Flylib.com
List of Tables
Previous page
Table of content
< Day Day Up >
Chapter 1: Organizing Homeland Security Efforts
Table 1.1:
Action Checklist Number 1
Chapter 2: Cross-Sector Security Priorities and Issues
Table 2.1: How IT Management Practices Changed Because of Terrorist Attacks
Table 2.2: How IT Staffing Levels Are Determined
Table Table: Table 2.3 How IT Salary Levels Are Determined
Table 2.4: DRP Training Status
Table 2.5: IS Security Training Status
Table 2.6: Computer-Incident Training Status
Table 2.7: Antivirus-Measures Training Status
Table 2.8: Customer Data Privacy Plan Training Status
Table 2.9: Employee Data Protection Policy Training Status
Table 2.10: End Users Adequately Trained
Table 2.11: Status of Training on Intellectual Property Management
Table 2.12: Adequate Public Education
Table 2.13: Organizations' Efforts to Address the Digital Divide
Table 2.14: Concerns about IT and Society
Table 2.15: Views on the Greatest Benefits of the Internet
Table 2.16: Views on the Worse Things That the Internet Enables
Table 2.17: Views on Government Regulation of the Internet
Table 2.18: Views on Government Regulation of the Internet: Responses to 'Other'
Table 2.19: Job Function/Title of Respondents
Table 2.20: Industry Sector of Respondents
Table 2.21: Action Checklist Number 2
Chapter 3: Security and Critical Infrastructures
Table 3.1: Action Checklist Number 3
Chapter 4: Information Sharing for Protecting National Assets
Table 4.1: InfraGard Chapters
Table 4.2: Action Checklist Number 4
Chapter 5: Homeland Security Initiatives by Sector
Table 5.1: Security Initiatives in Agriculture and Food
Table 5.2: Security Initiatives in Water
Table 5.3: Security Initiatives in Public Health
Table 5.4: Security Initiatives in Emergency Services
Table 5.5: Security Initiatives in the Defense Industrial Base
Table 5.6: Security Initiatives in Telecommunications
Table 5.7: Security Initiatives in Electrical Energy
Table 5.8: Security Initiatives in Oil and Natural Gas
Table 5.9: Security Initiatives in Aviation
Table 5.10: Security Initiatives in Rail Transportation
Table 5.11: Security Initiatives in Highways, Trucking, and Busing
Table 5.12: Security Initiatives in Pipelines
Table 5.13: Security Initiatives in Maritime Shipping
Table 5.14: Security Initiatives in Mass Transit System Management
Table 5.15: Security Initiatives in Banking and Finance
Table 5.16: Security Initiatives in the Chemical Industry and Hazardous Materials
Table 5.17: Security Initiatives in Postal and Shipping
Table 5.18: Security Initiatives in the Protection of Monuments
Table 5.19: Security Initiatives in the Protection of Government Facilities
Table 5.20: Security Initiatives in the Protection of Nuclear Facilities
Table 5.21: Security Initiatives in the Protection of Dams
Table 5.22: Security Initiatives in the Protection of Commercial Centers
Table 5.23: Action Checklist Number 5
Chapter 6: Why a National Strategy to Secure Cyberspace Is Important
Table 6.1: Information Warfare Strategies
Table 6.2: Impact of Cyberattacks on an Organization
Table 6.3: Impact of Cyberattacks on Individuals
Table 6.4: Impact of Cyberattacks on Societies
Table 6.5: Data Required to Determine Impact of Cybercode Attacks in an Organization
Table 6.6: Calculating the Cost of Restoring Systems after Cyberattacks
Table 6.7: Action Checklist Number 6
Chapter 7: Participating in a National Cyberspace Security Response System
Table 7.1: Reporting Computer Incidents to Law Enforcement
Table 7.2: Action Checklist Number 7
Chapter 8: Participating in a National Threat and Vulnerability Reduction Program
Table 8.1: Physical Security Checklist for Technology Facilities
Table 8.2: Action Checklist Number 8
Chapter 9: Launching a National Cyberspace Security Awareness and Training Program
Table 9.1: Action Checklist Number 9
Chapter 10: Working to Secure Governments' Cyberspace
Table 10.1: General Standards for Securing Wireless Devices
Table 10.2: Action Checklist Number 10
Chapter 11: Global Cyberspace Security Cooperation
Table 11.1: Action Checklist Number 11
Chapter 12: Moving into the Future
Table 12.1: Enterprise Action Checklist
Table 12.2: IT Management Action Checklist
Table 12.3: IT Security Action Checklist
< Day Day Up >
Previous page
Table of content
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248
Authors:
Michael Erbschloe
BUY ON AMAZON
MySQL Stored Procedure Programming
Conclusion
Getting Information About Stored Programs
Trigger Overhead
Using MySQL Stored Programs with Java
Tuning Stored Programs and Their SQL
SQL Tips & Techniques (Miscellaneous)
Working with Comparison Predicates and Grouped Queries
Understanding SQL Subqueries
Monitoring and Enhancing MS-SQL Server Performance
Writing Advanced Queries and Subqueries
Exploiting MS-SQL Server Built-in Stored Procedures
The CISSP and CAP Prep Guide: Platinum Edition
Cryptography
Physical (Environmental) Security
Appendix A Answers to Assessment Questions
Appendix C The Information System Security Architecture Professional (ISSAP) Certification
Appendix G Control Baselines
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
Market Orientation and Supply Chain Management in the Fashion Industry
Fashion Logistics and Quick Response
Rethinking Efficient Replenishment in the Grocery Sector
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Getting to Know AutoCAD
Setting Up a Drawing
Gaining Drawing Strategies: Part 1
Generating Elevations
Managing External References
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #2: Improve Your Processes
Key #4: Base Decisions on Data and Facts
Six Things Managers Must Do: How to Support Lean Six Sigma
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies