Cargando…

Physical security for IT /

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Erbschloe, Michael, 1951-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Elsevier Digital Press, �2005.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn162595299
003 OCoLC
005 20231117015024.0
006 m o d
007 cr cn|||||||||
008 070806s2005 ne a ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OKU  |d OCLCQ  |d NTG  |d MERUC  |d UBY  |d E7B  |d IDEBK  |d B24X7  |d DEBBG  |d N$T  |d YDXCP  |d OCLCQ  |d OCLCF  |d OCLCQ  |d AGLDB  |d LIV  |d OCLCQ  |d OCLCA  |d STF  |d D6H  |d OCLCQ  |d VTS  |d OCLCQ  |d COO  |d LEAUB  |d M8D  |d OCLCQ  |d OCLCO  |d MHW  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 70969610  |a 166521087  |a 170922696  |a 441791164  |a 505089073  |a 648271667  |a 823827408  |a 823897118  |a 824088949  |a 824135340  |a 856952188  |a 1035705577 
020 |a 9781555583279 
020 |a 155558327X 
020 |a 0080495907  |q (electronic bk.) 
020 |a 9780080495903  |q (electronic bk.) 
020 |a 128101494X 
020 |a 9781281014948 
035 |a (OCoLC)162595299  |z (OCoLC)70969610  |z (OCoLC)166521087  |z (OCoLC)170922696  |z (OCoLC)441791164  |z (OCoLC)505089073  |z (OCoLC)648271667  |z (OCoLC)823827408  |z (OCoLC)823897118  |z (OCoLC)824088949  |z (OCoLC)824135340  |z (OCoLC)856952188  |z (OCoLC)1035705577 
050 4 |a TK5105.59  |b .E73 2005eb 
072 7 |a COM  |x 052000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a U  |2 bicssc 
082 0 4 |a 004/.068/4  |2 22 
100 1 |a Erbschloe, Michael,  |d 1951- 
245 1 0 |a Physical security for IT /  |c Michael Erbschloe. 
260 |a Amsterdam ;  |a Boston :  |b Elsevier Digital Press,  |c �2005. 
300 |a 1 online resource (xix, 231 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Physical security overview -- Establishing a physical IT security function -- Developing an IT physical security plan -- Major elements of a physical IT security plan -- Developing and documenting methods and procedures -- Auditing and testing procedures -- The role of the incident response team -- Model training program for organization staff -- The future of physical security for IT assets. 
520 |a The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. * Expert advice on identifying physical security needs * Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems * Explanation of the processes for establishing a physical IT security function * Step-by-step instructions on how to accomplish physical security objectives * Illustrations of the major elements of a physical IT security plan * Specific guidance on how to develop and document physical security methods and procedures. 
588 0 |a Print version record. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Electronic data processing departments  |x Security measures. 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a Centres de traitement de l'information  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0315254 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Electronic data processing departments  |x Security measures  |2 fast  |0 (OCoLC)fst00907090 
776 0 8 |i Print version:  |a Erbschloe, Michael, 1951-  |t Physical security for IT.  |d Amsterdam ; Boston : Elsevier Digital Press, �2005  |z 155558327X  |z 9781555583279  |w (DLC) 2004023167  |w (OCoLC)56671950 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781555583279  |z Texto completo