Business continuity and disaster recovery planning for IT professionals /
"Massive Tornado Hits Moore, OK. Mercy Hospital Destroyed in Joplin, MO Tornado. Powerful Earthquake Triggers Tsunami in Pacific. Super Storm Sandy Wipes Out New Jersey Boardwalk. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. These headlines are all too...
Guardado en:
Autor principal: | Snedaker, Susan |
---|---|
Otros Autores: | Rima, Chris |
Formato: | Electrónico eBook |
Lenguaje: | inglés |
Publicado: |
Waltham, MA :
Syngress,
[2014]
|
Edición: | Second edition. |
Materias: | |
Acceso en línea: | An electronic book accessible through the World Wide Web; click to view |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
Computer security handbook /
Publicado: (2014)
Publicado: (2014)
Business continuity planning for data centers and systems a strategic implementation guide /
por: Bowman, Ronald H., 1960-
Publicado: (2008)
por: Bowman, Ronald H., 1960-
Publicado: (2008)
Security and control in information systems a guide for business and accounting /
por: Hawker, Andrew
Publicado: (2000)
por: Hawker, Andrew
Publicado: (2000)
Security architect : careers in information security /
por: Collins, Jon
Publicado: (2014)
por: Collins, Jon
Publicado: (2014)
Managing the human factor in information security how to win over staff and influence business managers /
por: Lacey, David
Publicado: (2009)
por: Lacey, David
Publicado: (2009)
Privacy online : OECD guidance on policy and practice.
Publicado: (2003)
Publicado: (2003)
IT disaster recovery planning for dummies
por: Gregory, Peter H.
Publicado: (2008)
por: Gregory, Peter H.
Publicado: (2008)
Enterprise information security and privacy
Publicado: (2009)
Publicado: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
por: Alexander, Philip, 1963-
Publicado: (2008)
por: Alexander, Philip, 1963-
Publicado: (2008)
IT audit, control, and security
por: Moeller, Robert R.
Publicado: (2010)
por: Moeller, Robert R.
Publicado: (2010)
Managing information security : a program for the electronic information age /
por: Schweitzer, James A., 1929-
Publicado: (1982)
por: Schweitzer, James A., 1929-
Publicado: (1982)
The insider threat combatting the enemy within /
por: Blackwell, Clive
Publicado: (2009)
por: Blackwell, Clive
Publicado: (2009)
Control and security of E-commerce
por: Smith, Gordon E. (Gordon Edward)
Publicado: (2004)
por: Smith, Gordon E. (Gordon Edward)
Publicado: (2004)
Security in distributed and networking systems
Publicado: (2007)
Publicado: (2007)
Distributed systems security issues, processes, and solutions /
Publicado: (2009)
Publicado: (2009)
Protecting your library's digital sources the essential guide to planning and preservation /
por: Kahn, Miriam (Miriam B.)
Publicado: (2004)
por: Kahn, Miriam (Miriam B.)
Publicado: (2004)
Aspects of network and information security
Publicado: (2008)
Publicado: (2008)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
por: Canavan, Tom
Publicado: (2011)
por: Canavan, Tom
Publicado: (2011)
Data center handbook /
Publicado: (2015)
Publicado: (2015)
Integrated identity management using IBM Tivoli security solutions
por: Bücker, Axel
Publicado: (2004)
por: Bücker, Axel
Publicado: (2004)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
por: Cordesman, Anthony H.
Publicado: (2002)
por: Cordesman, Anthony H.
Publicado: (2002)
Cyber conflict competing national perspectives /
por: Ventre, Daniel
Publicado: (2012)
por: Ventre, Daniel
Publicado: (2012)
Advances in cyber security : technology, operations, and experiences /
Publicado: (2013)
Publicado: (2013)
The death of the Internet
Publicado: (2012)
Publicado: (2012)
Strategic security management a risk assessment guide for decision makers /
por: Vellani, Karim H., 1971-
Publicado: (2007)
por: Vellani, Karim H., 1971-
Publicado: (2007)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
por: Winterfeld, Steve
Publicado: (2013)
por: Winterfeld, Steve
Publicado: (2013)
Web 2.0 security defending Ajax, RIA, and SOA /
por: Shah, Shreeraj
Publicado: (2008)
por: Shah, Shreeraj
Publicado: (2008)
Enterprise business portals II with IBM tivoli access manager
por: Bücker, Axel
Publicado: (2003)
por: Bücker, Axel
Publicado: (2003)
Information security governance simplified from the boardroom to the keyboard /
por: Fitzgerald, Todd
Publicado: (2012)
por: Fitzgerald, Todd
Publicado: (2012)
Network and security issues for internet mobile entertainment
Publicado: (2004)
Publicado: (2004)
Designing and building enterprise DMZs
por: Flynn, Hal
Publicado: (2006)
por: Flynn, Hal
Publicado: (2006)
Wireless sensor network security
Publicado: (2008)
Publicado: (2008)
Cyber security /
Publicado: (2014)
Publicado: (2014)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
por: Mowbray, Thomas J.
Publicado: (2014)
por: Mowbray, Thomas J.
Publicado: (2014)
Internet security you can afford : using untangle as your internet gateway /
por: Dawson, Christopher
Publicado: (2015)
por: Dawson, Christopher
Publicado: (2015)
Cyber security and resiliency policy framework /
Publicado: (2014)
Publicado: (2014)
IoT security issues /
por: Gilchrist, Alasdair
Publicado: (2017)
por: Gilchrist, Alasdair
Publicado: (2017)
Security in ad hoc and sensor networks
por: Beyah, Raheem (Raheem A.), 1976-
Publicado: (2010)
por: Beyah, Raheem (Raheem A.), 1976-
Publicado: (2010)
Cyber risks for business professionals a management guide /
por: Kendrick, Rupert
Publicado: (2010)
por: Kendrick, Rupert
Publicado: (2010)
Designing network security : a practical guide to creating a secure network infrastructure /
por: Kaeo, Merike
Publicado: (2004)
por: Kaeo, Merike
Publicado: (2004)
Ejemplares similares
-
Computer security handbook /
Publicado: (2014) -
Business continuity planning for data centers and systems a strategic implementation guide /
por: Bowman, Ronald H., 1960-
Publicado: (2008) -
Security and control in information systems a guide for business and accounting /
por: Hawker, Andrew
Publicado: (2000) -
Security architect : careers in information security /
por: Collins, Jon
Publicado: (2014) -
Managing the human factor in information security how to win over staff and influence business managers /
por: Lacey, David
Publicado: (2009)