Cyber terrorism :: a guide for facility managers /
Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Lilburn, Ga. : New York :
Fairmont Press ; Marcel Dekker,
©2004.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks. |
Beschreibung: | 1 online resource (xii, 247 pages) : illustrations |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 0881734438 9780881734430 0824756851 9780824756857 0824742915 9780824742911 0203913116 9780203913116 088173442X 9780881734423 9786610096787 6610096783 |
Internformat
MARC
LEADER | 00000cam a22000004a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm55505379 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 040528s2004 gaua ob 001 0 eng d | ||
010 | |a 2003056513 | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d OCLCG |d OCLCQ |d TUU |d OCLCQ |d TEFOD |d MHW |d YDXCP |d COCUF |d UV0 |d QE2 |d IDEBK |d E7B |d AZU |d TULIB |d EBLCP |d OCLCO |d OCLCQ |d OCLCE |d N$T |d NLGGC |d OCLCF |d OCLCO |d OCLCQ |d VVJ |d OCLCQ |d C7D |d FVL |d OCLCQ |d AZK |d AGLDB |d OCLCQ |d PIFBR |d TYFRS |d OCLCQ |d JBG |d MERUC |d OCLCQ |d SAV |d OCLCA |d UAB |d WY@ |d OCLCQ |d OCLCA |d LUE |d OCLCQ |d GILDS |d VNS |d OCLCQ |d VTS |d CEF |d INT |d OCLCQ |d LHU |d N$T |d BRX |d STF |d G3B |d CNTRU |d OCLCQ |d VT2 |d K6U |d SFB |d OCLCQ |d UKSSU |d OCLCQ |d OCLCO |d OCLCQ |d CNNOR |d YDX |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
019 | |a 54080328 |a 55742569 |a 61280562 |a 61503868 |a 66902235 |a 171119394 |a 206498450 |a 264436991 |a 288953696 |a 456016373 |a 519659022 |a 531162576 |a 607381675 |a 647400565 |a 696025500 |a 731251138 |a 779919926 |a 791527105 |a 844682266 |a 961652711 |a 962673591 |a 974516330 |a 974572271 |a 992054805 |a 992108434 |a 1000435471 |a 1003755478 |a 1004467794 |a 1004783619 |a 1008917285 |a 1010990606 |a 1013721665 |a 1017975043 |a 1021232628 |a 1033569308 |a 1038402237 |a 1044143052 |a 1044330185 |a 1047896484 |a 1053104886 |a 1056287175 |a 1056403418 |a 1060807927 |a 1073054261 |a 1079933222 |a 1082314061 |a 1088326162 |a 1091256229 |a 1097305397 |a 1097321846 |a 1100555312 |a 1107339804 |a 1119004466 |a 1125406068 |a 1125682252 |a 1128020263 |a 1135406537 |a 1136215840 |a 1136448358 |a 1154819631 |a 1162027538 |a 1230404976 |a 1232126236 |a 1241895222 |a 1247718319 |a 1257340645 |a 1281713083 |a 1295642330 | ||
020 | |a 0881734438 |q (electronic bk.) | ||
020 | |a 9780881734430 |q (electronic bk.) | ||
020 | |a 0824756851 |q (electronic bk. ; |q Adobe Reader) | ||
020 | |a 9780824756857 |q (electronic bk. ; |q Adobe Reader) | ||
020 | |a 0824742915 |q (Cloth) | ||
020 | |a 9780824742911 |q (Cloth) | ||
020 | |a 0203913116 |q (electronic bk.) | ||
020 | |a 9780203913116 |q (electronic bk.) | ||
020 | |a 088173442X |q (print) | ||
020 | |a 9780881734423 |q (print) | ||
020 | |a 9786610096787 | ||
020 | |a 6610096783 | ||
024 | 8 | |a 9786610096787 | |
035 | |a (OCoLC)55505379 |z (OCoLC)54080328 |z (OCoLC)55742569 |z (OCoLC)61280562 |z (OCoLC)61503868 |z (OCoLC)66902235 |z (OCoLC)171119394 |z (OCoLC)206498450 |z (OCoLC)264436991 |z (OCoLC)288953696 |z (OCoLC)456016373 |z (OCoLC)519659022 |z (OCoLC)531162576 |z (OCoLC)607381675 |z (OCoLC)647400565 |z (OCoLC)696025500 |z (OCoLC)731251138 |z (OCoLC)779919926 |z (OCoLC)791527105 |z (OCoLC)844682266 |z (OCoLC)961652711 |z (OCoLC)962673591 |z (OCoLC)974516330 |z (OCoLC)974572271 |z (OCoLC)992054805 |z (OCoLC)992108434 |z (OCoLC)1000435471 |z (OCoLC)1003755478 |z (OCoLC)1004467794 |z (OCoLC)1004783619 |z (OCoLC)1008917285 |z (OCoLC)1010990606 |z (OCoLC)1013721665 |z (OCoLC)1017975043 |z (OCoLC)1021232628 |z (OCoLC)1033569308 |z (OCoLC)1038402237 |z (OCoLC)1044143052 |z (OCoLC)1044330185 |z (OCoLC)1047896484 |z (OCoLC)1053104886 |z (OCoLC)1056287175 |z (OCoLC)1056403418 |z (OCoLC)1060807927 |z (OCoLC)1073054261 |z (OCoLC)1079933222 |z (OCoLC)1082314061 |z (OCoLC)1088326162 |z (OCoLC)1091256229 |z (OCoLC)1097305397 |z (OCoLC)1097321846 |z (OCoLC)1100555312 |z (OCoLC)1107339804 |z (OCoLC)1119004466 |z (OCoLC)1125406068 |z (OCoLC)1125682252 |z (OCoLC)1128020263 |z (OCoLC)1135406537 |z (OCoLC)1136215840 |z (OCoLC)1136448358 |z (OCoLC)1154819631 |z (OCoLC)1162027538 |z (OCoLC)1230404976 |z (OCoLC)1232126236 |z (OCoLC)1241895222 |z (OCoLC)1247718319 |z (OCoLC)1257340645 |z (OCoLC)1281713083 |z (OCoLC)1295642330 | ||
