Sold Out
Sold Out
Book Categories |
List of Figures | ||
List of Tables | ||
List of Acronyms | ||
Introduction | ||
1 | September 11, 2001 | 3 |
2 | The Threat from Extremists | 13 |
3 | Conventional Threats | 27 |
4 | The Risk Management Process | 41 |
5 | Protecting Information | 69 |
6 | Protecting Networks and Computer Systems | 87 |
7 | Physical Security and Access Control | 103 |
8 | Protecting Employees and Physical Assets | 127 |
9 | Special Threats | 151 |
10 | Threat Response Plan | 169 |
11 | Crisis Management | 183 |
App. A | Threat Alert Levels and Physical Response Guidelines | 197 |
App. B | Threat Alert System and Cyber Response Guidelines for the Electricity Sector | 207 |
App. C | Facility Vulnerability Determining System | 213 |
App. D | Computer and Internet Use Policies | 225 |
App. E | Personal Protection Checklist | 235 |
App. F | Bomb Threat Checklist | 241 |
App. G | Executive Crisis Response File | 243 |
App. H | Sample Theft of Service Policy | 255 |
App. I | Physical Security Plan | 263 |
App. J | Security Survey Checklist | 269 |
Helpful Website Addresses | 273 | |
Index | 277 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionUtility Security: The New Paradigm
X
This Item is in Your InventoryUtility Security: The New Paradigm
X
You must be logged in to review the productsX
X
X
Add Utility Security: The New Paradigm, The New Paradigm addresses real threats to utility systems and provides a step-by-step approach to assessing vulnerabilities and developing and implementing security countermeasures. Included in the book are threat assessment and security checklists, as w, Utility Security: The New Paradigm to the inventory that you are selling on WonderClubX
X
Add Utility Security: The New Paradigm, The New Paradigm addresses real threats to utility systems and provides a step-by-step approach to assessing vulnerabilities and developing and implementing security countermeasures. Included in the book are threat assessment and security checklists, as w, Utility Security: The New Paradigm to your collection on WonderClub |