164,55 €
193,59 €
Physical Security for It
Physical Security for It
164,55 €
193,59 €
  • Išsiųsime per 10–14 d.d.
The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have gr…
164.55 2025-07-06 23:59:00
  • Autorius: Michael Erbschloe
  • Leidėjas:
  • Metai: 2004
  • Puslapiai: 256
  • ISBN-10: 155558327X
  • ISBN-13: 9781555583279
  • Formatas: 18.9 x 23.4 x 1.4 cm, minkšti viršeliai
  • Kalba: Anglų
  • Extra -15 % nuolaida šiai knygai su kodu: ENG15

Physical Security for It + nemokamas atvežimas! | knygos.lt

Atsiliepimai

(5.00 Goodreads įvertinimas)

Aprašymas

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications.

Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets.

EXTRA 15 % nuolaida

164,55 €
193,59 €
Išsiųsime per 10–14 d.d.

Kupono kodas: ENG15

Akcija baigiasi už 3d.15:46:41

Nuolaidos kodas galioja perkant nuo 10 €. Nuolaidos nesumuojamos.

Prisijunkite ir už šią prekę
gausite 1,94 Knygų Eurų!?
Įsigykite dovanų kuponą
Daugiau

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications.

Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets.

Atsiliepimai

  • Atsiliepimų nėra
0 pirkėjai įvertino šią prekę.
5
0%
4
0%
3
0%
2
0%
1
0%
[{"option":"58","probability":13,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e599c86b351751013788.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"57","probability":14,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e5981e89e41751013761.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"56","probability":15,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e59691dc2d1751013737.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"55","probability":14,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e590bade881751013643.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"54","probability":15,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e58f20a7761751013618.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"53","probability":14,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e58d20c1ee1751013586.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"52","probability":14.5,"style":{"backgroundColor":"#f3f3f3"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e58b358b2e1751013555.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}},{"option":"51","probability":0.5,"style":{"backgroundColor":"#e31e30"},"image":{"uri":"\/uploads\/images\/wheel_of_fortune\/685e57cded6da1751013325.png","sizeMultiplier":0.6,"landscape":true,"offsetX":-50}}]