This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks
Implementing Homeland Security for Enterprise IT
โ Scribed by Michael Erbschloe (Auth.)
- Publisher
- Digital Press
- Year
- 2004
- Tongue
- English
- Leaves
- 302
- Series
- DP security
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Content:
Foreword, Pages xiii-xv
Preface, Page xvii
Introduction, Pages xix-xxv
Acknowledgments, Page xxvii
1 - Organizing homeland security efforts, Pages 1-23
2 - Cross-sector security priorities and issues, Pages 25-56
3 - Security and Critical Infrastructures, Pages 57-77
4 - Information sharing for protecting national assets, Pages 79-93
5 - Homeland security initiatives by sector, Pages 95-107
6 - Why a national strategy to secure cyberspace is important, Pages 109-128
7 - Participating in a national cyberspace security response system, Pages 129-136
8 - Participating in a national threat and vulnerability reduction program, Pages 137-150
9 - Launching a national cyberspace security awareness and training program, Pages 151-163
10 - Working to secure governments' cyberspace, Pages 165-183
11 - Global cyberspace security cooperation, Pages 185-223
12 - Moving into the future, Pages 225-237
A - Homeland security acronyms, Pages 239-258
B - Homeland security resources, Pages 259-287
Index, Pages 289-299
๐ SIMILAR VOLUMES
What role can the Army play in protecting the United States from terrorist attacks?
The book is a tutorial that goes from basic to professional level for Agile IT security. It begins by assuming little knowledge of agile security. Readers should hold a good knowledge of security methods and agile development. The book is targeted at IT security managers, directors, and architects.
The book is a tutorial that goes from basic to professional level for Agile IT security. It begins by assuming little knowledge of agile security. Readers should hold a good knowledge of security methods and agile development. The book is targeted at IT security managers, directors, and architects.
Contrary to stereotype, the construction industry has embraced IT with some vigour. Computers are used effectively across the sector and this use is increasing. A range of new issues have emerged in consequence. This practical book draws on direct industrial experience and examines the role of IT w
Unlock your organizational potential and scale your business using observability with this information packed guide Key Features Learn the principles of identifying stakeholders, tools, and processes necessary for implementing observability Develop strategies to self-sustain the observability j