Implementing homeland security for enterprise IT [electronic resource] / Michael Erbschloe |
Autore | Erbschloe, Michael, 1951- |
Pubbl/distr/stampa | Burlington, MA : Digital Press, c2004 |
Descrizione fisica | xxvii, 299 p. : ill. ; 24 cm. |
Disciplina | 005.8 |
Collana | DP security |
Soggetto topico |
Computer security
Internet - Security measures Computer networks - Security measures Cyberterrorism |
Soggetto genere / forma | Electronic books. |
ISBN |
9781555583125
1555583121 |
Formato | Risorse elettroniche |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Guiding Principles for Homeland Security; Multi-Sector Partnering and Security Priorities; Security and Critical Infrastructures; Information Sharing for Protecting National Assets; Corporate Actions Required for Homeland Security by Sector; Why a National Strategy to Secure Cyberspace is Important; Participating in a National Cyberspace Security Response System; Participating in a National Threat and Vulnerability Reduction Programs; Launching a National Cyberspace Security Awareness and Training Programs; Working to Secure Governments' Cyberspace; Global Cyberspace Security Cooperation; A look into the future; Appendices: Acronyms; Homeland Security Resources. |
Record Nr. | UNISALENTO-991003247089707536 |
Erbschloe, Michael, 1951- | ||
Burlington, MA : Digital Press, c2004 | ||
Risorse elettroniche | ||
Lo trovi qui: Univ. del Salento | ||
|
Physical security for IT [electronic resource] / Michael Erbschloe |
Autore | Erbschloe, Michael, 1951- |
Pubbl/distr/stampa | Amsterdam ; Boston : Elsevier Digital Press, c2005 |
Descrizione fisica | xix, 231 p. : ill. ; 23 cm. |
Disciplina | 004/.068/4 |
Soggetto topico |
Computer networks - Security measures
Electronic data processing departments - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
9781555583279
155558327X |
Formato | Risorse elettroniche |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. -- Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. |
Record Nr. | UNISALENTO-991003247539707536 |
Erbschloe, Michael, 1951- | ||
Amsterdam ; Boston : Elsevier Digital Press, c2005 | ||
Risorse elettroniche | ||
Lo trovi qui: Univ. del Salento | ||
|