Internet Guide to Food Safety and Security.
Although the title of this book contains the word "security," there is little in it that traditional physical security professionals would find useful on the job. It is essentially an annotated list of Internet sites where information on food safety, such as recalls, illness potential, nutrition labeling, and irradiation, can be found. It would be a good reference for a restaurant or public health professional, but it has scant value for most security practitioners.
From a risk management perspective, however, several listed Web sites might be candidates to be added to your browser favorites. For example, sites related to disease outbreaks and surveillance could aid global organizations that are conducting risk assessments or expatriate training. The section on agroterrorism contains some helpful links as well.
A glossary at the end of the book adds value, though not particularly for security professionals. Similarly, probably the best parts of the book discuss the anatomy of Web addresses and the use of search engines. They provide a look at the inner workings of the Internet, but again, they are not themselves security issues.
Members of the public-health community, as well as consumers concerned about food safety, constitute the audience for this book, and it would serve their interests reasonably well. As mentioned, security professionals shouldn't be deceived by the presence of "security" in the title.
Reviewer: Jerry D. Loghry, CPP, CSP, is a security and safety consultant for EMC Insurance Companies of Des Moines, Iowa. He holds a master's degree in industrial technology and has more than 15 years of experience in safety and security. He is the former chairman of the Central Iowa Chapter of ASIS International.
|Printer friendly Cite/link Email Feedback|
|Author:||Loghry, Jerry D.|
|Article Type:||Book Review|
|Date:||Jan 1, 2006|
|Previous Article:||Johnny May's Guide to Preventing Identity Theft.|
|Next Article:||Aptitude for Destruction: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism.|