Muutke küpsiste eelistusi

E-raamat: Cyber Terrorism: A Guide for Facility Managers

  • Formaat: 248 pages
  • Ilmumisaeg: 17-Dec-2020
  • Kirjastus: Marcel Dekker Inc
  • Keel: eng
  • ISBN-13: 9788770222396
  • Formaat - PDF+DRM
  • Hind: 134,55 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele
  • Formaat: 248 pages
  • Ilmumisaeg: 17-Dec-2020
  • Kirjastus: Marcel Dekker Inc
  • Keel: eng
  • ISBN-13: 9788770222396

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Cyber Terrorism: A Guide for Facility Managers addresses cyberterrorism and other forms of terrorist activity including mailroom security, bomb threats, and the constant attacks from viruses, hackers, and other invasive programs. Known terrorist groups are identified, discussed, and their disruptive techniques are described. The text covers the necessary steps needed for prevention; the corporation's assessment of vulnerability; and its emergency preparedness, prevention, incident response, and recovery. Containing practical, comprehensive, and effective guidance, this book is written in a straight-forward, reader-friendly format for quick and easy reference.
Preface ix
Introduction xi
Technology and the Facility Manager
1(14)
Desktop and Portable Systems
2(4)
Servers
6(2)
Local Area Networks (LAN)
8(2)
Wide Area Networks (WAN)
10(1)
Distributed Systems
11(1)
Mainframe Systems
12(3)
Computer and Data Protection---The Cyber Dimension
15(18)
Types of Computer Attacks
16(1)
Threats to a Computer System
17(11)
Computer Protection
28(5)
Computer and Data Protection---The Physical Dimension
33(14)
Physical Hazards
33(5)
Telecommunications Protection
38(1)
Elements of Computer Security
39(8)
Business Continuity---Loss Prevention Strategies
47(20)
Developing the Strategy
47(2)
Loss Prevention
49(4)
Contingencies for Data/System Availability
53(3)
Developing a Loss Prevention Program
56(1)
Loss Prevention Techniques
57(7)
Computer Security Incident Handling
64(3)
Personnel User Issues
67(16)
Key Elements
67(4)
Personnel Security
71(1)
Training and Awareness
71(7)
Identification and Authentication
78(5)
Standby Power Systems
83(10)
Emergency Preparedness and Standby Power Systems
83(4)
Types of Uninterruptible Power Systems(UPS)
87(6)
Web Sites---The Cornerstone of E-Commerce
93(14)
Web Sites
93(3)
Business to Consumer Issues
96(1)
Business to Business Issues
96(4)
Web Contingency Planning
100(2)
Life Cycle
102(5)
Communications and Training
107(10)
Methods
107(1)
Effectiveness of the Communications Strategy
108(1)
Making the Strategy Work
109(2)
Management Techniques
111(1)
Awareness
112(1)
Training
113(4)
Recovery Planning
117(22)
Putting It Together
117(22)
Establish a Planning Team
118(2)
Analyze Capabilities and Hazards
120(8)
Developing the Plan
128(5)
Implementing the Plan
133(6)
Cyber Crime---Handling the Threat
139(24)
Background
139(1)
The Federal Bureau of Investigation's (FBI) Cyber Division
140(4)
The National Infrastructure Protection Center (NIPC)
144(2)
Department of Justice
146(11)
How to Report Internet-Related Crime
157(6)
Appendix 1 Template for Security Plan
163(24)
Major Applications Security Plan Template
163(11)
General Support System Security Plan Template
174(13)
Appendix 2 Glossary
187(10)
Appendix 3 System Questionnaire
197(26)
Management Controls
197(7)
Operational Controls
204(13)
Technical Controls
217(6)
Appendix 4 Sample IT Contingency Plan Format
223(10)
Appendix 5 FBI Field Offices
233(10)
Index 243
Joseph F Gustin (Consultant Lilburn Georgia USA) (Author)