Book addresses utility security

April 7, 2003
A new book addresses new approaches to utility security following the terrorist attacks of Sept. 11, 2001.


April 7, 2003 -- A new book addresses new approaches to utility security following the terrorist attacks of Sept. 11, 2001.

Utility Security: The New Paradigm
By Karl A. Seger, Ph.D.

Item Number: 0-87814-882-5
Price: $69.95
Page Length: approx. 238 pages
Publication Date: April 2004
Trim Size/Binding: 6X9 Hardcover

About the Book

In response to recent security concerns, Dr. Seger addresses the real threats to utility systems and provides a step-by-step approach to assessing vulnerabilities and developing and implementing security countermeasures.

Included in the book are threat assessment and security checklists, a vulnerability/countermeasure matrix, and sample security and workplace violence prevention policies.

• Understand the real security threat to most utility systems
• Learn to conduct a vulnerability/"criticality" security survey of system assets
• Learn how to develop a security program to manage vulnerabilities

About the Author

Karl A. Seger, Ph.D. has provided anti-terrorism consulting and training for all branches of the U.S. military, the Departments of Justice and Treasury, and for the Federal Emergency Management Agency. He received a grant prior to the 1982 World's Fair in Knoxville, Tennessee to conduct a terrorism threat assessment for the event and to train local police in preparation for it.

Dr. Seger assisted in the development of the Army's terrorism counteraction program in the 1980s and he was the contract writer for TC19-16, Countering Terrorism on U.S. Army Installations. This text was used by the Army's Terrorism Counteraction course from 1982 through 1995. He is the author of the Antiterrorism Handbook (Presidio Press, 1990) and co-author of Computer Crime: An Investigator's Handbook (O'Reilly & Associates, 1995). Dr. Seger provides security training and consulting services for government and corporate clients around the world.

Contents

Section 1: New Paradigm Threats
• Sept. 11, 2001
• The Threat from Extremists
• Conventional Threats

Section 2: Managing Threats
• Risk Management Process
• Protecting Information and Information Systems
• Physical Security and Access Control
• Protecting Employees and Physical Assets
• Special Threats
• Threat Response Plan
• Crisis Management
• Appendices
• Helpful Website Addresses
• About the Author

Contact information

Mary McGee
PennWell Books
Sales & Marketing Manager
1421 S Sheridan Road
Tulsa, OK 74112
918.831.9512 phone
918.832.9319 fax
http://www.pennwell-store.com

Sponsored Recommendations

April 25, 2024
Discover the transformative benefits of leveraging a scalable On-Machine I/O to improve flexibility, enhance reliability and streamline operations.
April 25, 2024
The world of manufacturing is changing, and Generative AI is one of the many change agents. The 2024 State of Smart Manufacturing Report takes a deep dive into how Generative ...
April 25, 2024
The world of manufacturing is changing, and Generative AI is one of the many change agents. The 2024 State of Smart Manufacturing Report takes a deep dive into how Generative ...
March 15, 2024
Alarm notification software enables faster response for customers, keeping production on track