Amazon cover image
Image from Amazon.com

Implementing homeland security for enterprise IT / Michael Erbschloe.

By: Contributor(s): Series: DP security2004Description: 1 online resource (xxvii, 299 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780080508504
  • 0080508502
  • 1281072850
  • 9781281072856
Subject(s): Genre/Form: Additional physical formats: Print version:: Implementing homeland security for enterprise IT.LOC classification:
  • QA76.9.A25 E74 2004b
Online resources:
Contents:
Organizing homeland security efforts -- Cross-sector security priorities and issues -- Security and critical infrastructures -- Information sharing for protecting national assets -- Homeland security initiatives by sector -- Why a national strategy to secure cyberspace is important -- Participating in a national cyberspace security response system -- Participating in a national threat and vulnerability reduction program -- Launching a national cyberspace security awareness and training program -- Working to secure governments' cyberspace -- Global cyberspace security cooperation -- Moving into the future.
Action note:
  • digitized 2010 HathiTrust Digital Library committed to preserve
Summary: This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Title from book cover on Web Page (viewed Oct. 26, 2005).

Includes bibliographical references and index.

May be limited to subscribing institutions.

Organizing homeland security efforts -- Cross-sector security priorities and issues -- Security and critical infrastructures -- Information sharing for protecting national assets -- Homeland security initiatives by sector -- Why a national strategy to secure cyberspace is important -- Participating in a national cyberspace security response system -- Participating in a national threat and vulnerability reduction program -- Launching a national cyberspace security awareness and training program -- Working to secure governments' cyberspace -- Global cyberspace security cooperation -- Moving into the future.

Use copy Restrictions unspecified star MiAaHDL

This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action.

Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL

Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. MiAaHDL

http://purl.oclc.org/DLF/benchrepro0212

digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL

Elsevier ScienceDirect All Books

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu