Cargando…

Implementing homeland security for enterprise IT /

This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Erbschloe, Michael
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Digital Press, 2004.
Colección:DP security.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocm62158184
003 OCoLC
005 20231017213018.0
006 m o d
007 cr nn|||||||||
008 051026s2004 maua ob 001 0 eng d
010 |z  2003062590 
040 |a NTG  |b eng  |e pn  |c NTG  |d BMU  |d N$T  |d YDXCP  |d OCLCE  |d OCLCQ  |d E7B  |d IDEBK  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCF  |d OPELS  |d OKU  |d OCLCO  |d OCLCQ  |d OCLCO  |d ZCU  |d B24X7  |d OCLCQ  |d AGLDB  |d OCLCQ  |d OCLCA  |d D6H  |d OCLCQ  |d VTS  |d STF  |d AJS  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ  |d INARC  |d OCLCO 
019 |a 162595173  |a 181087780  |a 507230365  |a 607021535  |a 608167590  |a 823830560  |a 823900266  |a 824091534  |a 824139759  |a 974196563  |a 974442562  |a 980227112  |a 1391560955 
020 |a 9780080508504  |q (electronic bk.) 
020 |a 0080508502  |q (electronic bk.) 
020 |a 1281072850 
020 |a 9781281072856 
020 |z 1555583121 
020 |z 9781555583125 
029 1 |a AU@  |b 000051562540 
029 1 |a AU@  |b 000053223436 
029 1 |a CHBIS  |b 005829801 
029 1 |a CHNEW  |b 001004813 
029 1 |a CHVBK  |b 168679566 
029 1 |a DEBBG  |b BV039832197 
029 1 |a DEBBG  |b BV042307385 
029 1 |a DEBBG  |b BV043140177 
029 1 |a DEBSZ  |b 405311850 
029 1 |a DEBSZ  |b 422168998 
029 1 |a NZ1  |b 12435500 
035 |a (OCoLC)62158184  |z (OCoLC)162595173  |z (OCoLC)181087780  |z (OCoLC)507230365  |z (OCoLC)607021535  |z (OCoLC)608167590  |z (OCoLC)823830560  |z (OCoLC)823900266  |z (OCoLC)824091534  |z (OCoLC)824139759  |z (OCoLC)974196563  |z (OCoLC)974442562  |z (OCoLC)980227112  |z (OCoLC)1391560955 
037 |a 103626:103646  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
042 |a dlr 
050 4 |a QA76.9.A25  |b E74 2004b 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a JP  |2 bicssc 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Erbschloe, Michael. 
245 1 0 |a Implementing homeland security for enterprise IT /  |c Michael Erbschloe. 
260 |a Boston :  |b Digital Press,  |c 2004. 
300 |a 1 online resource (xxvii, 299 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a DP security 
500 |a Title from book cover on Web Page (viewed October 26, 2005). 
504 |a Includes bibliographical references and index. 
550 |a May be limited to subscribing institutions. 
505 0 |a Organizing homeland security efforts -- Cross-sector security priorities and issues -- Security and critical infrastructures -- Information sharing for protecting national assets -- Homeland security initiatives by sector -- Why a national strategy to secure cyberspace is important -- Participating in a national cyberspace security response system -- Participating in a national threat and vulnerability reduction program -- Launching a national cyberspace security awareness and training program -- Working to secure governments' cyberspace -- Global cyberspace security cooperation -- Moving into the future. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
520 |a This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action. 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Internet  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cyberterrorism. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Cyberterrorisme. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Cyberterrorism  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Erbschloe, Michael, 1951-  |t Implementing homeland security for enterprise IT.  |d Burlington, MA : Digital Press, ©2004  |z 1555583121  |z 9781555583125  |w (DLC) 2003062590  |w (OCoLC)53084168 
830 0 |a DP security. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210501  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00003445 
938 |a ebrary  |b EBRY  |n ebr10203518 
938 |a EBSCOhost  |b EBSC  |n 210501 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 107285 
938 |a YBP Library Services  |b YANK  |n 2732691 
938 |a Internet Archive  |b INAR  |n implementinghome0000erbs 
994 |a 92  |b IZTAP