Cargando…

Physical security for IT /

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Erbschloe, Michael, 1951-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Elsevier Digital Press, ©2005.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn162595299
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 070806s2005 ne a ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OKU  |d OCLCQ  |d NTG  |d MERUC  |d UBY  |d E7B  |d IDEBK  |d B24X7  |d DEBBG  |d N$T  |d YDXCP  |d OCLCQ  |d OCLCF  |d OCLCQ  |d AGLDB  |d LIV  |d OCLCQ  |d OCLCA  |d STF  |d D6H  |d OCLCQ  |d VTS  |d OCLCQ  |d COO  |d LEAUB  |d M8D  |d OCLCQ  |d OCLCO  |d MHW  |d OCLCO  |d OCLCQ 
019 |a 70969610  |a 166521087  |a 170922696  |a 441791164  |a 505089073  |a 648271667  |a 823827408  |a 823897118  |a 824088949  |a 824135340  |a 856952188  |a 1035705577 
020 |a 9781555583279 
020 |a 155558327X 
020 |a 0080495907  |q (electronic bk.) 
020 |a 9780080495903  |q (electronic bk.) 
020 |a 128101494X 
020 |a 9781281014948 
029 1 |a AU@  |b 000051860138 
029 1 |a AU@  |b 000054162637 
029 1 |a CHBIS  |b 005831655 
029 1 |a CHNEW  |b 001006907 
029 1 |a CHVBK  |b 16866030X 
029 1 |a DEBBG  |b BV039832208 
029 1 |a DEBBG  |b BV042307582 
029 1 |a DEBBG  |b BV043044828 
029 1 |a DEBSZ  |b 405311958 
029 1 |a DEBSZ  |b 422200727 
029 1 |a NZ1  |b 12435508 
035 |a (OCoLC)162595299  |z (OCoLC)70969610  |z (OCoLC)166521087  |z (OCoLC)170922696  |z (OCoLC)441791164  |z (OCoLC)505089073  |z (OCoLC)648271667  |z (OCoLC)823827408  |z (OCoLC)823897118  |z (OCoLC)824088949  |z (OCoLC)824135340  |z (OCoLC)856952188  |z (OCoLC)1035705577 
037 |a 107881:107920  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TK5105.59  |b .E73 2005eb 
072 7 |a COM  |x 052000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a U  |2 bicssc 
082 0 4 |a 004/.068/4  |2 22 
049 |a UAMI 
100 1 |a Erbschloe, Michael,  |d 1951- 
245 1 0 |a Physical security for IT /  |c Michael Erbschloe. 
260 |a Amsterdam ;  |a Boston :  |b Elsevier Digital Press,  |c ©2005. 
300 |a 1 online resource (xix, 231 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Physical security overview -- Establishing a physical IT security function -- Developing an IT physical security plan -- Major elements of a physical IT security plan -- Developing and documenting methods and procedures -- Auditing and testing procedures -- The role of the incident response team -- Model training program for organization staff -- The future of physical security for IT assets. 
520 |a The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. * Expert advice on identifying physical security needs * Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems * Explanation of the processes for establishing a physical IT security function * Step-by-step instructions on how to accomplish physical security objectives * Illustrations of the major elements of a physical IT security plan * Specific guidance on how to develop and document physical security methods and procedures. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Electronic data processing departments  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Centres de traitement de l'information  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Electronic data processing departments  |x Security measures.  |2 fast  |0 (OCoLC)fst00907090 
776 0 8 |i Print version:  |a Erbschloe, Michael, 1951-  |t Physical security for IT.  |d Amsterdam ; Boston : Elsevier Digital Press, ©2005  |z 155558327X  |z 9781555583279  |w (DLC) 2004023167  |w (OCoLC)56671950 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195631  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00005426 
938 |a ebrary  |b EBRY  |n ebr10180862 
938 |a EBSCOhost  |b EBSC  |n 195631 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 101494 
938 |a YBP Library Services  |b YANK  |n 2611469 
994 |a 92  |b IZTAP