Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Cyber terrorism [electronic resource] : a guide for facility managers / by Joseph F. Gustin.

By: Gustin, Joseph F, 1947-.
Material type: TextTextPublisher: Lilburn, Ga. : New York : Fairmont Press ; Marcel Dekker, c2004Description: 1 online resource (xii, 247 p.) : ill.ISBN: 0881734438 (electronic bk.); 9780881734430 (electronic bk.); 0824756851 (electronic bk. : Adobe Reader); 9780824756857 (electronic bk. : Adobe Reader); 0824742915 (Cloth); 9780824742911 (Cloth); 0203913116 (electronic bk.); 9780203913116 (electronic bk.); 088173442X (print); 9780881734423 (print).Subject(s): Computer crimes -- Prevention | Cyberterrorism -- Prevention | Computer security | Facility management | BUSINESS & ECONOMICS -- Workplace Culture | BUSINESS & ECONOMICS -- Corporate Governance | BUSINESS & ECONOMICS -- Leadership | BUSINESS & ECONOMICS -- Organizational DevelopmentGenre/Form: Electronic books. | Electronic books.Additional physical formats: Print version:: Cyber terrorism.DDC classification: 658.4/78 Online resources: EBSCOhost | EBSCOhost
Contents:
Table of Contents; Preface; Introduction; Technology and the Facility Manager; Computer and Data Protection -- The Cyber Dimension; Computer and Data Protection -- The Physical Dimension; Business Continuity -- Loss Prevention Strategies; Personnel User Issues; Standby Power Systems; Web Sites -- The Cornerstone of E-Commerce; Communications And Training; Recovery Planning; Cyber Crime -- Handling the Threat; Appendix I Template for Security Plan; Appendix II Glossary; Appendix III System Questionnaire; Appendix IV Sample IT Contingency Plan Format; Appendix V FBI Field Offices; Index;
Summary: Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Includes bibliographical references and index.

Description based on print version record.

Table of Contents; Preface; Introduction; Technology and the Facility Manager; Computer and Data Protection -- The Cyber Dimension; Computer and Data Protection -- The Physical Dimension; Business Continuity -- Loss Prevention Strategies; Personnel User Issues; Standby Power Systems; Web Sites -- The Cornerstone of E-Commerce; Communications And Training; Recovery Planning; Cyber Crime -- Handling the Threat; Appendix I Template for Security Plan; Appendix II Glossary; Appendix III System Questionnaire; Appendix IV Sample IT Contingency Plan Format; Appendix V FBI Field Offices; Index;

Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks.

There are no comments for this item.

Log in to your account to post a comment.

Other editions of this work

Cyber terrorism by Gustin, Joseph F., ©2004
Cyber terrorism by Gustin, Joseph F., ©2004
Cyber terrorism by Gustin, Joseph F., ©2004
Cyber terrorism by Gustin, Joseph F., ©2004
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter