Physical Security for IT

Author:   Michael Erbschloe (Author, educator and security advisor, Washington, DC) ,  Michael Erbschloe (Author, educator and security advisor, Washington, DC) ,  Michael Erbschloe (Author, educator and security advisor, Washington, DC) ,  Michael Erbschloe (Author, educator and security advisor, Washington, DC)
Publisher:   Elsevier Science & Technology
ISBN:  

9781555583279


Pages:   256
Publication Date:   04 December 2004
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $174.11 Quantity:  
Add to Cart

Share |

Physical Security for IT


Add your own review!

Overview

Full Product Details

Author:   Michael Erbschloe (Author, educator and security advisor, Washington, DC) ,  Michael Erbschloe (Author, educator and security advisor, Washington, DC) ,  Michael Erbschloe (Author, educator and security advisor, Washington, DC) ,  Michael Erbschloe (Author, educator and security advisor, Washington, DC)
Publisher:   Elsevier Science & Technology
Imprint:   Digital Press
Dimensions:   Width: 19.10cm , Height: 1.30cm , Length: 23.50cm
Weight:   0.520kg
ISBN:  

9781555583279


ISBN 10:   155558327
Pages:   256
Publication Date:   04 December 2004
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets.

Reviews

"""Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each connection magnifies the vulnerability to attack. This book also provides the fundamental knowledge you need to analyze electronic and physical risks to your networks and systems."" —John Vacca, Author of numerous computer security books"


Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each connection magnifies the vulnerability to attack. This book also provides the fundamental knowledge you need to analyze electronic and physical risks to your networks and systems. -John Vacca, Author of numerous computer security books


Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each connection magnifies the vulnerability to attack. This book also provides the fundamental knowledge you need to analyze electronic and physical risks to your networks and systems. -John Vacca, Author of numerous computer security books


Author Information

Michael Erbschloe an information technology consultant, educator, and author. Michael has also taught and developed technology related curriculum for several universities including the University of Denver, and speaks at conferences and industry events around the world. He has authored hundreds of articles on technology and several books including Information Warfare: How to Survive Cyber Attacks.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List