Table of Contents; Preface; Introduction; Technology and the Facility Manager; Computer and Data Protection -- The Cyber Dimension; Computer and Data Protection -- The Physical Dimension; Business Continuity -- Loss Prevention Strategies; Personnel User Issues; Standby Power Systems; Web Sites -- The Cornerstone of E-Commerce; Communications And Training; Recovery Planning; Cyber Crime -- Handling the Threat; Appendix I Template for Security Plan; Appendix II Glossary; Appendix III System Questionnaire; Appendix IV Sample IT Contingency Plan Format; Appendix V FBI Field Offices; Index
Summary
Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks
Bibliography
Includes bibliographical references and index
Notes
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
English
Print version record
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL