Cyber Monday shopping? Here is a sampler of in-depth coverage by experts in application security, investigations, business continuity and more. If you’re looking to give (or receive) the gift of knowledge this year, you can get a preview of the following security books. Each listing includes a link to an excerpt on CSOonline.com as well as the book itself on Amazon.com.Security Testing of Custom Software ApplicationsSecure and Resilient Software DevelopmentTools and techniques for testing applications.Excerpted from by Mark Merkow and Lakshmikanth RaghavanCRC Press, July 2010 Investigative Tactics and StrategiesPrivate Security and the Investigative ProcessRetail industry field techniques and tests for detecting internal retail theft, including double buys, combination buys, and refund buysExcerpted from by Charles NemethCRC Press, March 2010Physical Security Risk and Countermeasures: Effectiveness MetricsRisk Analysis and Security Countermeasure Selection Is your security program working? Here’s how to establish metrics for systematic measurement and improvement of countermeasures.Excerpted from by Thomas NormanCRC Press, February 2010 PCI and the Art of the Compensating ControlPCI Compliance: Understand and Implement Effective PCI Data Security Standard ComplianceCompensating controls are a standard part of any security posture. But what makes an effective control?Exerpted from by Branden Williams and Anton ChuvakinSyngress, December 2009How to Perform a Disaster Recovery Business Impact AnalysisBuilding an Enterprise-Wide Business Continuity ProgramIncludes a sample Business Impact Analysis formExcerpted from by Kelly OkolitaCRC Press, December 2009 Contact and Coordination with Local, Regional, and International AuthoritiesManaging Security OverseasEmployees overseas are under your protection but not under your direct watch. Scott Alan Ast provides advice and examples for protecting employees by making and maintaining important security contacts abroad.Excerpted from by Scott Alan AstCRC Press, November 2009Conducting a Protective Security Advancefrom the publisher)Advance Teams protect employees visiting a potentially dangerous area. This book excerpt looks at some key considerations for getting the job done.Excerpted from Conducting a Protective Security Advanceby David JohnsonVarro Press, November 2009 (available only How Security Should Handle Pickets and StrikesThe Security Manager’s Guide to Disasters.9 things a business should do – and 6 things you absolutely can’t do – to help ensure a strike or picket remains peaceful. Excerpted from by Anthony ManleyCRC Press, November 2009What Should Your Security Strategies Be?How to Develop and Implement a Security Master PlanIdentifying business needs, documenting policies and driving change – former IBM security director Timothy Giles says these are keys to success for security leadership.Excerpted from by Tim GilesAuerbach, February 2009 No Excuses: Managing Operational RiskNo Excusesby Dennis Dickstein and Robert FlastHeadlines about high-profile white-collar criminals sometimes mask underlying weakness in business controls and risk management. This book excerpt looks behind the curtain.Excerpted from Wiley, December 2008 Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe