Book addresses utility security
A new book addresses new approaches to utility security following the terrorist attacks of Sept. 11, 2001.
April 7, 2003 -- A new book addresses new approaches to utility security following the terrorist attacks of Sept. 11, 2001.
Utility Security: The New Paradigm
By Karl A. Seger, Ph.D.
Item Number: 0-87814-882-5
Page Length: approx. 238 pages
Publication Date: April 2004
Trim Size/Binding: 6X9 Hardcover
About the Book
In response to recent security concerns, Dr. Seger addresses the real threats to utility systems and provides a step-by-step approach to assessing vulnerabilities and developing and implementing security countermeasures.
Included in the book are threat assessment and security checklists, a vulnerability/countermeasure matrix, and sample security and workplace violence prevention policies.
• Understand the real security threat to most utility systems
• Learn to conduct a vulnerability/"criticality" security survey of system assets
• Learn how to develop a security program to manage vulnerabilities
About the Author
Karl A. Seger, Ph.D. has provided anti-terrorism consulting and training for all branches of the U.S. military, the Departments of Justice and Treasury, and for the Federal Emergency Management Agency. He received a grant prior to the 1982 World's Fair in Knoxville, Tennessee to conduct a terrorism threat assessment for the event and to train local police in preparation for it.
Dr. Seger assisted in the development of the Army's terrorism counteraction program in the 1980s and he was the contract writer for TC19-16, Countering Terrorism on U.S. Army Installations. This text was used by the Army's Terrorism Counteraction course from 1982 through 1995. He is the author of the Antiterrorism Handbook (Presidio Press, 1990) and co-author of Computer Crime: An Investigator's Handbook (O'Reilly & Associates, 1995). Dr. Seger provides security training and consulting services for government and corporate clients around the world.
Section 1: New Paradigm Threats
• Sept. 11, 2001
• The Threat from Extremists
• Conventional Threats
Section 2: Managing Threats
• Risk Management Process
• Protecting Information and Information Systems
• Physical Security and Access Control
• Protecting Employees and Physical Assets
• Special Threats
• Threat Response Plan
• Crisis Management
• Helpful Website Addresses
• About the Author
Sales & Marketing Manager
1421 S Sheridan Road
Tulsa, OK 74112