Flylib.com
List of Tables
Previous page
Table of content
< Day Day Up >
Chapter 1: Organizing Homeland Security Efforts
Table 1.1:
Action Checklist Number 1
Chapter 2: Cross-Sector Security Priorities and Issues
Table 2.1: How IT Management Practices Changed Because of Terrorist Attacks
Table 2.2: How IT Staffing Levels Are Determined
Table Table: Table 2.3 How IT Salary Levels Are Determined
Table 2.4: DRP Training Status
Table 2.5: IS Security Training Status
Table 2.6: Computer-Incident Training Status
Table 2.7: Antivirus-Measures Training Status
Table 2.8: Customer Data Privacy Plan Training Status
Table 2.9: Employee Data Protection Policy Training Status
Table 2.10: End Users Adequately Trained
Table 2.11: Status of Training on Intellectual Property Management
Table 2.12: Adequate Public Education
Table 2.13: Organizations' Efforts to Address the Digital Divide
Table 2.14: Concerns about IT and Society
Table 2.15: Views on the Greatest Benefits of the Internet
Table 2.16: Views on the Worse Things That the Internet Enables
Table 2.17: Views on Government Regulation of the Internet
Table 2.18: Views on Government Regulation of the Internet: Responses to 'Other'
Table 2.19: Job Function/Title of Respondents
Table 2.20: Industry Sector of Respondents
Table 2.21: Action Checklist Number 2
Chapter 3: Security and Critical Infrastructures
Table 3.1: Action Checklist Number 3
Chapter 4: Information Sharing for Protecting National Assets
Table 4.1: InfraGard Chapters
Table 4.2: Action Checklist Number 4
Chapter 5: Homeland Security Initiatives by Sector
Table 5.1: Security Initiatives in Agriculture and Food
Table 5.2: Security Initiatives in Water
Table 5.3: Security Initiatives in Public Health
Table 5.4: Security Initiatives in Emergency Services
Table 5.5: Security Initiatives in the Defense Industrial Base
Table 5.6: Security Initiatives in Telecommunications
Table 5.7: Security Initiatives in Electrical Energy
Table 5.8: Security Initiatives in Oil and Natural Gas
Table 5.9: Security Initiatives in Aviation
Table 5.10: Security Initiatives in Rail Transportation
Table 5.11: Security Initiatives in Highways, Trucking, and Busing
Table 5.12: Security Initiatives in Pipelines
Table 5.13: Security Initiatives in Maritime Shipping
Table 5.14: Security Initiatives in Mass Transit System Management
Table 5.15: Security Initiatives in Banking and Finance
Table 5.16: Security Initiatives in the Chemical Industry and Hazardous Materials
Table 5.17: Security Initiatives in Postal and Shipping
Table 5.18: Security Initiatives in the Protection of Monuments
Table 5.19: Security Initiatives in the Protection of Government Facilities
Table 5.20: Security Initiatives in the Protection of Nuclear Facilities
Table 5.21: Security Initiatives in the Protection of Dams
Table 5.22: Security Initiatives in the Protection of Commercial Centers
Table 5.23: Action Checklist Number 5
Chapter 6: Why a National Strategy to Secure Cyberspace Is Important
Table 6.1: Information Warfare Strategies
Table 6.2: Impact of Cyberattacks on an Organization
Table 6.3: Impact of Cyberattacks on Individuals
Table 6.4: Impact of Cyberattacks on Societies
Table 6.5: Data Required to Determine Impact of Cybercode Attacks in an Organization
Table 6.6: Calculating the Cost of Restoring Systems after Cyberattacks
Table 6.7: Action Checklist Number 6
Chapter 7: Participating in a National Cyberspace Security Response System
Table 7.1: Reporting Computer Incidents to Law Enforcement
Table 7.2: Action Checklist Number 7
Chapter 8: Participating in a National Threat and Vulnerability Reduction Program
Table 8.1: Physical Security Checklist for Technology Facilities
Table 8.2: Action Checklist Number 8
Chapter 9: Launching a National Cyberspace Security Awareness and Training Program
Table 9.1: Action Checklist Number 9
Chapter 10: Working to Secure Governments' Cyberspace
Table 10.1: General Standards for Securing Wireless Devices
Table 10.2: Action Checklist Number 10
Chapter 11: Global Cyberspace Security Cooperation
Table 11.1: Action Checklist Number 11
Chapter 12: Moving into the Future
Table 12.1: Enterprise Action Checklist
Table 12.2: IT Management Action Checklist
Table 12.3: IT Security Action Checklist
< Day Day Up >
Previous page
Table of content
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248
Authors:
Michael Erbschloe
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to an ODBC Data Source
Writing Database-Independent Code
Retrieving Constraints from a SQL Server Database
Using XPath to Query Data in a DataSet
Filling a DataSet Asynchronously
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Making Programs Think Branching Statements and Subroutines
The Art of Using Animated Sprites for 2D Games
Loading and Saving Information Using Files
Epilogue
Appendix A Answers to the Chapter Quizzes
Metrics and Models in Software Quality Engineering (2nd Edition)
Run Charts
The PTR Submodel
The PTR Arrival and Backlog Projection Model
Productivity Metrics
Measuring and Analyzing Customer Satisfaction
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Conduct Data Collection
Training
Appendix B Kanban Supermarkets
Appendix H Case Study 1: Motor Plant Casting Kanban
Appendix I Case Study 2: Rubber Extrusion Plant
Cisco Voice Gateways and Gatekeepers
The Role of IP-to-IP Gateways
Voice Translation Rules and Profiles
Troubleshooting Digit Manipulation
Configuring Directory Gatekeepers
Configuring Gatekeeper Security
Microsoft WSH and VBScript Programming for the Absolute Beginner
Constants, Variables, and Arrays
Processing Collections of Data
Appendix A WSH Administrative Scripting
Appendix B Built-In VBScript Functions
Appendix C Whats on the CD-ROM?
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies