Business continuity and disaster recovery planning for IT professionals /
"Massive Tornado Hits Moore, OK. Mercy Hospital Destroyed in Joplin, MO Tornado. Powerful Earthquake Triggers Tsunami in Pacific. Super Storm Sandy Wipes Out New Jersey Boardwalk. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. These headlines are all too...
Guardat en:
Autor principal: | Snedaker, Susan |
---|---|
Altres autors: | Rima, Chris |
Format: | Electrònic eBook |
Idioma: | anglès |
Publicat: |
Waltham, MA :
Syngress,
[2014]
|
Edició: | Second edition. |
Matèries: | |
Accés en línia: | An electronic book accessible through the World Wide Web; click to view |
Etiquetes: |
Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
Ítems similars
Computer security handbook /
Publicat: (2014)
Publicat: (2014)
Business continuity planning for data centers and systems a strategic implementation guide /
per: Bowman, Ronald H., 1960-
Publicat: (2008)
per: Bowman, Ronald H., 1960-
Publicat: (2008)
Security and control in information systems a guide for business and accounting /
per: Hawker, Andrew
Publicat: (2000)
per: Hawker, Andrew
Publicat: (2000)
Security architect : careers in information security /
per: Collins, Jon
Publicat: (2014)
per: Collins, Jon
Publicat: (2014)
Managing the human factor in information security how to win over staff and influence business managers /
per: Lacey, David
Publicat: (2009)
per: Lacey, David
Publicat: (2009)
Privacy online : OECD guidance on policy and practice.
Publicat: (2003)
Publicat: (2003)
IT disaster recovery planning for dummies
per: Gregory, Peter H.
Publicat: (2008)
per: Gregory, Peter H.
Publicat: (2008)
Enterprise information security and privacy
Publicat: (2009)
Publicat: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
per: Alexander, Philip, 1963-
Publicat: (2008)
per: Alexander, Philip, 1963-
Publicat: (2008)
IT audit, control, and security
per: Moeller, Robert R.
Publicat: (2010)
per: Moeller, Robert R.
Publicat: (2010)
Managing information security : a program for the electronic information age /
per: Schweitzer, James A., 1929-
Publicat: (1982)
per: Schweitzer, James A., 1929-
Publicat: (1982)
The insider threat combatting the enemy within /
per: Blackwell, Clive
Publicat: (2009)
per: Blackwell, Clive
Publicat: (2009)
Control and security of E-commerce
per: Smith, Gordon E. (Gordon Edward)
Publicat: (2004)
per: Smith, Gordon E. (Gordon Edward)
Publicat: (2004)
Security in distributed and networking systems
Publicat: (2007)
Publicat: (2007)
Distributed systems security issues, processes, and solutions /
Publicat: (2009)
Publicat: (2009)
Protecting your library's digital sources the essential guide to planning and preservation /
per: Kahn, Miriam (Miriam B.)
Publicat: (2004)
per: Kahn, Miriam (Miriam B.)
Publicat: (2004)
Aspects of network and information security
Publicat: (2008)
Publicat: (2008)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
per: Canavan, Tom
Publicat: (2011)
per: Canavan, Tom
Publicat: (2011)
Data center handbook /
Publicat: (2015)
Publicat: (2015)
Integrated identity management using IBM Tivoli security solutions
per: Bücker, Axel
Publicat: (2004)
per: Bücker, Axel
Publicat: (2004)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
per: Cordesman, Anthony H.
Publicat: (2002)
per: Cordesman, Anthony H.
Publicat: (2002)
Cyber conflict competing national perspectives /
per: Ventre, Daniel
Publicat: (2012)
per: Ventre, Daniel
Publicat: (2012)
Advances in cyber security : technology, operations, and experiences /
Publicat: (2013)
Publicat: (2013)
Strategic security management a risk assessment guide for decision makers /
per: Vellani, Karim H., 1971-
Publicat: (2007)
per: Vellani, Karim H., 1971-
Publicat: (2007)
The death of the Internet
Publicat: (2012)
Publicat: (2012)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
per: Winterfeld, Steve
Publicat: (2013)
per: Winterfeld, Steve
Publicat: (2013)
Web 2.0 security defending Ajax, RIA, and SOA /
per: Shah, Shreeraj
Publicat: (2008)
per: Shah, Shreeraj
Publicat: (2008)
Enterprise business portals II with IBM tivoli access manager
per: Bücker, Axel
Publicat: (2003)
per: Bücker, Axel
Publicat: (2003)
Information security governance simplified from the boardroom to the keyboard /
per: Fitzgerald, Todd
Publicat: (2012)
per: Fitzgerald, Todd
Publicat: (2012)
Designing and building enterprise DMZs
per: Flynn, Hal
Publicat: (2006)
per: Flynn, Hal
Publicat: (2006)
Network and security issues for internet mobile entertainment
Publicat: (2004)
Publicat: (2004)
Wireless sensor network security
Publicat: (2008)
Publicat: (2008)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
per: Mowbray, Thomas J.
Publicat: (2014)
per: Mowbray, Thomas J.
Publicat: (2014)
Cyber security /
Publicat: (2014)
Publicat: (2014)
Internet security you can afford : using untangle as your internet gateway /
per: Dawson, Christopher
Publicat: (2015)
per: Dawson, Christopher
Publicat: (2015)
Cyber security and resiliency policy framework /
Publicat: (2014)
Publicat: (2014)
IoT security issues /
per: Gilchrist, Alasdair
Publicat: (2017)
per: Gilchrist, Alasdair
Publicat: (2017)
Security in ad hoc and sensor networks
per: Beyah, Raheem (Raheem A.), 1976-
Publicat: (2010)
per: Beyah, Raheem (Raheem A.), 1976-
Publicat: (2010)
Cyber risks for business professionals a management guide /
per: Kendrick, Rupert
Publicat: (2010)
per: Kendrick, Rupert
Publicat: (2010)
Designing network security : a practical guide to creating a secure network infrastructure /
per: Kaeo, Merike
Publicat: (2004)
per: Kaeo, Merike
Publicat: (2004)
Ítems similars
-
Computer security handbook /
Publicat: (2014) -
Business continuity planning for data centers and systems a strategic implementation guide /
per: Bowman, Ronald H., 1960-
Publicat: (2008) -
Security and control in information systems a guide for business and accounting /
per: Hawker, Andrew
Publicat: (2000) -
Security architect : careers in information security /
per: Collins, Jon
Publicat: (2014) -
Managing the human factor in information security how to win over staff and influence business managers /
per: Lacey, David
Publicat: (2009)