Flylib.com
List of Tables
Previous page
Table of content
< Day Day Up >
Chapter 1: Organizing Homeland Security Efforts
Table 1.1:
Action Checklist Number 1
Chapter 2: Cross-Sector Security Priorities and Issues
Table 2.1: How IT Management Practices Changed Because of Terrorist Attacks
Table 2.2: How IT Staffing Levels Are Determined
Table Table: Table 2.3 How IT Salary Levels Are Determined
Table 2.4: DRP Training Status
Table 2.5: IS Security Training Status
Table 2.6: Computer-Incident Training Status
Table 2.7: Antivirus-Measures Training Status
Table 2.8: Customer Data Privacy Plan Training Status
Table 2.9: Employee Data Protection Policy Training Status
Table 2.10: End Users Adequately Trained
Table 2.11: Status of Training on Intellectual Property Management
Table 2.12: Adequate Public Education
Table 2.13: Organizations' Efforts to Address the Digital Divide
Table 2.14: Concerns about IT and Society
Table 2.15: Views on the Greatest Benefits of the Internet
Table 2.16: Views on the Worse Things That the Internet Enables
Table 2.17: Views on Government Regulation of the Internet
Table 2.18: Views on Government Regulation of the Internet: Responses to 'Other'
Table 2.19: Job Function/Title of Respondents
Table 2.20: Industry Sector of Respondents
Table 2.21: Action Checklist Number 2
Chapter 3: Security and Critical Infrastructures
Table 3.1: Action Checklist Number 3
Chapter 4: Information Sharing for Protecting National Assets
Table 4.1: InfraGard Chapters
Table 4.2: Action Checklist Number 4
Chapter 5: Homeland Security Initiatives by Sector
Table 5.1: Security Initiatives in Agriculture and Food
Table 5.2: Security Initiatives in Water
Table 5.3: Security Initiatives in Public Health
Table 5.4: Security Initiatives in Emergency Services
Table 5.5: Security Initiatives in the Defense Industrial Base
Table 5.6: Security Initiatives in Telecommunications
Table 5.7: Security Initiatives in Electrical Energy
Table 5.8: Security Initiatives in Oil and Natural Gas
Table 5.9: Security Initiatives in Aviation
Table 5.10: Security Initiatives in Rail Transportation
Table 5.11: Security Initiatives in Highways, Trucking, and Busing
Table 5.12: Security Initiatives in Pipelines
Table 5.13: Security Initiatives in Maritime Shipping
Table 5.14: Security Initiatives in Mass Transit System Management
Table 5.15: Security Initiatives in Banking and Finance
Table 5.16: Security Initiatives in the Chemical Industry and Hazardous Materials
Table 5.17: Security Initiatives in Postal and Shipping
Table 5.18: Security Initiatives in the Protection of Monuments
Table 5.19: Security Initiatives in the Protection of Government Facilities
Table 5.20: Security Initiatives in the Protection of Nuclear Facilities
Table 5.21: Security Initiatives in the Protection of Dams
Table 5.22: Security Initiatives in the Protection of Commercial Centers
Table 5.23: Action Checklist Number 5
Chapter 6: Why a National Strategy to Secure Cyberspace Is Important
Table 6.1: Information Warfare Strategies
Table 6.2: Impact of Cyberattacks on an Organization
Table 6.3: Impact of Cyberattacks on Individuals
Table 6.4: Impact of Cyberattacks on Societies
Table 6.5: Data Required to Determine Impact of Cybercode Attacks in an Organization
Table 6.6: Calculating the Cost of Restoring Systems after Cyberattacks
Table 6.7: Action Checklist Number 6
Chapter 7: Participating in a National Cyberspace Security Response System
Table 7.1: Reporting Computer Incidents to Law Enforcement
Table 7.2: Action Checklist Number 7
Chapter 8: Participating in a National Threat and Vulnerability Reduction Program
Table 8.1: Physical Security Checklist for Technology Facilities
Table 8.2: Action Checklist Number 8
Chapter 9: Launching a National Cyberspace Security Awareness and Training Program
Table 9.1: Action Checklist Number 9
Chapter 10: Working to Secure Governments' Cyberspace
Table 10.1: General Standards for Securing Wireless Devices
Table 10.2: Action Checklist Number 10
Chapter 11: Global Cyberspace Security Cooperation
Table 11.1: Action Checklist Number 11
Chapter 12: Moving into the Future
Table 12.1: Enterprise Action Checklist
Table 12.2: IT Management Action Checklist
Table 12.3: IT Security Action Checklist
< Day Day Up >
Previous page
Table of content
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248
Authors:
Michael Erbschloe
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
The Effects of an Enterprise Resource Planning System (ERP) Implementation on Job Characteristics – A Study using the Hackman and Oldham Job Characteristics Model
Distributed Data Warehouse for Geo-spatial Services
Data Mining for Business Process Reengineering
Intrinsic and Contextual Data Quality: The Effect of Media and Personal Involvement
Absolute Beginner[ap]s Guide to Project Management
Planning a Project
The Goal of the Schedule Development Process
Best Practices
Unique Aspects of Managing Project Quality
Why Communicating Can Be Tough
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 3.3 Use WinSCP as a Graphical Replacement for FTP and RCP
Step 4.6 How to use PuTTY Passphrase Agents
Step 4.7 Using Public Key Authentication for Automated File Transfers
Conclusion
VBScript Programmers Reference
Control of Flow
Windows Script Host
Windows Script Components
Appendix D Visual Basic Constants Supported in VBScript
Appendix L ActiveX Data Objects
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Two Principles
Chapter Four Precall Planning and Research
Chapter Nine Selling When You re Not First
Chapter Ten Vision Re-engineering
Chapter Fourteen Getting Started with the Process
Junos Cookbook (Cookbooks (OReilly))
Gathering Information Before Contacting Support
Reordering Firewall Terms
Using a Firewall Filter to Count Traffic on an Interface
IS-IS
Configuring IS-IS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies