Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Physical Security for IT

Buy
Physical Security for IT, 9781555583279 (155558327X), Digital Press, 2004
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each connection magnifies the vulnerability to attack. This book also provides the fundamental knowledge you need to analyze electronic and physical risks to your networks and systems." John Vacca, Author of numerous computer security books

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications.

Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets.

This book provides:

* Expert advice on identifying physical security needs
* Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems
* Explanation of the processes for establishing a physical IT security function
* Step-by-step instructions on how to accomplish physical security objectives
* Illustrations of the major elements of a physical IT security plan
* Specific guidance on how to develop and document physical security methods and procedures

Michael Erbschloe is an author, educator, and security advisor. He has authored hundreds of articles for technology newsletters and magazines as well as several books including Trojans, Worms, and Spyware; Implementing Homeland Security in Enterprise IT; and Socially Responsible IT Management. Michael has also taught and developed technology-related curriculum for several universities including a graduate program in electronic commerce for the University of Denver. He speaks at conferences and industry events around the world. Michael has provided consulting services to the U.S. Department of Defense, General Dynamics, Computer Sciences Corporation (CSC), Electronic Data Systems (EDS), Hewlett-Packard, IBM, Bank of America, Wells Fargo Bank and the Department of Homeland Security.

About the Author

Michael Erbschloe an information technology consultant, educator, and author. Michael has also taught and developed technology related curriculum for several universities including the University of Denver, and speaks at conferences and industry events around the world. He has authored hundreds of articles on technology and several books including Information Warfare: How to Survive Cyber Attacks.

(HTML tags aren't allowed.)

Green Electronics Manufacturing: Creating Environmental Sensible Products
Green Electronics Manufacturing: Creating Environmental Sensible Products

Going "green" is becoming a major component of the mission for electronics manufacturers worldwide. While this goal seems simplistic, it poses daunting dilemmas. Yet, to compete effectively in the global economy, manufacturers must take the initiative to drive this crucial movement. Green Electronics Manufacturing: Creating...

The Supply Chain Manager's Problem-Solver: Maximizing the Value of Collaboration and Technology (Resource Management)
The Supply Chain Manager's Problem-Solver: Maximizing the Value of Collaboration and Technology (Resource Management)

The true promise and benefits of Supply Chain Management elude many organizations. Cultural limitations, a narrow view of the opportunities offered by and the need to access external resources juxtaposed with a lack of understanding of how technology can enhance business processes create resistance. The Supply Chain Manager's...

Moodle 1.9 Testing and Assessment
Moodle 1.9 Testing and Assessment

This book is a practical guide to testing in Moodle. You will initially learn to create different types of questions such as True/False, multiple choice, short answer, and so on. After you have learned how to create questions you will follow a step-by-step process to create complete tests by tweaking various options. Once you have gone...


Effective Succession Planning: Ensuring Leadership Continuity And Building Talent From Within
Effective Succession Planning: Ensuring Leadership Continuity And Building Talent From Within
If you're looking for a quick, easy, and fun guide to constantly cultivating from within your organization the talent to move up and fill positions left behind by others, don't look here. Written by a human resources expert who teaches at Penn State, Effective Succession Planning must surely be one of the driest books ever written on this...
Learning Python, 3rd Edition
Learning Python, 3rd Edition

Portable, powerful, and a breeze to use, Python is ideal for both standalone programs and scripting applications. With this hands-on book, you can master the fundamentals of the core Python language quickly and efficiently, whether you're new to programming or just new to Python. Once you finish, you will know enough about the language to...

Unifying Theories of Programming and Formal Engineering Methods: International Training School on Software Engineering, Held at ICTAC 2013, Shanghai, ... Lectures (Lecture Notes in Computer Science)
Unifying Theories of Programming and Formal Engineering Methods: International Training School on Software Engineering, Held at ICTAC 2013, Shanghai, ... Lectures (Lecture Notes in Computer Science)

This book presents 5 tutorial lectures by leading researchers given at the ICTAC 2013 Software Engineering School on Unifying Theories of Programming and Formal Engineering Methods, held in Shanghai, China in August 2013.The lectures are aimed at postgraduate students, researchers, academics, and industrial engineers. They cover topics such...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy