Flylib.com
List of Tables
Previous page
Table of content
< Day Day Up >
Chapter 1: Organizing Homeland Security Efforts
Table 1.1:
Action Checklist Number 1
Chapter 2: Cross-Sector Security Priorities and Issues
Table 2.1: How IT Management Practices Changed Because of Terrorist Attacks
Table 2.2: How IT Staffing Levels Are Determined
Table Table: Table 2.3 How IT Salary Levels Are Determined
Table 2.4: DRP Training Status
Table 2.5: IS Security Training Status
Table 2.6: Computer-Incident Training Status
Table 2.7: Antivirus-Measures Training Status
Table 2.8: Customer Data Privacy Plan Training Status
Table 2.9: Employee Data Protection Policy Training Status
Table 2.10: End Users Adequately Trained
Table 2.11: Status of Training on Intellectual Property Management
Table 2.12: Adequate Public Education
Table 2.13: Organizations' Efforts to Address the Digital Divide
Table 2.14: Concerns about IT and Society
Table 2.15: Views on the Greatest Benefits of the Internet
Table 2.16: Views on the Worse Things That the Internet Enables
Table 2.17: Views on Government Regulation of the Internet
Table 2.18: Views on Government Regulation of the Internet: Responses to 'Other'
Table 2.19: Job Function/Title of Respondents
Table 2.20: Industry Sector of Respondents
Table 2.21: Action Checklist Number 2
Chapter 3: Security and Critical Infrastructures
Table 3.1: Action Checklist Number 3
Chapter 4: Information Sharing for Protecting National Assets
Table 4.1: InfraGard Chapters
Table 4.2: Action Checklist Number 4
Chapter 5: Homeland Security Initiatives by Sector
Table 5.1: Security Initiatives in Agriculture and Food
Table 5.2: Security Initiatives in Water
Table 5.3: Security Initiatives in Public Health
Table 5.4: Security Initiatives in Emergency Services
Table 5.5: Security Initiatives in the Defense Industrial Base
Table 5.6: Security Initiatives in Telecommunications
Table 5.7: Security Initiatives in Electrical Energy
Table 5.8: Security Initiatives in Oil and Natural Gas
Table 5.9: Security Initiatives in Aviation
Table 5.10: Security Initiatives in Rail Transportation
Table 5.11: Security Initiatives in Highways, Trucking, and Busing
Table 5.12: Security Initiatives in Pipelines
Table 5.13: Security Initiatives in Maritime Shipping
Table 5.14: Security Initiatives in Mass Transit System Management
Table 5.15: Security Initiatives in Banking and Finance
Table 5.16: Security Initiatives in the Chemical Industry and Hazardous Materials
Table 5.17: Security Initiatives in Postal and Shipping
Table 5.18: Security Initiatives in the Protection of Monuments
Table 5.19: Security Initiatives in the Protection of Government Facilities
Table 5.20: Security Initiatives in the Protection of Nuclear Facilities
Table 5.21: Security Initiatives in the Protection of Dams
Table 5.22: Security Initiatives in the Protection of Commercial Centers
Table 5.23: Action Checklist Number 5
Chapter 6: Why a National Strategy to Secure Cyberspace Is Important
Table 6.1: Information Warfare Strategies
Table 6.2: Impact of Cyberattacks on an Organization
Table 6.3: Impact of Cyberattacks on Individuals
Table 6.4: Impact of Cyberattacks on Societies
Table 6.5: Data Required to Determine Impact of Cybercode Attacks in an Organization
Table 6.6: Calculating the Cost of Restoring Systems after Cyberattacks
Table 6.7: Action Checklist Number 6
Chapter 7: Participating in a National Cyberspace Security Response System
Table 7.1: Reporting Computer Incidents to Law Enforcement
Table 7.2: Action Checklist Number 7
Chapter 8: Participating in a National Threat and Vulnerability Reduction Program
Table 8.1: Physical Security Checklist for Technology Facilities
Table 8.2: Action Checklist Number 8
Chapter 9: Launching a National Cyberspace Security Awareness and Training Program
Table 9.1: Action Checklist Number 9
Chapter 10: Working to Secure Governments' Cyberspace
Table 10.1: General Standards for Securing Wireless Devices
Table 10.2: Action Checklist Number 10
Chapter 11: Global Cyberspace Security Cooperation
Table 11.1: Action Checklist Number 11
Chapter 12: Moving into the Future
Table 12.1: Enterprise Action Checklist
Table 12.2: IT Management Action Checklist
Table 12.3: IT Security Action Checklist
< Day Day Up >
Previous page
Table of content
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248
Authors:
Michael Erbschloe
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Welcome to DarkBASIC
Introduction to Computer Programming
Making Programs Think Branching Statements and Subroutines
Loading and Saving Information Using Files
Fundamentals of 3D Graphics Programming
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP System Acquisition: A Process Model and Results From an Austrian Survey
The Second Wave ERP Market: An Australian Viewpoint
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
Context Management of ERP Processes in Virtual Communities
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Oracle Developer Forms Techniques
Summary
The Power of Record Groups
Error-Message Handling
Object and Code Reusability
Summary
A Practitioners Guide to Software Test Design
Section I - Black Box Testing Techniques
Pairwise Testing
Domain Analysis Testing
Data Flow Testing
Appendix B Stateless University Registration System Case Study
Cisco IOS Cookbook (Cookbooks (OReilly))
Booting over the Network
Using NTP to Send Periodic Broadcast Time Updates
Stateful NAT Failover
Showing HSRP State Information
Exchanging Multicast Routing Information with MBGP
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 25. Detect Networks with Handheld PCs
Hack 29. Detect Networks with Kismet
Hack 57. The NoCat Night Light
Hack 63. Build Your Own Access Point with Linux
Section A.5. 802.16: WiMAX Long Distance Wireless Infrastructure
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies