Implementing homeland security for enterprise IT /:
This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston :
Digital Press,
2004.
|
Schriftenreihe: | DP security.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action. |
Beschreibung: | Title from book cover on Web Page (viewed October 26, 2005). |
Beschreibung: | 1 online resource (xxvii, 299 pages :) |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780080508504 0080508502 1281072850 9781281072856 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm62158184 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr nn||||||||| | ||
008 | 051026s2004 maua ob 001 0 eng d | ||
010 | |z 2003062590 | ||
040 | |a NTG |b eng |e pn |c NTG |d BMU |d N$T |d YDXCP |d OCLCE |d OCLCQ |d E7B |d IDEBK |d OCLCQ |d OCLCO |d OCLCQ |d OCLCF |d OPELS |d OKU |d OCLCO |d OCLCQ |d OCLCO |d ZCU |d B24X7 |d OCLCQ |d AGLDB |d OCLCQ |d OCLCA |d D6H |d OCLCQ |d VTS |d STF |d AJS |d OCLCQ |d OCLCO |d COM |d OCLCQ |d INARC |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
019 | |a 162595173 |a 181087780 |a 507230365 |a 607021535 |a 608167590 |a 823830560 |a 823900266 |a 824091534 |a 824139759 |a 974196563 |a 974442562 |a 980227112 |a 1391560955 | ||
020 | |a 9780080508504 |q (electronic bk.) | ||
020 | |a 0080508502 |q (electronic bk.) | ||
020 | |a 1281072850 | ||
020 | |a 9781281072856 | ||
020 | |z 1555583121 | ||
020 | |z 9781555583125 | ||
035 | |a (OCoLC)62158184 |z (OCoLC)162595173 |z (OCoLC)181087780 |z (OCoLC)507230365 |z (OCoLC)607021535 |z (OCoLC)608167590 |z (OCoLC)823830560 |z (OCoLC)823900266 |z (OCoLC)824091534 |z (OCoLC)824139759 |z (OCoLC)974196563 |z (OCoLC)974442562 |z (OCoLC)980227112 |z (OCoLC)1391560955 | ||
037 | |a 103626:103646 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
042 | |a dlr | ||
050 | 4 | |a QA76.9.A25 |b E74 2004b | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a JP |2 bicssc | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Erbschloe, Michael. | |
245 | 1 | 0 | |a Implementing homeland security for enterprise IT / |c Michael Erbschloe. |
260 | |a Boston : |b Digital Press, |c 2004. | ||
300 | |a 1 online resource (xxvii, 299 pages :) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a DP security | |
500 | |a Title from book cover on Web Page (viewed October 26, 2005). | ||
504 | |a Includes bibliographical references and index. | ||
550 | |a May be limited to subscribing institutions. | ||
505 | 0 | |a Organizing homeland security efforts -- Cross-sector security priorities and issues -- Security and critical infrastructures -- Information sharing for protecting national assets -- Homeland security initiatives by sector -- Why a national strategy to secure cyberspace is important -- Participating in a national cyberspace security response system -- Participating in a national threat and vulnerability reduction program -- Launching a national cyberspace security awareness and training program -- Working to secure governments' cyberspace -- Global cyberspace security cooperation -- Moving into the future. | |
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
520 | |a This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action. | ||
533 | |a Electronic reproduction. |b [Place of publication not identified] : |c HathiTrust Digital Library, |d 2010. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2010 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Internet |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Cyberterrorism. |0 http://id.loc.gov/authorities/subjects/sh00001974 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Internet |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Cyberterrorisme. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
758 | |i has work: |a Implementing homeland security for enterprise IT (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGp74TYDbF6Jc43xkqM96q |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Erbschloe, Michael, 1951- |t Implementing homeland security for enterprise IT. |d Burlington, MA : Digital Press, ©2004 |z 1555583121 |z 9781555583125 |w (DLC) 2003062590 |w (OCoLC)53084168 |
830 | 0 | |a DP security. | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781555583125 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781555583125 |3 Volltext | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210501 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210501 |3 Volltext | |
938 | |a Books 24x7 |b B247 |n bks00003445 | ||
938 | |a ebrary |b EBRY |n ebr10203518 | ||
938 | |a EBSCOhost |b EBSC |n 210501 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 107285 | ||
938 | |a YBP Library Services |b YANK |n 2732691 | ||
938 | |a Internet Archive |b INAR |n implementinghome0000erbs | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm62158184 |
---|---|
_version_ | 1813903286068051968 |
adam_text | |
any_adam_object | |
author | Erbschloe, Michael |
author_facet | Erbschloe, Michael |
author_role | |
author_sort | Erbschloe, Michael |
author_variant | m e me |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 E74 2004b |
callnumber-search | QA76.9.A25 E74 2004b |
callnumber-sort | QA 276.9 A25 E74 42004B |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Organizing homeland security efforts -- Cross-sector security priorities and issues -- Security and critical infrastructures -- Information sharing for protecting national assets -- Homeland security initiatives by sector -- Why a national strategy to secure cyberspace is important -- Participating in a national cyberspace security response system -- Participating in a national threat and vulnerability reduction program -- Launching a national cyberspace security awareness and training program -- Working to secure governments' cyberspace -- Global cyberspace security cooperation -- Moving into the future. |
ctrlnum | (OCoLC)62158184 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06353cam a2200865 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm62158184 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr nn|||||||||</controlfield><controlfield tag="008">051026s2004 maua ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2003062590</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NTG</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">NTG</subfield><subfield code="d">BMU</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OPELS</subfield><subfield code="d">OKU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">ZCU</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">STF</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">162595173</subfield><subfield code="a">181087780</subfield><subfield code="a">507230365</subfield><subfield code="a">607021535</subfield><subfield code="a">608167590</subfield><subfield code="a">823830560</subfield><subfield code="a">823900266</subfield><subfield code="a">824091534</subfield><subfield code="a">824139759</subfield><subfield code="a">974196563</subfield><subfield code="a">974442562</subfield><subfield code="a">980227112</subfield><subfield code="a">1391560955</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080508504</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080508502</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281072850</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281072856</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1555583121</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781555583125</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)62158184</subfield><subfield code="z">(OCoLC)162595173</subfield><subfield code="z">(OCoLC)181087780</subfield><subfield code="z">(OCoLC)507230365</subfield><subfield code="z">(OCoLC)607021535</subfield><subfield code="z">(OCoLC)608167590</subfield><subfield code="z">(OCoLC)823830560</subfield><subfield code="z">(OCoLC)823900266</subfield><subfield code="z">(OCoLC)824091534</subfield><subfield code="z">(OCoLC)824139759</subfield><subfield code="z">(OCoLC)974196563</subfield><subfield code="z">(OCoLC)974442562</subfield><subfield code="z">(OCoLC)980227112</subfield><subfield code="z">(OCoLC)1391560955</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">103626:103646</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">dlr</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">E74 2004b</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">JP</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Erbschloe, Michael.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementing homeland security for enterprise IT /</subfield><subfield code="c">Michael Erbschloe.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boston :</subfield><subfield code="b">Digital Press,</subfield><subfield code="c">2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvii, 299 pages :)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">DP security</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from book cover on Web Page (viewed October 26, 2005).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="550" ind1=" " ind2=" "><subfield code="a">May be limited to subscribing institutions.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Organizing homeland security efforts -- Cross-sector security priorities and issues -- Security and critical infrastructures -- Information sharing for protecting national assets -- Homeland security initiatives by sector -- Why a national strategy to secure cyberspace is important -- Participating in a national cyberspace security response system -- Participating in a national threat and vulnerability reduction program -- Launching a national cyberspace security awareness and training program -- Working to secure governments' cyberspace -- Global cyberspace security cooperation -- Moving into the future.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[Place of publication not identified] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2010.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2010</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00001974</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberterrorisme.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Implementing homeland security for enterprise IT (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGp74TYDbF6Jc43xkqM96q</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Erbschloe, Michael, 1951-</subfield><subfield code="t">Implementing homeland security for enterprise IT.</subfield><subfield code="d">Burlington, MA : Digital Press, ©2004</subfield><subfield code="z">1555583121</subfield><subfield code="z">9781555583125</subfield><subfield code="w">(DLC) 2003062590</subfield><subfield code="w">(OCoLC)53084168</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">DP security.</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781555583125</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781555583125</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210501</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210501</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00003445</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10203518</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">210501</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">107285</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2732691</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">implementinghome0000erbs</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm62158184 |
