Cargando…

Implementing homeland security for enterprise IT /

This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Erbschloe, Michael
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Digital Press, 2004.
Colección:DP security.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocm62158184
003 OCoLC
005 20231117015023.0
006 m o d
007 cr nn|||||||||
008 051026s2004 maua ob 001 0 eng d
010 |z  2003062590 
040 |a NTG  |b eng  |e pn  |c NTG  |d BMU  |d N$T  |d YDXCP  |d OCLCE  |d OCLCQ  |d E7B  |d IDEBK  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCF  |d OPELS  |d OKU  |d OCLCO  |d OCLCQ  |d OCLCO  |d ZCU  |d B24X7  |d OCLCQ  |d AGLDB  |d OCLCQ  |d OCLCA  |d D6H  |d OCLCQ  |d VTS  |d STF  |d AJS  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ  |d INARC  |d OCLCO 
019 |a 162595173  |a 181087780  |a 507230365  |a 607021535  |a 608167590  |a 823830560  |a 823900266  |a 824091534  |a 824139759  |a 974196563  |a 974442562  |a 980227112  |a 1391560955 
020 |a 9780080508504  |q (electronic bk.) 
020 |a 0080508502  |q (electronic bk.) 
020 |a 1281072850 
020 |a 9781281072856 
020 |z 1555583121 
020 |z 9781555583125 
035 |a (OCoLC)62158184  |z (OCoLC)162595173  |z (OCoLC)181087780  |z (OCoLC)507230365  |z (OCoLC)607021535  |z (OCoLC)608167590  |z (OCoLC)823830560  |z (OCoLC)823900266  |z (OCoLC)824091534  |z (OCoLC)824139759  |z (OCoLC)974196563  |z (OCoLC)974442562  |z (OCoLC)980227112  |z (OCoLC)1391560955 
042 |a dlr 
050 4 |a QA76.9.A25  |b E74 2004b 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a JP  |2 bicssc 
082 0 4 |a 005.8  |2 22 
100 1 |a Erbschloe, Michael. 
245 1 0 |a Implementing homeland security for enterprise IT /  |c Michael Erbschloe. 
260 |a Boston :  |b Digital Press,  |c 2004. 
300 |a 1 online resource (xxvii, 299 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a DP security 
500 |a Title from book cover on Web Page (viewed October 26, 2005). 
504 |a Includes bibliographical references and index. 
550 |a May be limited to subscribing institutions. 
505 0 |a Organizing homeland security efforts -- Cross-sector security priorities and issues -- Security and critical infrastructures -- Information sharing for protecting national assets -- Homeland security initiatives by sector -- Why a national strategy to secure cyberspace is important -- Participating in a national cyberspace security response system -- Participating in a national threat and vulnerability reduction program -- Launching a national cyberspace security awareness and training program -- Working to secure governments' cyberspace -- Global cyberspace security cooperation -- Moving into the future. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
520 |a This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action. 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
650 0 |a Computer security. 
650 0 |a Internet  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cyberterrorism. 
650 2 |a Computer Security  |0 (DNLM)D016494 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 6 |a Internet  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0460601 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a Cyberterrorisme.  |0 (CaQQLa)201-0343461 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Cyberterrorism  |2 fast  |0 (OCoLC)fst00885802 
650 7 |a Internet  |x Security measures  |2 fast  |0 (OCoLC)fst01751426 
776 0 8 |i Print version:  |a Erbschloe, Michael, 1951-  |t Implementing homeland security for enterprise IT.  |d Burlington, MA : Digital Press, �2004  |z 1555583121  |z 9781555583125  |w (DLC) 2003062590  |w (OCoLC)53084168 
830 0 |a DP security. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781555583125  |z Texto completo