<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>03518nam a2200409 a 4500</leader>
  <controlfield tag="001">1/44924</controlfield>
  <controlfield tag="008">140721s2004    us            001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9780080508504 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">0080508502 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="z">1555583121</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="z">9781555583125</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">1281072850</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781281072856</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">47881</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">NTG</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">NTG</subfield>
   <subfield code="d">BMU</subfield>
   <subfield code="d">N$T</subfield>
   <subfield code="d">YDXCP</subfield>
   <subfield code="d">OCLCE</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">E7B</subfield>
   <subfield code="d">IDEBK</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">OCLCO</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">OCLCF</subfield>
   <subfield code="d">OPELS</subfield>
   <subfield code="d">OKU</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Erbschloe, Michael.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Implementing homeland security for enterprise IT</subfield>
   <subfield code="h">[electronic resource] /</subfield>
   <subfield code="c">Michael Erbschloe.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Boston :</subfield>
   <subfield code="b">Digital Press,</subfield>
   <subfield code="c">2004.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xxvii, 299 p.) :</subfield>
   <subfield code="b">ill.</subfield>
  </datafield>
  <datafield tag="490" ind1="1" ind2=" ">
   <subfield code="a">DP security</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">Title from book cover on Web Page (viewed Oct. 26, 2005).</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes bibliographical references and index.</subfield>
  </datafield>
  <datafield tag="550" ind1=" " ind2=" ">
   <subfield code="a">May be limited to subscribing institutions.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Organizing homeland security efforts -- Cross-sector security priorities and issues -- Security and critical infrastructures -- Information sharing for protecting national assets -- Homeland security initiatives by sector -- Why a national strategy to secure cyberspace is important -- Participating in a national cyberspace security response system -- Participating in a national threat and vulnerability reduction program -- Launching a national cyberspace security awareness and training program -- Working to secure governments' cyberspace -- Global cyberspace security cooperation -- Moving into the future.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Internet</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer networks</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Cyberterrorism.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="830" ind1=" " ind2="0">
   <subfield code="a">DP security.</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">EBOOKS</subfield>
   <subfield code="e">20140721</subfield>
   <subfield code="p">00b47881</subfield>
   <subfield code="q">00b47881</subfield>
   <subfield code="t">ONLINE</subfield>
   <subfield code="y">0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="3">ScienceDirect</subfield>
   <subfield code="u">http://www.sciencedirect.com/science/book/9781555583125</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/47881_9780080508504.jpg</subfield>
   <subfield code="z">(electronic bk.)</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/47881_0080508502.jpg</subfield>
   <subfield code="z">(electronic bk.)</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/47881_1281072850.jpg</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/47881_9781281072856.jpg</subfield>
  </datafield>
 </record>
</collection>