illustrated | Illustrated |
indexdate | 2024-10-25T16:16:16Z |
institution | BVB |
isbn | 9780080508504 0080508502 1281072850 9781281072856 |
language | English |
oclc_num | 62158184 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (xxvii, 299 pages :) |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Digital Press, |
record_format | marc |
series | DP security. |
series2 | DP security |
spelling | Erbschloe, Michael. Implementing homeland security for enterprise IT / Michael Erbschloe. Boston : Digital Press, 2004. 1 online resource (xxvii, 299 pages :) text txt rdacontent computer c rdamedia online resource cr rdacarrier DP security Title from book cover on Web Page (viewed October 26, 2005). Includes bibliographical references and index. May be limited to subscribing institutions. Organizing homeland security efforts -- Cross-sector security priorities and issues -- Security and critical infrastructures -- Information sharing for protecting national assets -- Homeland security initiatives by sector -- Why a national strategy to secure cyberspace is important -- Participating in a national cyberspace security response system -- Participating in a national threat and vulnerability reduction program -- Launching a national cyberspace security awareness and training program -- Working to secure governments' cyberspace -- Global cyberspace security cooperation -- Moving into the future. Use copy Restrictions unspecified star MiAaHDL This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action. Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL Computer security. Internet Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Cyberterrorisme. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Cyberterrorism fast Internet Security measures fast has work: Implementing homeland security for enterprise IT (Text) https://id.oclc.org/worldcat/entity/E39PCGp74TYDbF6Jc43xkqM96q https://id.oclc.org/worldcat/ontology/hasWork Print version: Erbschloe, Michael, 1951- Implementing homeland security for enterprise IT. Burlington, MA : Digital Press, ©2004 1555583121 9781555583125 (DLC) 2003062590 (OCoLC)53084168 DP security. FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781555583125 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781555583125 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210501 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210501 Volltext |
spellingShingle | Erbschloe, Michael Implementing homeland security for enterprise IT / DP security. Organizing homeland security efforts -- Cross-sector security priorities and issues -- Security and critical infrastructures -- Information sharing for protecting national assets -- Homeland security initiatives by sector -- Why a national strategy to secure cyberspace is important -- Participating in a national cyberspace security response system -- Participating in a national threat and vulnerability reduction program -- Launching a national cyberspace security awareness and training program -- Working to secure governments' cyberspace -- Global cyberspace security cooperation -- Moving into the future. Computer security. Internet Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Cyberterrorisme. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Cyberterrorism fast Internet Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh00001974 https://id.nlm.nih.gov/mesh/D016494 |
title | Implementing homeland security for enterprise IT / |
title_auth | Implementing homeland security for enterprise IT / |
title_exact_search | Implementing homeland security for enterprise IT / |
title_full | Implementing homeland security for enterprise IT / Michael Erbschloe. |
title_fullStr | Implementing homeland security for enterprise IT / Michael Erbschloe. |
title_full_unstemmed | Implementing homeland security for enterprise IT / Michael Erbschloe. |
title_short | Implementing homeland security for enterprise IT / |
title_sort | implementing homeland security for enterprise it |
topic | Computer security. Internet Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Cyberterrorisme. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Cyberterrorism fast Internet Security measures fast |
topic_facet | Computer security. Internet Security measures. Computer networks Security measures. Cyberterrorism. Computer Security Sécurité informatique. Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Cyberterrorisme. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security Cyberterrorism Internet Security measures |
url | https://www.sciencedirect.com/science/book/9781555583125 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210501 |
work_keys_str_mv | AT erbschloemichael implementinghomelandsecurityforenterpriseit |