Implementing homeland security for enterprise IT:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston
Digital Press
2004
|
Schriftenreihe: | DP security
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Title from book cover on Web Page (viewed Oct. 26, 2005) May be limited to subscribing institutions Includes bibliographical references and index This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action |
Beschreibung: | 1 Online-Ressource (xxvii, 299 p.) |
ISBN: | 0080508502 1281072850 1555583121 9780080508504 9781281072856 9781555583125 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307385 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2004 |||| o||u| ||||||eng d | ||
020 | |a 0080508502 |c electronic bk. |9 0-08-050850-2 | ||
020 | |a 1281072850 |9 1-281-07285-0 | ||
020 | |a 1555583121 |9 1-55558-312-1 | ||
020 | |a 9780080508504 |c electronic bk. |9 978-0-08-050850-4 | ||
020 | |a 9781281072856 |9 978-1-281-07285-6 | ||
020 | |a 9781555583125 |9 978-1-55558-312-5 | ||
035 | |a (OCoLC)62158184 | ||
035 | |a (DE-599)BVBBV042307385 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Erbschloe, Michael |e Verfasser |4 aut | |
245 | 1 | 0 | |a Implementing homeland security for enterprise IT |c Michael Erbschloe |
264 | 1 | |a Boston |b Digital Press |c 2004 | |
300 | |a 1 Online-Ressource (xxvii, 299 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a DP security | |
500 | |a Title from book cover on Web Page (viewed Oct. 26, 2005) | ||
500 | |a May be limited to subscribing institutions | ||
500 | |a Includes bibliographical references and index | ||
500 | |a This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Cyberterrorism | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781555583125 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744377 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781555583125 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152892623421440 |
---|---|
any_adam_object | |
author | Erbschloe, Michael |
author_facet | Erbschloe, Michael |
author_role | aut |
author_sort | Erbschloe, Michael |
author_variant | m e me |
building | Verbundindex |
bvnumber | BV042307385 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)62158184 (DE-599)BVBBV042307385 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03345nmm a2200565zc 4500</leader><controlfield tag="001">BV042307385</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080508502</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-050850-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281072850</subfield><subfield code="9">1-281-07285-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555583121</subfield><subfield code="9">1-55558-312-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080508504</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-050850-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281072856</subfield><subfield code="9">978-1-281-07285-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583125</subfield><subfield code="9">978-1-55558-312-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)62158184</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307385</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Erbschloe, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementing homeland security for enterprise IT</subfield><subfield code="c">Michael Erbschloe</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Digital Press</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 299 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">DP security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from book cover on Web Page (viewed Oct. 26, 2005)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">May be limited to subscribing institutions</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781555583125</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744377</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781555583125</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307385 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:56Z |
institution | BVB |
isbn | 0080508502 1281072850 1555583121 9780080508504 9781281072856 9781555583125 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744377 |
oclc_num | 62158184 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxvii, 299 p.) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Digital Press |
record_format | marc |
series2 | DP security |
spelling | Erbschloe, Michael Verfasser aut Implementing homeland security for enterprise IT Michael Erbschloe Boston Digital Press 2004 1 Online-Ressource (xxvii, 299 p.) txt rdacontent c rdamedia cr rdacarrier DP security Title from book cover on Web Page (viewed Oct. 26, 2005) May be limited to subscribing institutions Includes bibliographical references and index This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Cyberterrorism fast Internet / Security measures fast Computer security Internet Security measures Computer networks Security measures Cyberterrorism http://www.sciencedirect.com/science/book/9781555583125 Verlag Volltext |
spellingShingle | Erbschloe, Michael Implementing homeland security for enterprise IT COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Cyberterrorism fast Internet / Security measures fast Computer security Internet Security measures Computer networks Security measures Cyberterrorism |
title | Implementing homeland security for enterprise IT |
title_auth | Implementing homeland security for enterprise IT |
title_exact_search | Implementing homeland security for enterprise IT |
title_full | Implementing homeland security for enterprise IT Michael Erbschloe |
title_fullStr | Implementing homeland security for enterprise IT Michael Erbschloe |
title_full_unstemmed | Implementing homeland security for enterprise IT Michael Erbschloe |
title_short | Implementing homeland security for enterprise IT |
title_sort | implementing homeland security for enterprise it |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Cyberterrorism fast Internet / Security measures fast Computer security Internet Security measures Computer networks Security measures Cyberterrorism |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Cyberterrorism Internet / Security measures Internet Security measures Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781555583125 |
work_keys_str_mv | AT erbschloemichael implementinghomelandsecurityforenterpriseit |