Flylib.com
List of Tables
Previous page
Table of content
< Day Day Up >
Chapter 1: Organizing Homeland Security Efforts
Table 1.1:
Action Checklist Number 1
Chapter 2: Cross-Sector Security Priorities and Issues
Table 2.1: How IT Management Practices Changed Because of Terrorist Attacks
Table 2.2: How IT Staffing Levels Are Determined
Table Table: Table 2.3 How IT Salary Levels Are Determined
Table 2.4: DRP Training Status
Table 2.5: IS Security Training Status
Table 2.6: Computer-Incident Training Status
Table 2.7: Antivirus-Measures Training Status
Table 2.8: Customer Data Privacy Plan Training Status
Table 2.9: Employee Data Protection Policy Training Status
Table 2.10: End Users Adequately Trained
Table 2.11: Status of Training on Intellectual Property Management
Table 2.12: Adequate Public Education
Table 2.13: Organizations' Efforts to Address the Digital Divide
Table 2.14: Concerns about IT and Society
Table 2.15: Views on the Greatest Benefits of the Internet
Table 2.16: Views on the Worse Things That the Internet Enables
Table 2.17: Views on Government Regulation of the Internet
Table 2.18: Views on Government Regulation of the Internet: Responses to 'Other'
Table 2.19: Job Function/Title of Respondents
Table 2.20: Industry Sector of Respondents
Table 2.21: Action Checklist Number 2
Chapter 3: Security and Critical Infrastructures
Table 3.1: Action Checklist Number 3
Chapter 4: Information Sharing for Protecting National Assets
Table 4.1: InfraGard Chapters
Table 4.2: Action Checklist Number 4
Chapter 5: Homeland Security Initiatives by Sector
Table 5.1: Security Initiatives in Agriculture and Food
Table 5.2: Security Initiatives in Water
Table 5.3: Security Initiatives in Public Health
Table 5.4: Security Initiatives in Emergency Services
Table 5.5: Security Initiatives in the Defense Industrial Base
Table 5.6: Security Initiatives in Telecommunications
Table 5.7: Security Initiatives in Electrical Energy
Table 5.8: Security Initiatives in Oil and Natural Gas
Table 5.9: Security Initiatives in Aviation
Table 5.10: Security Initiatives in Rail Transportation
Table 5.11: Security Initiatives in Highways, Trucking, and Busing
Table 5.12: Security Initiatives in Pipelines
Table 5.13: Security Initiatives in Maritime Shipping
Table 5.14: Security Initiatives in Mass Transit System Management
Table 5.15: Security Initiatives in Banking and Finance
Table 5.16: Security Initiatives in the Chemical Industry and Hazardous Materials
Table 5.17: Security Initiatives in Postal and Shipping
Table 5.18: Security Initiatives in the Protection of Monuments
Table 5.19: Security Initiatives in the Protection of Government Facilities
Table 5.20: Security Initiatives in the Protection of Nuclear Facilities
Table 5.21: Security Initiatives in the Protection of Dams
Table 5.22: Security Initiatives in the Protection of Commercial Centers
Table 5.23: Action Checklist Number 5
Chapter 6: Why a National Strategy to Secure Cyberspace Is Important
Table 6.1: Information Warfare Strategies
Table 6.2: Impact of Cyberattacks on an Organization
Table 6.3: Impact of Cyberattacks on Individuals
Table 6.4: Impact of Cyberattacks on Societies
Table 6.5: Data Required to Determine Impact of Cybercode Attacks in an Organization
Table 6.6: Calculating the Cost of Restoring Systems after Cyberattacks
Table 6.7: Action Checklist Number 6
Chapter 7: Participating in a National Cyberspace Security Response System
Table 7.1: Reporting Computer Incidents to Law Enforcement
Table 7.2: Action Checklist Number 7
Chapter 8: Participating in a National Threat and Vulnerability Reduction Program
Table 8.1: Physical Security Checklist for Technology Facilities
Table 8.2: Action Checklist Number 8
Chapter 9: Launching a National Cyberspace Security Awareness and Training Program
Table 9.1: Action Checklist Number 9
Chapter 10: Working to Secure Governments' Cyberspace
Table 10.1: General Standards for Securing Wireless Devices
Table 10.2: Action Checklist Number 10
Chapter 11: Global Cyberspace Security Cooperation
Table 11.1: Action Checklist Number 11
Chapter 12: Moving into the Future
Table 12.1: Enterprise Action Checklist
Table 12.2: IT Management Action Checklist
Table 12.3: IT Security Action Checklist
< Day Day Up >
Previous page
Table of content
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248
Authors:
Michael Erbschloe
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Oracle Structures
Oracle SQL
Optimizing: The Oracle Side
Data Dictionary Report
Appendix A Common Issues
Introduction to 80x86 Assembly Language and Computer Architecture
Floating-Point Arithmetic
Decimal Arithmetic
Appendix B Useful MS-DOS Commands
Appendix D 80x86 Instructions (by Mnemonic)
Appendix E 80x86 Instructions (by Opcode)
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
VBScript Basics
Conditional Logic
Using Procedures to Organize Scripts
Appendix C Whats on the CD-ROM?
802.11 Wireless Networks: The Definitive Guide, Second Edition
Mobility Support
11 MAC Fundamentals
ERP Physical Medium Dependent (PMD) Layer
Security Architecture
Ethereal
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Conclusion
Conclusion
Properties and Methods Common to Outlook Items
Advanced Topic: Dynamic Host Items
Using Windows Forms in VSTO
Programming .Net Windows Applications
Mouse Events
Editable Text Controls: TextBoxBase
PictureBox
Managed Providers
Build Configurations
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies