call Number: DS779.26 .C47285 2006

    Constitutional issues in federal management of domestic terrorism incidents
    Authors(s): McDonnell, James F.
    Publisher: iUniverse
    Publication Date: 2004
    Annotation: This book provides insight into the evolution of the nations counterterrorism policies before September 11, 2001....
    Call Number: KF4850 .M33 2004

    Critical issues facing the Middle East : security, politics, and economics
    Publisher: Palgrave Macmillan
    Publication Date: 2006
    Call Number: UA832 .C75 2006

    Defending the homeland: domestic intelligence, law enforcement, and security
    Authors(s): White, Jonathan Randall.
    Publisher: Wadsworth/Thomson Learning
    Publication Date: 2004
    Annotation: The United States government is reorganizing to increase domestic security. How will these changes impact the American criminal justice system? DEFENDING THE HOMELAND: DOMESTIC INTELLIGENCE, LAW ENFORCEMENT, AND SECURITY is t...
    Call Number: HV6432 .W485 2004

    Deterring and investigating attack: the role of the FBI and CIA
    Authors(s): Keeley, Jennifer, 1974-
    Publisher: Lucent Books
    Publication Date: 2004
    Annotation: Since September 11th, the FBI and the CIA have used cutting edge technology and covert surveillance to stop terrorists before they strike. Employing techniques like listening to chatter, monitoring Internet activity, wire tap...
    Call Number: HV6432 .K44 2004

    Guide to homeland security careers
    Authors(s): Hutton, Donald B.
    Publisher: Barrons
    Publication Date: 2003
    Annotation: This brand-new directory examines career opportunities in these and related security fields. The authors describe job designations in detail, and provide addresses, phone numbers, Web sites, and a helpful glossary of Homeland...
    Call Number: HV6432 .H88 2003

    Gunboat democracy : U.S. interventions in the Dominican Republic, Grenada, and Panama
    Authors(s): Crandall, Russell, 1971-
    Publisher: Rowman & Littlefield Publishers
    Publication Date: 2006
    Annotation: Crandall (political science, Davidson College) compares and contrasts three US military interventions in Latin America: Johnsons invasion of the Dominican Republic in 1965, Reagans invasion of Grenada in 1983, and the elder B...
    Call Number: F2178 .U6 C73 2006

    Homeland security
    Publisher: Greenhaven Press
    Publication Date: 2005
    Annotation: As a result of the September 11, 2001 terrorist attacks, the United States has made substantial and controversial changes to its homeland security system. The authors in this anthology offer differing perspectives on these me...
    Call Number: HV6432.4 .H65 2005

    Homeland security and the need for change: organizing principles, governing institutions, and American culture
    Authors(s): Hillyard, Michael J.
    Publisher: Aventine Press LLC
    Publication Date: 2003
    Annotation: A new federal department is much needed.But the fight against terror begins locally. Homeland security starts not with the local federal government but at the local level, where citizens, police and emergency services, and go...
    Call Number: UA927 .H34 2003

    Hostage to revolution: Gorbachev and Soviet security policy, 1985-1991
    Authors(s): Blacker, Coit D.
    Publisher: Council on Foreign Relations Press
    Publication Date: 1993
    Annotation: A history of Soviet security policy under Gorbachev, concisely explaining the causes and consequences of the Gorbachev revolution, particularly as it affected the related issues of military reform, arms control, regional and ...
    Call Number: DK288 .B58 1993

    How patriotic is the Patriot Act? freedom versus security in the age of terrorism
    Authors(s): Etzioni, Amitai.
    Publisher: Routledge
    Publication Date: 2004
    Annotation: In six succinct chapters, Etzioni draws on the philosophy of responsive communitarianism to chart a middle course rather than picking sides in the post-Sept. 11 debate of civil rights versus public safety. In response to the ...
    Call Number: KF4850 .E899 2004

    Intelligence and national security : the secret world of spies : an anthology
    Publisher: Oxford University Press
    Publication Date: 2008
    Call Number: UB250 .I563 2008

    International law challenges : homeland security and combating terrorism
    Publisher: Naval War College
    Publication Date: 2006
    Call Number: KZ6355 .I58 2006

    Is military action justified against nations that support terrorism?
    Publisher: Greenhaven Press
    Publication Date: 2003
    Annotation: Perhaps the most controversial issue surrounding terrorism is how governments should respond to it. The viewpoints in this volume discuss the United States military intervention in Afghanistan, the Bush administrations case a...
    Call Number: HV6432 .I672 2003

    Making Liberia safe: transformation of the national security sector
    Publisher: Rand
    Publication Date: 2007
    Call Number: UA866 .M35 2007

    National security: opposing viewpoints
    Publisher: Greenhaven Press
    Publication Date: 2004
    Annotation: The September 11, 2001, terrorist attacks on America have made security one of the nations top priorities. The authors in this volume discuss the many threats to national security and debate the best ways to address those thr...
    Call Number: UA23 .N2476 2004

    National security in Saudi Arabia : threats, responses, and challenges
    Authors(s): Cordesman, Anthony H.
    Publisher: Praeger Security International
    Publication Date: 2005
    Annotation: Though some threats may come at some point from beyond the border, Cordesman (Center for Strategic and International Studies) and Obaid, a Saudi national security and intelligence consultant based in Riyadh, find that the kin...
    Call Number: UA853 .S33 C664 2005

    Security in the new Europe
    Authors(s): Cottey, Andrew.
    Publisher: Palgrave Macmillan
    Publication Date: 2007
    Call Number: UA646 .C713 2007

    State of denial
    Authors(s): Woodward, Bob.
    Publisher: Simon & Schuster
    Publication Date: 2006
    Annotation: State of Denial examines how the Bush administration avoided telling the truth about Iraq to the public, to Congress, and often to themselves. Two days after the May report, the Pentagon told Congress, in a report required by...
    Call Number: E903.3 .W67 2006

    Strategies of containment: a critical appraisal of American national security policy during the Cold War
    Authors(s): Gaddis, John Lewis.
    Publisher: Oxford University Press
    Publication Date: 2005
    Annotation: When Strategies of Containment was first published, the Soviet Union was still a superpower, Ronald Reagan was still President of the United States, and the Berlin Wall was still standing. Now this new edition of Gaddiss clas...
    Call Number: E744 .G24 2005

    Surprise, security, and the American experience
    Authors(s): Gaddis, John Lewis.
    Publisher: Harvard University Press
    Publication Date: 2004
    Annotation: September 11, 2001, the distinguished Cold War historian John Lewis argues, was not the first time a surprise attack shattered assumptions about national security and re-shaped American grand strategy. Weve been there before,...
    Call Number: E183.7 .G27 2004

    System under stress : homeland security and American politics
    Authors(s): Kettl, Donald F.
    Publisher: CQ Press
    Publication Date: 2007
    Call Number: JK421 .K482 2007

    Terrorism: opposing viewpoints
    Publisher: Greenhaven Press
    Publication Date: 2004
    Annotation: In the wake of September 11, 2001, the world has become more aware of the dangers of terrorism. The contributors to this volume debate the seriousness of the threat, the causes of terrorism, and how the United States and inte...
    Call Number: HV6431 .T485 2004

    The 9/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States
    Authors(s): National Commission on Terrorist Attacks upon the United States.
    Publisher: U.S. G.P.O.
    Publication Date: 2004
    Annotation: Nearly three thousand people died in the terrorist attacks of September 11, 2001. In Lower Manhattan, on a field in Pennsylvania, and along the banks of the Potomoc, the United States suffered the single largest loss of life ...
    Call Number: HV6432 .N38 2004

    The 9/11 report: a graphic adaptation
    Authors(s): Jacobson, Sid.
    Publisher: Hill and Wang
    Publication Date: 2006
    Annotation: This graphic adaptation of the 9/11 Commissions official report on the terrorist attacks puts at every Americans fingertips the most defining event of the century. Sid Jacobsons text faithfully captures the reports investigat...
    Call Number: HV6432.7 .J33 2006

    The edge of disaster: rebuilding a resilient nation
    Authors(s): Flynn, Stephen E.
    Publisher: Random House :
    Publication Date: 2007
    Annotation: The truth is, acts of terror cannot always be prevented, and nature continues to show its fury in frighteningly unpredictable ways. Resiliency, argues Flynn, must now become our national motto. With chilling frankness and cla...
    Call Number: HV551.3 .F62 2007

    The future of American intelligence
    Publisher: Hoover Institution Press Stanford University
    Publication Date: 2005
    Annotation: The United States today faces new kinds of adversaries, armed with an array of sinister weapons and capable of communicating and coordinating actions around the globe with unprecedented ease. As this book demonstrates, this d...
    Call Number: JK468 .I6 F88 2005

    The future of transatlantic security relations : colloquium report
    Publisher: Strategic Studies Institute U.S. Army War College
    Publication Date: 2006
    Call Number: UA646 .F989 2006

    The Highest stakes: the economic foundations of the next security system
    Publisher: Oxford University Press
    Publication Date: 1992
    Call Number: HC110.D4 H54 1992

    The Missing link : West European neutrals and regional security
    Publisher: Duke University Press
    Publication Date: 1990
    Annotation: The analyses presented here were commissioned by the Graduate Institute of International Studies in Geneva. They articulate the views of the five principal neutrals--Switzerland, Sweden, Finland, Yugoslavia, and Austria--and ...
    Call Number: UA646 .M66 1990

    The Patriot Act: opposing viewpoints
    Publisher: Greenhaven Press
    Publication Date: 2005
    Annotation: Shortly after the terrorist attacks of September 11, 2001, Congress passed a complex, 342-page bill-the USA PATRIOT Act-to help the government fight its war on terrorism. Since the bill was signed on October 26, 2001, the Pat...
    Call Number: KF9430 .P38 2005

    US national security and foreign direct investment
    Authors(s): Graham, Edward M. (Edward Montgomery), 1944-
    Publisher: Institute for International Economics
    Publication Date: 2006
    Annotation: Following the political controversy that erupted over possible acquisitions of US port facilities by Dubai Ports World, congressional proposals were brought forth for strengthening the Exon-Florio Amendment to the Defense Pro...
    Call Number: HG4910 .G745 2006