Implementing homeland security for enterprise IT:
This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston
Digital Press
2004
|
Schriftenreihe: | DP security
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action |
Beschreibung: | Title from book cover on Web Page (viewed Oct. 26, 2005) Includes bibliographical references and index May be limited to subscribing institutions |
Beschreibung: | 1 online resource (xxvii, 299 pages) illustrations |
ISBN: | 9780080508504 0080508502 1281072850 9781281072856 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124300 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2004 |||| o||u| ||||||eng d | ||
020 | |a 9780080508504 |9 978-0-08-050850-4 | ||
020 | |a 0080508502 |9 0-08-050850-2 | ||
020 | |a 1281072850 |9 1-281-07285-0 | ||
020 | |a 9781281072856 |9 978-1-281-07285-6 | ||
035 | |a (ZDB-33-ESD)ocm62158184 | ||
035 | |a (OCoLC)62158184 | ||
035 | |a (DE-599)BVBBV046124300 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Erbschloe, Michael |e Verfasser |4 aut | |
245 | 1 | 0 | |a Implementing homeland security for enterprise IT |c Michael Erbschloe |
264 | 1 | |a Boston |b Digital Press |c 2004 | |
300 | |a 1 online resource (xxvii, 299 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a DP security | |
500 | |a Title from book cover on Web Page (viewed Oct. 26, 2005) | ||
500 | |a Includes bibliographical references and index | ||
500 | |a May be limited to subscribing institutions | ||
520 | |a This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Cyberterrorism | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1555583121 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781555583125 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781555583125 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504754 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781555583125 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442168950784 |
---|---|
any_adam_object | |
author | Erbschloe, Michael |
author_facet | Erbschloe, Michael |
author_role | aut |
author_sort | Erbschloe, Michael |
author_variant | m e me |
building | Verbundindex |
bvnumber | BV046124300 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm62158184 (OCoLC)62158184 (DE-599)BVBBV046124300 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03384nmm a2200553zc 4500</leader><controlfield tag="001">BV046124300</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080508504</subfield><subfield code="9">978-0-08-050850-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080508502</subfield><subfield code="9">0-08-050850-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281072850</subfield><subfield code="9">1-281-07285-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281072856</subfield><subfield code="9">978-1-281-07285-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm62158184</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)62158184</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124300</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Erbschloe, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementing homeland security for enterprise IT</subfield><subfield code="c">Michael Erbschloe</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Digital Press</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvii, 299 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">DP security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from book cover on Web Page (viewed Oct. 26, 2005)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">May be limited to subscribing institutions</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1555583121</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781555583125</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781555583125</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504754</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781555583125</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124300 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:49Z |
institution | BVB |
isbn | 9780080508504 0080508502 1281072850 9781281072856 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504754 |
oclc_num | 62158184 |
open_access_boolean | |
physical | 1 online resource (xxvii, 299 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Digital Press |
record_format | marc |
series2 | DP security |
spelling | Erbschloe, Michael Verfasser aut Implementing homeland security for enterprise IT Michael Erbschloe Boston Digital Press 2004 1 online resource (xxvii, 299 pages) illustrations txt rdacontent c rdamedia cr rdacarrier DP security Title from book cover on Web Page (viewed Oct. 26, 2005) Includes bibliographical references and index May be limited to subscribing institutions This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Cyberterrorism fast Internet / Security measures fast Computer security Internet Security measures Computer networks Security measures Cyberterrorism Erscheint auch als Druck-Ausgabe 1555583121 Erscheint auch als Druck-Ausgabe 9781555583125 http://www.sciencedirect.com/science/book/9781555583125 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Erbschloe, Michael Implementing homeland security for enterprise IT COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Cyberterrorism fast Internet / Security measures fast Computer security Internet Security measures Computer networks Security measures Cyberterrorism |
title | Implementing homeland security for enterprise IT |
title_auth | Implementing homeland security for enterprise IT |
title_exact_search | Implementing homeland security for enterprise IT |
title_full | Implementing homeland security for enterprise IT Michael Erbschloe |
title_fullStr | Implementing homeland security for enterprise IT Michael Erbschloe |
title_full_unstemmed | Implementing homeland security for enterprise IT Michael Erbschloe |
title_short | Implementing homeland security for enterprise IT |
title_sort | implementing homeland security for enterprise it |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Cyberterrorism fast Internet / Security measures fast Computer security Internet Security measures Computer networks Security measures Cyberterrorism |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Cyberterrorism Internet / Security measures Internet Security measures Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781555583125 |
work_keys_str_mv | AT erbschloemichael implementinghomelandsecurityforenterpriseit |