037 | |b OverDrive, Inc. |n http://www.overdrive.com | ||
042 | |a dlr | ||
050 | 4 | |a HV6773 |b .G87 2004eb | |
055 | 1 | 3 | |a HV6773 |b .G87 2004eb |
072 | 7 | |a BUS |x 097000 |2 bisacsh | |
072 | 7 | |a BUS |x 104000 |2 bisacsh | |
072 | 7 | |a BUS |x 071000 |2 bisacsh | |
072 | 7 | |a BUS |x 103000 |2 bisacsh | |
082 | 7 | |a 658.4/78 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Gustin, Joseph F., |d 1947- |1 https://id.oclc.org/worldcat/entity/E39PCjDxRrC8YctB6kyBxv9KwK |0 http://id.loc.gov/authorities/names/n96110584 | |
245 | 1 | 0 | |a Cyber terrorism : |b a guide for facility managers / |c by Joseph F. Gustin. |
260 | |a Lilburn, Ga. : |b Fairmont Press ; |a New York : |b Marcel Dekker, |c ©2004. | ||
300 | |a 1 online resource (xii, 247 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Table of Contents; Preface; Introduction; Technology and the Facility Manager; Computer and Data Protection -- The Cyber Dimension; Computer and Data Protection -- The Physical Dimension; Business Continuity -- Loss Prevention Strategies; Personnel User Issues; Standby Power Systems; Web Sites -- The Cornerstone of E-Commerce; Communications And Training; Recovery Planning; Cyber Crime -- Handling the Threat; Appendix I Template for Security Plan; Appendix II Glossary; Appendix III System Questionnaire; Appendix IV Sample IT Contingency Plan Format; Appendix V FBI Field Offices; Index. | |
520 | |a Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks. | ||
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [Place of publication not identified] : |c HathiTrust Digital Library, |d 2010. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2010 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
546 | |a English. | ||
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Cyberterrorism |x Prevention. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Facility management. |0 http://id.loc.gov/authorities/subjects/sh85046812 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Implantation (Organisation) |x Planification. | |
650 | 7 | |a facility management. |2 aat | |
650 | 7 | |a BUSINESS & ECONOMICS |x Workplace Culture. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Corporate Governance. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Leadership. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Development. |2 bisacsh | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyberterrorism |x Prevention |2 fast | |
650 | 7 | |a Facility management |2 fast | |
650 | 7 | |a Crime informatique. |2 rasuqam | |
650 | 7 | |a Cyberterrorisme. |2 rasuqam | |
650 | 7 | |a Impartition informatique. |2 rasuqam | |
650 | 7 | |a Sécurité informatique. |2 rasuqam | |
758 | |i has work: |a Cyber terrorism (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFQGFGqGgyr9QGJDmXGKBd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Gustin, Joseph F., 1947- |t Cyber terrorism. |d Lilburn, Ga. : Fairmont Press ; New York : Marcel Dekker, ©2004 |z 088173442X |z 0881734438 |w (DLC) 2003056513 |w (OCoLC)52520602 |
776 | 0 | 8 | |i Online version: |a Gustin, Joseph F., 1947- |t Cyber terrorism. |d Lilburn, Ga. : Fairmont Press ; New York : Marcel Dekker, ©2004 |w (OCoLC)844682266 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=107520 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=111910 |3 Volltext |
938 | |a YBP Library Services |b YANK |n 17749680 | ||
938 | |a ebrary |b EBRY |n ebr10094388 | ||
938 | |a EBSCOhost |b EBSC |n 107520 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 9678 | ||
938 | |a Taylor & Francis |b TAFR |n 9780203913116 | ||
938 | |a YBP Library Services |b YANK |n 2344340 | ||
938 | |a YBP Library Services |b YANK |n 2397123 | ||
938 | |a YBP Library Services |b YANK |n 2589715 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL216539 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm55505379 |
