附註:Includes bibliographical references and index.
Table of Contents; Preface; Introduction; Technology and the Facility Manager; Computer and Data Protection -- The Cyber Dimension; Computer and Data Protection -- The Physical Dimension; Business Continuity -- Loss Prevention Strategies; Personnel User Issues; Standby Power Systems; Web Sites -- The Cornerstone of E-Commerce; Communications And Training; Recovery Planning; Cyber Crime -- Handling the Threat; Appendix I Template for Security Plan; Appendix II Glossary; Appendix III System Questionnaire; Appendix IV Sample IT Contingency Plan Format; Appendix V FBI Field Offices; Index.
摘要:Addressing cyberterrorism and other terrorist activity including mailroom security, bomb threats, viruses, hackers and invasive programs, this book identifies known terrorists. It addresses the necessary steps needed for prevention of their attacks.