Physical security for IT /:
The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple a...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
Elsevier Digital Press,
©2005.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. * Expert advice on identifying physical security needs * Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems * Explanation of the processes for establishing a physical IT security function * Step-by-step instructions on how to accomplish physical security objectives * Illustrations of the major elements of a physical IT security plan * Specific guidance on how to develop and document physical security methods and procedures. |
Beschreibung: | 1 online resource (xix, 231 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781555583279 155558327X 0080495907 9780080495903 128101494X 9781281014948 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn162595299 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 070806s2005 ne a ob 001 0 eng d | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OKU |d OCLCQ |d NTG |d MERUC |d UBY |d E7B |d IDEBK |d B24X7 |d DEBBG |d N$T |d YDXCP |d OCLCQ |d OCLCF |d OCLCQ |d AGLDB |d LIV |d OCLCQ |d OCLCA |d STF |d D6H |d OCLCQ |d VTS |d OCLCQ |d COO |d LEAUB |d M8D |d OCLCQ |d OCLCO |d MHW |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
019 | |a 70969610 |a 166521087 |a 170922696 |a 441791164 |a 505089073 |a 648271667 |a 823827408 |a 823897118 |a 824088949 |a 824135340 |a 856952188 |a 1035705577 | ||
020 | |a 9781555583279 | ||
020 | |a 155558327X | ||
020 | |a 0080495907 |q (electronic bk.) | ||
020 | |a 9780080495903 |q (electronic bk.) | ||
020 | |a 128101494X | ||
020 | |a 9781281014948 | ||
035 | |a (OCoLC)162595299 |z (OCoLC)70969610 |z (OCoLC)166521087 |z (OCoLC)170922696 |z (OCoLC)441791164 |z (OCoLC)505089073 |z (OCoLC)648271667 |z (OCoLC)823827408 |z (OCoLC)823897118 |z (OCoLC)824088949 |z (OCoLC)824135340 |z (OCoLC)856952188 |z (OCoLC)1035705577 | ||
037 | |a 107881:107920 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.59 |b .E73 2005eb | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a U |2 bicssc | |
082 | 7 | |a 004/.068/4 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Erbschloe, Michael, |d 1951- |1 https://id.oclc.org/worldcat/entity/E39PBJfMfgJwHFXwjy8JJjRh73 | |
245 | 1 | 0 | |a Physical security for IT / |c Michael Erbschloe. |
260 | |a Amsterdam ; |a Boston : |b Elsevier Digital Press, |c ©2005. | ||
300 | |a 1 online resource (xix, 231 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Physical security overview -- Establishing a physical IT security function -- Developing an IT physical security plan -- Major elements of a physical IT security plan -- Developing and documenting methods and procedures -- Auditing and testing procedures -- The role of the incident response team -- Model training program for organization staff -- The future of physical security for IT assets. | |
520 | |a The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. * Expert advice on identifying physical security needs * Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems * Explanation of the processes for establishing a physical IT security function * Step-by-step instructions on how to accomplish physical security objectives * Illustrations of the major elements of a physical IT security plan * Specific guidance on how to develop and document physical security methods and procedures. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Electronic data processing departments |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh85042310 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Centres de traitement de l'information |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Electronic data processing departments |x Security measures |2 fast | |
758 | |i has work: |a Physical security for IT (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGcGGfRyP9jmYWycC97g83 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Erbschloe, Michael, 1951- |t Physical security for IT. |d Amsterdam ; Boston : Elsevier Digital Press, ©2005 |z 155558327X |z 9781555583279 |w (DLC) 2004023167 |w (OCoLC)56671950 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781555583279 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195631 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00005426 | ||
938 | |a ebrary |b EBRY |n ebr10180862 | ||
938 | |a EBSCOhost |b EBSC |n 195631 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 101494 | ||
938 | |a YBP Library Services |b YANK |n 2611469 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn162595299 |
---|---|
_version_ | 1816881651864567808 |
adam_text | |
any_adam_object | |
author | Erbschloe, Michael, 1951- |
author_facet | Erbschloe, Michael, 1951- |
author_role | |
author_sort | Erbschloe, Michael, 1951- |
author_variant | m e me |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .E73 2005eb |
callnumber-search | TK5105.59 .E73 2005eb |
callnumber-sort | TK 45105.59 E73 42005EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Physical security overview -- Establishing a physical IT security function -- Developing an IT physical security plan -- Major elements of a physical IT security plan -- Developing and documenting methods and procedures -- Auditing and testing procedures -- The role of the incident response team -- Model training program for organization staff -- The future of physical security for IT assets. |
ctrlnum | (OCoLC)162595299 |
dewey-full | 004/.068/4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004/.068/4 |
dewey-search | 004/.068/4 |
dewey-sort | 14 268 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06029cam a2200757 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn162595299</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">070806s2005 ne a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OKU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NTG</subfield><subfield code="d">MERUC</subfield><subfield code="d">UBY</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">B24X7</subfield><subfield code="d">DEBBG</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">70969610</subfield><subfield code="a">166521087</subfield><subfield code="a">170922696</subfield><subfield code="a">441791164</subfield><subfield code="a">505089073</subfield><subfield code="a">648271667</subfield><subfield code="a">823827408</subfield><subfield code="a">823897118</subfield><subfield code="a">824088949</subfield><subfield code="a">824135340</subfield><subfield code="a">856952188</subfield><subfield code="a">1035705577</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583279</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">155558327X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080495907</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080495903</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">128101494X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281014948</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162595299</subfield><subfield code="z">(OCoLC)70969610</subfield><subfield code="z">(OCoLC)166521087</subfield><subfield code="z">(OCoLC)170922696</subfield><subfield code="z">(OCoLC)441791164</subfield><subfield code="z">(OCoLC)505089073</subfield><subfield code="z">(OCoLC)648271667</subfield><subfield code="z">(OCoLC)823827408</subfield><subfield code="z">(OCoLC)823897118</subfield><subfield code="z">(OCoLC)824088949</subfield><subfield code="z">(OCoLC)824135340</subfield><subfield code="z">(OCoLC)856952188</subfield><subfield code="z">(OCoLC)1035705577</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">107881:107920</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.E73 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">U</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004/.068/4</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Erbschloe, Michael,</subfield><subfield code="d">1951-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJfMfgJwHFXwjy8JJjRh73</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Physical security for IT /</subfield><subfield code="c">Michael Erbschloe.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Elsevier Digital Press,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xix, 231 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Physical security overview -- Establishing a physical IT security function -- Developing an IT physical security plan -- Major elements of a physical IT security plan -- Developing and documenting methods and procedures -- Auditing and testing procedures -- The role of the incident response team -- Model training program for organization staff -- The future of physical security for IT assets.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. * Expert advice on identifying physical security needs * Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems * Explanation of the processes for establishing a physical IT security function * Step-by-step instructions on how to accomplish physical security objectives * Illustrations of the major elements of a physical IT security plan * Specific guidance on how to develop and document physical security methods and procedures.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85042310</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Centres de traitement de l'information</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Physical security for IT (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGcGGfRyP9jmYWycC97g83</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Erbschloe, Michael, 1951-</subfield><subfield code="t">Physical security for IT.</subfield><subfield code="d">Amsterdam ; Boston : Elsevier Digital Press, ©2005</subfield><subfield code="z">155558327X</subfield><subfield code="z">9781555583279</subfield><subfield code="w">(DLC) 2004023167</subfield><subfield code="w">(OCoLC)56671950</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781555583279</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195631</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00005426</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10180862</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">195631</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">101494</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2611469</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn162595299 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:07Z |
institution | BVB |
isbn | 9781555583279 155558327X 0080495907 9780080495903 128101494X 9781281014948 |
language | English |
oclc_num | 162595299 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xix, 231 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Elsevier Digital Press, |
record_format | marc |
spelling | Erbschloe, Michael, 1951- https://id.oclc.org/worldcat/entity/E39PBJfMfgJwHFXwjy8JJjRh73 Physical security for IT / Michael Erbschloe. Amsterdam ; Boston : Elsevier Digital Press, ©2005. 1 online resource (xix, 231 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Physical security overview -- Establishing a physical IT security function -- Developing an IT physical security plan -- Major elements of a physical IT security plan -- Developing and documenting methods and procedures -- Auditing and testing procedures -- The role of the incident response team -- Model training program for organization staff -- The future of physical security for IT assets. The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. * Expert advice on identifying physical security needs * Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems * Explanation of the processes for establishing a physical IT security function * Step-by-step instructions on how to accomplish physical security objectives * Illustrations of the major elements of a physical IT security plan * Specific guidance on how to develop and document physical security methods and procedures. Print version record. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Electronic data processing departments Security measures. http://id.loc.gov/authorities/subjects/sh85042310 Réseaux d'ordinateurs Sécurité Mesures. Centres de traitement de l'information Sécurité Mesures. COMPUTERS Reference. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Computer Literacy. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Hardware General. bisacsh Computer networks Security measures fast Electronic data processing departments Security measures fast has work: Physical security for IT (Text) https://id.oclc.org/worldcat/entity/E39PCGcGGfRyP9jmYWycC97g83 https://id.oclc.org/worldcat/ontology/hasWork Print version: Erbschloe, Michael, 1951- Physical security for IT. Amsterdam ; Boston : Elsevier Digital Press, ©2005 155558327X 9781555583279 (DLC) 2004023167 (OCoLC)56671950 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781555583279 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195631 Volltext |
spellingShingle | Erbschloe, Michael, 1951- Physical security for IT / Physical security overview -- Establishing a physical IT security function -- Developing an IT physical security plan -- Major elements of a physical IT security plan -- Developing and documenting methods and procedures -- Auditing and testing procedures -- The role of the incident response team -- Model training program for organization staff -- The future of physical security for IT assets. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Electronic data processing departments Security measures. http://id.loc.gov/authorities/subjects/sh85042310 Réseaux d'ordinateurs Sécurité Mesures. Centres de traitement de l'information Sécurité Mesures. COMPUTERS Reference. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Computer Literacy. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Hardware General. bisacsh Computer networks Security measures fast Electronic data processing departments Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85042310 |
title | Physical security for IT / |
title_auth | Physical security for IT / |
title_exact_search | Physical security for IT / |
title_full | Physical security for IT / Michael Erbschloe. |
title_fullStr | Physical security for IT / Michael Erbschloe. |
title_full_unstemmed | Physical security for IT / Michael Erbschloe. |
title_short | Physical security for IT / |
title_sort | physical security for it |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Electronic data processing departments Security measures. http://id.loc.gov/authorities/subjects/sh85042310 Réseaux d'ordinateurs Sécurité Mesures. Centres de traitement de l'information Sécurité Mesures. COMPUTERS Reference. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Computer Literacy. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Hardware General. bisacsh Computer networks Security measures fast Electronic data processing departments Security measures fast |
topic_facet | Computer networks Security measures. Electronic data processing departments Security measures. Réseaux d'ordinateurs Sécurité Mesures. Centres de traitement de l'information Sécurité Mesures. COMPUTERS Reference. COMPUTERS Machine Theory. COMPUTERS Computer Literacy. COMPUTERS Information Technology. COMPUTERS Data Processing. COMPUTERS Computer Science. COMPUTERS Hardware General. Computer networks Security measures Electronic data processing departments Security measures |
url | https://www.sciencedirect.com/science/book/9781555583279 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195631 |
work_keys_str_mv | AT erbschloemichael physicalsecurityforit |