It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-009.mrc:124060139:2481
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-009.mrc:124060139:2481?format=raw

LEADER: 02481pam a22003374a 4500
001 4086823
005 20221027032914.0
008 030219t20032003okua b 001 0 eng
010 $a 2003002795
020 $a0878148825
035 $a(OCoLC)ocm51804757
035 $a(NNC)4086823
035 $a4086823
040 $aDLC$cDLC$dYDX$dOrLoB-B
042 $apcc
050 00 $aTK1025$b.S44 2003
082 00 $a333.793/2/0684$221
100 1 $aSeger, Karl A.,$d1940-$0http://id.loc.gov/authorities/names/n90603728
245 10 $aUtility security :$bthe new paradigm /$cKarl A. Seger.
260 $aTulsa, Okla. :$bPennWell Corp.,$c[2003], ©2003.
300 $axiii, 293 pages :$billustrations ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
504 $aIncludes bibliographical references and index.
505 00 $g1.$tSeptember 11, 2001 -- $g2.$tThe Threat from Extremists -- $g3.$tConventional Threats -- $g4.$tThe Risk Management Process -- $g5.$tProtecting Information -- $g6.$tProtecting Networks and Computer Systems -- $g7.$tPhysical Security and Access Control -- $g8.$tProtecting Employees and Physical Assets -- $g9.$tSpecial Threats -- $g10.$tThreat Response Plan -- $g11.$tCrisis Management -- $gApp. A.$tThreat Alert Levels and Physical Response Guidelines -- $gApp. B.$tThreat Alert System and Cyber Response Guidelines for the Electricity Sector -- $gApp. C.$tFacility Vulnerability Determining System -- $gApp. D.$tComputer and Internet Use Policies -- $gApp. E.$tPersonal Protection Checklist -- $gApp. F.$tBomb Threat Checklist -- $gApp. G.$tExecutive Crisis Response File -- $gApp. H.$tSample Theft of Service Policy -- $gApp. I.$tPhysical Security Plan -- $gApp. J.$tSecurity Survey Checklist.
520 1 $a"The New Paradigm addresses real threats to utility systems and provides a step-by-step approach to assessing vulnerabilities and developing and implementing security countermeasures. Included in the book are threat assessment and security checklists, as well as a vulnerability/countermeasure matrix and sample security and workplace violence prevention policies."--BOOK JACKET.
650 0 $aElectric power-plants$xSecurity measures.
650 0 $aComputer networks$xSecurity measures.$0http://id.loc.gov/authorities/subjects/sh94001277
650 0 $aPublic utilities$xSecurity measures.
650 0 $aTerrorism$xPrevention.$0http://id.loc.gov/authorities/subjects/sh00007517
852 00 $boff,bus$hTK1025$i.S44 2003