Business continuity and disaster recovery planning for IT professionals /
"Massive Tornado Hits Moore, OK. Mercy Hospital Destroyed in Joplin, MO Tornado. Powerful Earthquake Triggers Tsunami in Pacific. Super Storm Sandy Wipes Out New Jersey Boardwalk. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. These headlines are all too...
Saved in:
Main Author: | Snedaker, Susan |
---|---|
Other Authors: | Rima, Chris |
Format: | Electronic eBook |
Language: | English |
Published: |
Waltham, MA :
Syngress,
[2014]
|
Edition: | Second edition. |
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Computer security handbook /
Published: (2014)
Published: (2014)
Business continuity planning for data centers and systems a strategic implementation guide /
by: Bowman, Ronald H., 1960-
Published: (2008)
by: Bowman, Ronald H., 1960-
Published: (2008)
Security and control in information systems a guide for business and accounting /
by: Hawker, Andrew
Published: (2000)
by: Hawker, Andrew
Published: (2000)
Security architect : careers in information security /
by: Collins, Jon
Published: (2014)
by: Collins, Jon
Published: (2014)
Managing the human factor in information security how to win over staff and influence business managers /
by: Lacey, David
Published: (2009)
by: Lacey, David
Published: (2009)
Privacy online : OECD guidance on policy and practice.
Published: (2003)
Published: (2003)
IT disaster recovery planning for dummies
by: Gregory, Peter H.
Published: (2008)
by: Gregory, Peter H.
Published: (2008)
Enterprise information security and privacy
Published: (2009)
Published: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
by: Alexander, Philip, 1963-
Published: (2008)
by: Alexander, Philip, 1963-
Published: (2008)
IT audit, control, and security
by: Moeller, Robert R.
Published: (2010)
by: Moeller, Robert R.
Published: (2010)
Managing information security : a program for the electronic information age /
by: Schweitzer, James A., 1929-
Published: (1982)
by: Schweitzer, James A., 1929-
Published: (1982)
The insider threat combatting the enemy within /
by: Blackwell, Clive
Published: (2009)
by: Blackwell, Clive
Published: (2009)
Control and security of E-commerce
by: Smith, Gordon E. (Gordon Edward)
Published: (2004)
by: Smith, Gordon E. (Gordon Edward)
Published: (2004)
Security in distributed and networking systems
Published: (2007)
Published: (2007)
Distributed systems security issues, processes, and solutions /
Published: (2009)
Published: (2009)
Protecting your library's digital sources the essential guide to planning and preservation /
by: Kahn, Miriam (Miriam B.)
Published: (2004)
by: Kahn, Miriam (Miriam B.)
Published: (2004)
Aspects of network and information security
Published: (2008)
Published: (2008)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
by: Canavan, Tom
Published: (2011)
by: Canavan, Tom
Published: (2011)
Data center handbook /
Published: (2015)
Published: (2015)
Integrated identity management using IBM Tivoli security solutions
by: Bücker, Axel
Published: (2004)
by: Bücker, Axel
Published: (2004)
Cyber conflict competing national perspectives /
by: Ventre, Daniel
Published: (2012)
by: Ventre, Daniel
Published: (2012)
Advances in cyber security : technology, operations, and experiences /
Published: (2013)
Published: (2013)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
by: Cordesman, Anthony H.
Published: (2002)
by: Cordesman, Anthony H.
Published: (2002)
The death of the Internet
Published: (2012)
Published: (2012)
Strategic security management a risk assessment guide for decision makers /
by: Vellani, Karim H., 1971-
Published: (2007)
by: Vellani, Karim H., 1971-
Published: (2007)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
by: Winterfeld, Steve
Published: (2013)
by: Winterfeld, Steve
Published: (2013)
Web 2.0 security defending Ajax, RIA, and SOA /
by: Shah, Shreeraj
Published: (2008)
by: Shah, Shreeraj
Published: (2008)
Designing and building enterprise DMZs
by: Flynn, Hal
Published: (2006)
by: Flynn, Hal
Published: (2006)
Network and security issues for internet mobile entertainment
Published: (2004)
Published: (2004)
Internet security you can afford : using untangle as your internet gateway /
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Cyber security and resiliency policy framework /
Published: (2014)
Published: (2014)
Cyber security /
Published: (2014)
Published: (2014)
Wireless sensor network security
Published: (2008)
Published: (2008)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
IoT security issues /
by: Gilchrist, Alasdair
Published: (2017)
by: Gilchrist, Alasdair
Published: (2017)
Enterprise business portals II with IBM tivoli access manager
by: Bücker, Axel
Published: (2003)
by: Bücker, Axel
Published: (2003)
Security in ad hoc and sensor networks
by: Beyah, Raheem (Raheem A.), 1976-
Published: (2010)
by: Beyah, Raheem (Raheem A.), 1976-
Published: (2010)
Web commerce security design and development /
by: Nahari, Hadi
Published: (2011)
by: Nahari, Hadi
Published: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
by: Mularien, Peter
Published: (2010)
by: Mularien, Peter
Published: (2010)
Designing network security : a practical guide to creating a secure network infrastructure /
by: Kaeo, Merike
Published: (2004)
by: Kaeo, Merike
Published: (2004)
Similar Items
-
Computer security handbook /
Published: (2014) -
Business continuity planning for data centers and systems a strategic implementation guide /
by: Bowman, Ronald H., 1960-
Published: (2008) -
Security and control in information systems a guide for business and accounting /
by: Hawker, Andrew
Published: (2000) -
Security architect : careers in information security /
by: Collins, Jon
Published: (2014) -
Managing the human factor in information security how to win over staff and influence business managers /
by: Lacey, David
Published: (2009)