Physical security for IT:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier Digital Press
c2005
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Includes bibliographical references and index The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. * Expert advice on identifying physical security needs * Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems * Explanation of the processes for establishing a physical IT security function * Step-by-step instructions on how to accomplish physical security objectives * Illustrations of the major elements of a physical IT security plan * Specific guidance on how to develop and document physical security methods and procedures |
Beschreibung: | 1 Online-Ressource (xix, 231 p.) |
ISBN: | 0080495907 155558327X 9780080495903 9781555583279 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307582 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2005 |||| o||u| ||||||eng d | ||
020 | |a 0080495907 |c electronic bk. |9 0-08-049590-7 | ||
020 | |a 155558327X |9 1-55558-327-X | ||
020 | |a 9780080495903 |c electronic bk. |9 978-0-08-049590-3 | ||
020 | |a 9781555583279 |9 978-1-55558-327-9 | ||
035 | |a (OCoLC)162595299 | ||
035 | |a (DE-599)BVBBV042307582 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 004/.068/4 |2 22 | |
100 | 1 | |a Erbschloe, Michael |e Verfasser |4 aut | |
245 | 1 | 0 | |a Physical security for IT |c Michael Erbschloe |
264 | 1 | |a Amsterdam |b Elsevier Digital Press |c c2005 | |
300 | |a 1 Online-Ressource (xix, 231 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. * Expert advice on identifying physical security needs * Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems * Explanation of the processes for establishing a physical IT security function * Step-by-step instructions on how to accomplish physical security objectives * Illustrations of the major elements of a physical IT security plan * Specific guidance on how to develop and document physical security methods and procedures | ||
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Electronic data processing departments / Security measures |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Electronic data processing departments |x Security measures | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781555583279 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744574 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781555583279 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152893040754688 |
---|---|
any_adam_object | |
author | Erbschloe, Michael |
author_facet | Erbschloe, Michael |
author_role | aut |
author_sort | Erbschloe, Michael |
author_variant | m e me |
building | Verbundindex |
bvnumber | BV042307582 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)162595299 (DE-599)BVBBV042307582 |
dewey-full | 004/.068/4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004/.068/4 |
dewey-search | 004/.068/4 |
dewey-sort | 14 268 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03768nmm a2200517zc 4500</leader><controlfield tag="001">BV042307582</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080495907</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-049590-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">155558327X</subfield><subfield code="9">1-55558-327-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080495903</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-049590-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583279</subfield><subfield code="9">978-1-55558-327-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162595299</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307582</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004/.068/4</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Erbschloe, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Physical security for IT</subfield><subfield code="c">Michael Erbschloe</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier Digital Press</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 231 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. * Expert advice on identifying physical security needs * Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems * Explanation of the processes for establishing a physical IT security function * Step-by-step instructions on how to accomplish physical security objectives * Illustrations of the major elements of a physical IT security plan * Specific guidance on how to develop and document physical security methods and procedures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing departments / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781555583279</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744574</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781555583279</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307582 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:56Z |
institution | BVB |
isbn | 0080495907 155558327X 9780080495903 9781555583279 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744574 |
oclc_num | 162595299 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xix, 231 p.) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Elsevier Digital Press |
record_format | marc |
spelling | Erbschloe, Michael Verfasser aut Physical security for IT Michael Erbschloe Amsterdam Elsevier Digital Press c2005 1 Online-Ressource (xix, 231 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. * Expert advice on identifying physical security needs * Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems * Explanation of the processes for establishing a physical IT security function * Step-by-step instructions on how to accomplish physical security objectives * Illustrations of the major elements of a physical IT security plan * Specific guidance on how to develop and document physical security methods and procedures COMPUTERS / Reference bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Computer Literacy bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Hardware / General bisacsh Computer networks / Security measures fast Electronic data processing departments / Security measures fast Informatik Computer networks Security measures Electronic data processing departments Security measures http://www.sciencedirect.com/science/book/9781555583279 Verlag Volltext |
spellingShingle | Erbschloe, Michael Physical security for IT COMPUTERS / Reference bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Computer Literacy bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Hardware / General bisacsh Computer networks / Security measures fast Electronic data processing departments / Security measures fast Informatik Computer networks Security measures Electronic data processing departments Security measures |
title | Physical security for IT |
title_auth | Physical security for IT |
title_exact_search | Physical security for IT |
title_full | Physical security for IT Michael Erbschloe |
title_fullStr | Physical security for IT Michael Erbschloe |
title_full_unstemmed | Physical security for IT Michael Erbschloe |
title_short | Physical security for IT |
title_sort | physical security for it |
topic | COMPUTERS / Reference bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Computer Literacy bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Hardware / General bisacsh Computer networks / Security measures fast Electronic data processing departments / Security measures fast Informatik Computer networks Security measures Electronic data processing departments Security measures |
topic_facet | COMPUTERS / Reference COMPUTERS / Machine Theory COMPUTERS / Computer Literacy COMPUTERS / Information Technology COMPUTERS / Data Processing COMPUTERS / Computer Science COMPUTERS / Hardware / General Computer networks / Security measures Electronic data processing departments / Security measures Informatik Computer networks Security measures Electronic data processing departments Security measures |
url | http://www.sciencedirect.com/science/book/9781555583279 |
work_keys_str_mv | AT erbschloemichael physicalsecurityforit |