Skip to content
You are not logged in |Login  

LEADER 00000cam a22006618i 4500 
001    on1048020331 
003    OCoLC 
005    20220702022102.0 
006    m     o  d         
007    cr ||||||||||| 
008    180801s2018    mdua    ob    001 0 eng   
010      2018036923 
020    9781641433105|q(electronic book) 
020    1641433108|q(electronic book) 
020    |z9781641433099|q(paperback) 
035    (OCoLC)1048020331 
040    DLC|beng|erda|cDLC|dOCLCO|dOCLCF|dN$T|dYDX|dIBI|dOCLCO 
042    pcc 
043    n-us--- 
049    RIDW 
050  4 TK5102.85|b.S64 2018eb 
072  7 BUS|x070060|2bisacsh 
072  7 TEC|x041000|2bisacsh 
082 00 384.068/4|223 
090    TK5102.85|b.S64 2018eb 
100 1  Spellman, Frank R.,|0https://id.loc.gov/authorities/names/
       n96016467|eauthor. 
245 10 Communications sector protection and homeland security :
       |bcommunications sector protection and homeland security /
       |cFrank R. Spellman. 
264  1 Lanham, Maryland :|bBernan Press, an imprint of The Rowman
       & Littlefield Publishing Group, Inc.,|c[2018] 
300    1 online resource (xvi, 272 pages) :|billustrations. 
336    text|btxt|2rdacontent 
337    computer|bn|2rdamedia 
338    online resource|bnc|2rdacarrier 
347    text file|2rdaft 
490 1  Homeland security studies.|aCritical infrastructure and 
       homeland security series ;|v10. 
504    Includes bibliographical references and index. 
505 0  Machine generated contents note: 1. Introduction -- We 
       Feel It Because of a Need; It Is the Need to Communicate -
       - Sector Overview -- The Bottom Line -- References and 
       Recommended Reading -- 2. Terrorist Attacks Against 
       Americans -- Introduction -- What Is Terrorism? -- 
       References and Recommended Reading -- 3. Critical 
       Infrastructure -- What Is Critical Infrastructure? -- 
       Wireline Infrastructure -- Wireless Infrastructure -- 
       Satellite Infrastructure -- Cable Infrastructure -- 
       Broadcasting Infrastructure -- The Bottom Line -- 
       References and Recommended Reading -- 4. Communications 
       Sector Security -- Mr. Grasshopper and Mr. Rabbit #1 -- 
       Introduction -- Communications Sector Security Goals and 
       Attributes -- Homeland Security Directives -- Assessing 
       Consequences -- References and Recommended Reading -- 5. 
       Vulnerability Assessment (VA) -- Introduction -- Assessing
       Vulnerabilities -- Mr. Grasshopper and Mr. Rabbit 
       Conversation #2 -- Insider Threat Vulnerability -- 
       Vulnerability Assessment (VA) -- Vulnerability Assessment 
       Methodology -- Vulnerability Assessment Procedures -- 
       Vulnerability Assessment: Checklist Procedure -- 
       References and Recommended Reading -- 6. Preparation: When
       Is Enough, Enough? -- Introduction -- Threats and 
       Incidents -- Response to Threats -- Preparation -- The 
       Bottom Line -- References and Recommended Reading -- 7. 
       Cybersecurity and SCADA -- Cyberspace -- What Is SCADA? --
       SCADA Applications -- SCADA Vulnerabilities -- Steps to 
       Improve SCADA Security -- References and Recommended 
       Reading -- 8. Emergency Response -- Communications Sector 
       Contingency Planning -- Crisis Communications Plan -- The 
       Bottom Line -- References and Recommended Reading -- 9. 
       Security Techniques and Hardware -- The Multiple-Barrier 
       Approach -- Security Hardware Devices -- Communication 
       Integration -- Cyber Protection Devices -- References and 
       Recommended Reading -- 10. The Paradigm Shift -- Fourteen 
       Features of Active and Effective Security -- References 
       and Recommended Reading. 
520    "The tenth of a new, well-received, and highly acclaimed 
       series on critical infrastructure and homeland security, 
       Communications Sector Protection and Homeland Security is 
       an eye-opening account and an important reference source 
       of a complex sector"--Provided by publisher. 
588    Description based on print version record and CIP data 
       provided by publisher; resource not viewed. 
590    eBooks on EBSCOhost|bEBSCO eBook Subscription Academic 
       Collection - North America 
650  0 Telecommunication|xSecurity measures|0https://id.loc.gov/
       authorities/subjects/sh85133285|zUnited States.|0https://
       id.loc.gov/authorities/names/n78095330-781 
650  0 National security|zUnited States.|0https://id.loc.gov/
       authorities/subjects/sh85140387 
650  0 Telecommunication policy|zUnited States.|0https://
       id.loc.gov/authorities/subjects/sh2008112724 
650  7 Telecommunication|xSecurity measures.|2fast|0https://
       id.worldcat.org/fast/1145928 
650  7 National security.|2fast|0https://id.worldcat.org/fast/
       1033711 
650  7 Telecommunication policy.|2fast|0https://id.worldcat.org/
       fast/1146029 
650  7 BUSINESS & ECONOMICS / Industries / Media & 
       Communications.|2bisacsh 
650  7 TECHNOLOGY & ENGINEERING / Telecommunications.|2bisacsh 
651  7 United States.|2fast|0https://id.worldcat.org/fast/1204155
655  4 Electronic books. 
776 08 |iPrint version:|aSpellman, Frank R., author.
       |tCommunications sector protection and homeland security
       |dLanham, Maryland : Bernan Press, an imprint of The 
       Rowman & Littlefield Publishing Group, Inc., [2018]
       |z9781641433099|w(DLC)  2018035516 
830  0 Homeland security series (Lanham, Md.)|0https://id.loc.gov
       /authorities/names/no2016171046 
856 40 |uhttps://rider.idm.oclc.org/login?url=https://
       search.ebscohost.com/login.aspx?direct=true&scope=site&
       db=nlebk&AN=1901928|zOnline ebook via EBSCO. Access 
       restricted to current Rider University students, faculty, 
       and staff. 
856 42 |3Instructions for reading/downloading the EBSCO version 
       of this ebook|uhttp://guides.rider.edu/ebooks/ebsco 
901    MARCIVE 20231220 
948    |d202207013|cEBSCO|tEBSCOebooksacademic July NEW 6029
       |lridw 
994    92|bRID