---|---|
_version_ | 1816881615433891840 |
adam_text | |
any_adam_object | |
author | Gustin, Joseph F., 1947- |
author_GND | http://id.loc.gov/authorities/names/n96110584 |
author_facet | Gustin, Joseph F., 1947- |
author_role | |
author_sort | Gustin, Joseph F., 1947- |
author_variant | j f g jf jfg |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 .G87 2004eb |
callnumber-search | HV6773 .G87 2004eb |
callnumber-sort | HV 46773 G87 42004EB |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Table of Contents; Preface; Introduction; Technology and the Facility Manager; Computer and Data Protection -- The Cyber Dimension; Computer and Data Protection -- The Physical Dimension; Business Continuity -- Loss Prevention Strategies; Personnel User Issues; Standby Power Systems; Web Sites -- The Cornerstone of E-Commerce; Communications And Training; Recovery Planning; Cyber Crime -- Handling the Threat; Appendix I Template for Security Plan; Appendix II Glossary; Appendix III System Questionnaire; Appendix IV Sample IT Contingency Plan Format; Appendix V FBI Field Offices; Index. |
ctrlnum | (OCoLC)55505379 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08005cam a22010214a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm55505379 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu|||unuuu</controlfield><controlfield tag="008">040528s2004 gaua ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2003056513</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TEFOD</subfield><subfield code="d">MHW</subfield><subfield code="d">YDXCP</subfield><subfield code="d">COCUF</subfield><subfield code="d">UV0</subfield><subfield code="d">QE2</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">AZU</subfield><subfield code="d">TULIB</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCE</subfield><subfield code="d">N$T</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VVJ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">C7D</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">PIFBR</subfield><subfield code="d">TYFRS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCA</subfield><subfield code="d">UAB</subfield><subfield code="d">WY@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">GILDS</subfield><subfield code="d">VNS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LHU</subfield><subfield code="d">N$T</subfield><subfield code="d">BRX</subfield><subfield code="d">STF</subfield><subfield code="d">G3B</subfield><subfield code="d">CNTRU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">K6U</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKSSU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CNNOR</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">54080328</subfield><subfield code="a">55742569</subfield><subfield code="a">61280562</subfield><subfield code="a">61503868</subfield><subfield code="a">66902235</subfield><subfield code="a">171119394</subfield><subfield code="a">206498450</subfield><subfield code="a">264436991</subfield><subfield code="a">288953696</subfield><subfield code="a">456016373</subfield><subfield code="a">519659022</subfield><subfield code="a">531162576</subfield><subfield code="a">607381675</subfield><subfield code="a">647400565</subfield><subfield code="a">696025500</subfield><subfield code="a">731251138</subfield><subfield code="a">779919926</subfield><subfield code="a">791527105</subfield><subfield code="a">844682266</subfield><subfield code="a">961652711</subfield><subfield code="a">962673591</subfield><subfield code="a">974516330</subfield><subfield code="a">974572271</subfield><subfield code="a">992054805</subfield><subfield code="a">992108434</subfield><subfield code="a">1000435471</subfield><subfield code="a">1003755478</subfield><subfield code="a">1004467794</subfield><subfield code="a">1004783619</subfield><subfield code="a">1008917285</subfield><subfield code="a">1010990606</subfield><subfield code="a">1013721665</subfield><subfield code="a">1017975043</subfield><subfield code="a">1021232628</subfield><subfield code="a">1033569308</subfield><subfield code="a">1038402237</subfield><subfield code="a">1044143052</subfield><subfield code="a">1044330185</subfield><subfield code="a">1047896484</subfield><subfield code="a">1053104886</subfield><subfield code="a">1056287175</subfield><subfield code="a">1056403418</subfield><subfield code="a">1060807927</subfield><subfield code="a">1073054261</subfield><subfield code="a">1079933222</subfield><subfield code="a">1082314061</subfield><subfield code="a">1088326162</subfield><subfield code="a">1091256229</subfield><subfield code="a">1097305397</subfield><subfield code="a">1097321846</subfield><subfield code="a">1100555312</subfield><subfield code="a">1107339804</subfield><subfield code="a">1119004466</subfield><subfield code="a">1125406068</subfield><subfield code="a">1125682252</subfield><subfield code="a">1128020263</subfield><subfield code="a">1135406537</subfield><subfield code="a">1136215840</subfield><subfield code="a">1136448358</subfield><subfield code="a">1154819631</subfield><subfield code="a">1162027538</subfield><subfield code="a">1230404976</subfield><subfield code="a">1232126236</subfield><subfield code="a">1241895222</subfield><subfield code="a">1247718319</subfield><subfield code="a">1257340645</subfield><subfield code="a">1281713083</subfield><subfield code="a">1295642330</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0881734438</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780881734430</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0824756851</subfield><subfield code="q">(electronic bk. ;</subfield><subfield code="q">Adobe Reader)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780824756857</subfield><subfield code="q">(electronic bk. ;</subfield><subfield code="q">Adobe Reader)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0824742915</subfield><subfield code="q">(Cloth)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780824742911</subfield><subfield code="q">(Cloth)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0203913116</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780203913116</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">088173442X</subfield><subfield code="q">(print)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780881734423</subfield><subfield code="q">(print)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786610096787</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6610096783</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">9786610096787</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)55505379</subfield><subfield code="z">(OCoLC)54080328</subfield><subfield code="z">(OCoLC)55742569</subfield><subfield code="z">(OCoLC)61280562</subfield><subfield code="z">(OCoLC)61503868</subfield><subfield code="z">(OCoLC)66902235</subfield><subfield code="z">(OCoLC)171119394</subfield><subfield code="z">(OCoLC)206498450</subfield><subfield code="z">(OCoLC)264436991</subfield><subfield code="z">(OCoLC)288953696</subfield><subfield code="z">(OCoLC)456016373</subfield><subfield code="z">(OCoLC)519659022</subfield><subfield code="z">(OCoLC)531162576</subfield><subfield code="z">(OCoLC)607381675</subfield><subfield code="z">(OCoLC)647400565</subfield><subfield code="z">(OCoLC)696025500</subfield><subfield code="z">(OCoLC)731251138</subfield><subfield code="z">(OCoLC)779919926</subfield><subfield code="z">(OCoLC)791527105</subfield><subfield code="z">(OCoLC)844682266</subfield><subfield code="z">(OCoLC)961652711</subfield><subfield code="z">(OCoLC)962673591</subfield><subfield code="z">(OCoLC)974516330</subfield><subfield code="z">(OCoLC)974572271</subfield><subfield code="z">(OCoLC)992054805</subfield><subfield code="z">(OCoLC)992108434</subfield><subfield code="z">(OCoLC)1000435471</subfield><subfield code="z">(OCoLC)1003755478</subfield><subfield code="z">(OCoLC)1004467794</subfield><subfield code="z">(OCoLC)1004783619</subfield><subfield code="z">(OCoLC)1008917285</subfield><subfield code="z">(OCoLC)1010990606</subfield><subfield code="z">(OCoLC)1013721665</subfield><subfield code="z">(OCoLC)1017975043</subfield><subfield code="z">(OCoLC)1021232628</subfield><subfield code="z">(OCoLC)1033569308</subfield><subfield code="z">(OCoLC)1038402237</subfield><subfield code="z">(OCoLC)1044143052</subfield><subfield code="z">(OCoLC)1044330185</subfield><subfield code="z">(OCoLC)1047896484</subfield><subfield code="z">(OCoLC)1053104886</subfield><subfield code="z">(OCoLC)1056287175</subfield><subfield code="z">(OCoLC)1056403418</subfield><subfield code="z">(OCoLC)1060807927</subfield><subfield code="z">(OCoLC)1073054261</subfield><subfield code="z">(OCoLC)1079933222</subfield><subfield code="z">(OCoLC)1082314061</subfield><subfield code="z">(OCoLC)1088326162</subfield><subfield code="z">(OCoLC)1091256229</subfield><subfield code="z">(OCoLC)1097305397</subfield><subfield code="z">(OCoLC)1097321846</subfield><subfield code="z">(OCoLC)1100555312</subfield><subfield code="z">(OCoLC)1107339804</subfield><subfield code="z">(OCoLC)1119004466</subfield><subfield code="z">(OCoLC)1125406068</subfield><subfield code="z">(OCoLC)1125682252</subfield><subfield code="z">(OCoLC)1128020263</subfield><subfield code="z">(OCoLC)1135406537</subfield><subfield code="z">(OCoLC)1136215840</subfield><subfield code="z">(OCoLC)1136448358</subfield><subfield code="z">(OCoLC)1154819631</subfield><subfield code="z">(OCoLC)1162027538</subfield><subfield code="z">(OCoLC)1230404976</subfield><subfield code="z">(OCoLC)1232126236</subfield><subfield code="z">(OCoLC)1241895222</subfield><subfield code="z">(OCoLC)1247718319</subfield><subfield code="z">(OCoLC)1257340645</subfield><subfield code="z">(OCoLC)1281713083</subfield><subfield code="z">(OCoLC)1295642330</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">dlr</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773</subfield><subfield code="b">.G87 2004eb</subfield></datafield><datafield tag="055" ind1="1" ind2="3"><subfield code="a">HV6773</subfield><subfield code="b">.G87 2004eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">097000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">104000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">071000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">103000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gustin, Joseph F.,</subfield><subfield code="d">1947-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjDxRrC8YctB6kyBxv9KwK</subfield><subfield code="0">http://id.loc.gov/authorities/names/n96110584</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber terrorism :</subfield><subfield code="b">a guide for facility managers /</subfield><subfield code="c">by Joseph F. Gustin.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Lilburn, Ga. :</subfield><subfield code="b">Fairmont Press ;</subfield><subfield code="a">New York :</subfield><subfield code="b">Marcel Dekker,</subfield><subfield code="c">©2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 247 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Table of Contents; Preface; Introduction; Technology and the Facility Manager; Computer and Data Protection -- The Cyber Dimension; Computer and Data Protection -- The Physical Dimension; Business Continuity -- Loss Prevention Strategies; Personnel User Issues; Standby Power Systems; Web Sites -- The Cornerstone of E-Commerce; Communications And Training; Recovery Planning; Cyber Crime -- Handling the Threat; Appendix I Template for Security Plan; Appendix II Glossary; Appendix III System Questionnaire; Appendix IV Sample IT Contingency Plan Format; Appendix V FBI Field Offices; Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[Place of publication not identified] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2010.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2010</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Facility management.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85046812</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Implantation (Organisation)</subfield><subfield code="x">Planification.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">facility management.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Workplace Culture.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Corporate Governance.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Leadership.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Organizational Development.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Facility management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Crime informatique.</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorisme.</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Impartition informatique.</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Sécurité informatique.</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cyber terrorism (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFQGFGqGgyr9QGJDmXGKBd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Gustin, Joseph F., 1947-</subfield><subfield code="t">Cyber terrorism.</subfield><subfield code="d">Lilburn, Ga. : Fairmont Press ; New York : Marcel Dekker, ©2004</subfield><subfield code="z">088173442X</subfield><subfield code="z">0881734438</subfield><subfield code="w">(DLC) 2003056513</subfield><subfield code="w">(OCoLC)52520602</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Online version:</subfield><subfield code="a">Gustin, Joseph F., 1947-</subfield><subfield code="t">Cyber terrorism.</subfield><subfield code="d">Lilburn, Ga. : Fairmont Press ; New York : Marcel Dekker, ©2004</subfield><subfield code="w">(OCoLC)844682266</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=107520</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=111910</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">17749680</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10094388</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">107520</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">9678</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Taylor & Francis</subfield><subfield code="b">TAFR</subfield><subfield code="n">9780203913116</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2344340</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2397123</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2589715</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL216539</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm55505379 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:32Z |
institution | BVB |
isbn | 0881734438 9780881734430 0824756851 9780824756857 0824742915 9780824742911 0203913116 9780203913116 088173442X 9780881734423 9786610096787 6610096783 |
language | English |
lccn | 2003056513 |
oclc_num | 55505379 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xii, 247 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Fairmont Press ; Marcel Dekker, |
record_format | marc |
spelling | Gustin, Joseph F., 1947- https://id.oclc.org/worldcat/entity/E39PCjDxRrC8YctB6kyBxv9KwK http://id.loc.gov/authorities/names/n96110584 Cyber terrorism : a guide for facility managers / by Joseph F. Gustin. Lilburn, Ga. : Fairmont Press ; New York : Marcel Dekker, ©2004. 1 online resource (xii, 247 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Print version record. Table of Contents; Preface; Introduction; Technology and the Facility Manager; Computer and Data Protection -- The Cyber Dimension; Computer and Data Protection -- The Physical Dimension; Business Continuity -- Loss Prevention Strategies; Personnel User Issues; Standby Power Systems; Web Sites -- The Cornerstone of E-Commerce; Communications And Training; Recovery Planning; Cyber Crime -- Handling the Threat; Appendix I Template for Security Plan; Appendix II Glossary; Appendix III System Questionnaire; Appendix IV Sample IT Contingency Plan Format; Appendix V FBI Field Offices; Index. Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks. Use copy Restrictions unspecified star MiAaHDL Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL English. Computer crimes Prevention. Cyberterrorism Prevention. Computer security. Facility management. http://id.loc.gov/authorities/subjects/sh85046812 Sécurité informatique. Implantation (Organisation) Planification. facility management. aat BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Computer crimes Prevention fast Computer security fast Cyberterrorism Prevention fast Facility management fast Crime informatique. rasuqam Cyberterrorisme. rasuqam Impartition informatique. rasuqam Sécurité informatique. rasuqam has work: Cyber terrorism (Text) https://id.oclc.org/worldcat/entity/E39PCFQGFGqGgyr9QGJDmXGKBd https://id.oclc.org/worldcat/ontology/hasWork Print version: Gustin, Joseph F., 1947- Cyber terrorism. Lilburn, Ga. : Fairmont Press ; New York : Marcel Dekker, ©2004 088173442X 0881734438 (DLC) 2003056513 (OCoLC)52520602 Online version: Gustin, Joseph F., 1947- Cyber terrorism. Lilburn, Ga. : Fairmont Press ; New York : Marcel Dekker, ©2004 (OCoLC)844682266 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=107520 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=111910 Volltext |
spellingShingle | Gustin, Joseph F., 1947- Cyber terrorism : a guide for facility managers / Table of Contents; Preface; Introduction; Technology and the Facility Manager; Computer and Data Protection -- The Cyber Dimension; Computer and Data Protection -- The Physical Dimension; Business Continuity -- Loss Prevention Strategies; Personnel User Issues; Standby Power Systems; Web Sites -- The Cornerstone of E-Commerce; Communications And Training; Recovery Planning; Cyber Crime -- Handling the Threat; Appendix I Template for Security Plan; Appendix II Glossary; Appendix III System Questionnaire; Appendix IV Sample IT Contingency Plan Format; Appendix V FBI Field Offices; Index. Computer crimes Prevention. Cyberterrorism Prevention. Computer security. Facility management. http://id.loc.gov/authorities/subjects/sh85046812 Sécurité informatique. Implantation (Organisation) Planification. facility management. aat BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Computer crimes Prevention fast Computer security fast Cyberterrorism Prevention fast Facility management fast Crime informatique. rasuqam Cyberterrorisme. rasuqam Impartition informatique. rasuqam Sécurité informatique. rasuqam |
subject_GND | http://id.loc.gov/authorities/subjects/sh85046812 |
title | Cyber terrorism : a guide for facility managers / |
title_auth | Cyber terrorism : a guide for facility managers / |
title_exact_search | Cyber terrorism : a guide for facility managers / |
title_full | Cyber terrorism : a guide for facility managers / by Joseph F. Gustin. |
title_fullStr | Cyber terrorism : a guide for facility managers / by Joseph F. Gustin. |
title_full_unstemmed | Cyber terrorism : a guide for facility managers / by Joseph F. Gustin. |
title_short | Cyber terrorism : |
title_sort | cyber terrorism a guide for facility managers |
title_sub | a guide for facility managers / |
topic | Computer crimes Prevention. Cyberterrorism Prevention. Computer security. Facility management. http://id.loc.gov/authorities/subjects/sh85046812 Sécurité informatique. Implantation (Organisation) Planification. facility management. aat BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Computer crimes Prevention fast Computer security fast Cyberterrorism Prevention fast Facility management fast Crime informatique. rasuqam Cyberterrorisme. rasuqam Impartition informatique. rasuqam Sécurité informatique. rasuqam |
topic_facet | Computer crimes Prevention. Cyberterrorism Prevention. Computer security. Facility management. Sécurité informatique. Implantation (Organisation) Planification. facility management. BUSINESS & ECONOMICS Workplace Culture. BUSINESS & ECONOMICS Corporate Governance. BUSINESS & ECONOMICS Leadership. BUSINESS & ECONOMICS Organizational Development. Computer crimes Prevention Computer security Cyberterrorism Prevention Facility management Crime informatique. Cyberterrorisme. Impartition informatique. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=107520 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=111910 |
work_keys_str_mv | AT gustinjosephf cyberterrorismaguideforfacilitymanagers |