Business continuity and disaster recovery planning for IT professionals /
"Massive Tornado Hits Moore, OK. Mercy Hospital Destroyed in Joplin, MO Tornado. Powerful Earthquake Triggers Tsunami in Pacific. Super Storm Sandy Wipes Out New Jersey Boardwalk. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. These headlines are all too...
Enregistré dans:
Auteur principal: | Snedaker, Susan |
---|---|
Autres auteurs: | Rima, Chris |
Format: | Électronique eBook |
Langue: | anglais |
Publié: |
Waltham, MA :
Syngress,
[2014]
|
Édition: | Second edition. |
Sujets: | |
Accès en ligne: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
|
Documents similaires
Computer security handbook /
Publié: (2014)
Publié: (2014)
Business continuity planning for data centers and systems a strategic implementation guide /
par: Bowman, Ronald H., 1960-
Publié: (2008)
par: Bowman, Ronald H., 1960-
Publié: (2008)
Security and control in information systems a guide for business and accounting /
par: Hawker, Andrew
Publié: (2000)
par: Hawker, Andrew
Publié: (2000)
Security architect : careers in information security /
par: Collins, Jon
Publié: (2014)
par: Collins, Jon
Publié: (2014)
Managing the human factor in information security how to win over staff and influence business managers /
par: Lacey, David
Publié: (2009)
par: Lacey, David
Publié: (2009)
Privacy online : OECD guidance on policy and practice.
Publié: (2003)
Publié: (2003)
IT disaster recovery planning for dummies
par: Gregory, Peter H.
Publié: (2008)
par: Gregory, Peter H.
Publié: (2008)
Enterprise information security and privacy
Publié: (2009)
Publié: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
par: Alexander, Philip, 1963-
Publié: (2008)
par: Alexander, Philip, 1963-
Publié: (2008)
IT audit, control, and security
par: Moeller, Robert R.
Publié: (2010)
par: Moeller, Robert R.
Publié: (2010)
Managing information security : a program for the electronic information age /
par: Schweitzer, James A., 1929-
Publié: (1982)
par: Schweitzer, James A., 1929-
Publié: (1982)
The insider threat combatting the enemy within /
par: Blackwell, Clive
Publié: (2009)
par: Blackwell, Clive
Publié: (2009)
Control and security of E-commerce
par: Smith, Gordon E. (Gordon Edward)
Publié: (2004)
par: Smith, Gordon E. (Gordon Edward)
Publié: (2004)
Security in distributed and networking systems
Publié: (2007)
Publié: (2007)
Distributed systems security issues, processes, and solutions /
Publié: (2009)
Publié: (2009)
Protecting your library's digital sources the essential guide to planning and preservation /
par: Kahn, Miriam (Miriam B.)
Publié: (2004)
par: Kahn, Miriam (Miriam B.)
Publié: (2004)
Aspects of network and information security
Publié: (2008)
Publié: (2008)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
par: Canavan, Tom
Publié: (2011)
par: Canavan, Tom
Publié: (2011)
Data center handbook /
Publié: (2015)
Publié: (2015)
Integrated identity management using IBM Tivoli security solutions
par: Bücker, Axel
Publié: (2004)
par: Bücker, Axel
Publié: (2004)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
par: Cordesman, Anthony H.
Publié: (2002)
par: Cordesman, Anthony H.
Publié: (2002)
Cyber conflict competing national perspectives /
par: Ventre, Daniel
Publié: (2012)
par: Ventre, Daniel
Publié: (2012)
Advances in cyber security : technology, operations, and experiences /
Publié: (2013)
Publié: (2013)
The death of the Internet
Publié: (2012)
Publié: (2012)
Strategic security management a risk assessment guide for decision makers /
par: Vellani, Karim H., 1971-
Publié: (2007)
par: Vellani, Karim H., 1971-
Publié: (2007)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
par: Winterfeld, Steve
Publié: (2013)
par: Winterfeld, Steve
Publié: (2013)
Web 2.0 security defending Ajax, RIA, and SOA /
par: Shah, Shreeraj
Publié: (2008)
par: Shah, Shreeraj
Publié: (2008)
Enterprise business portals II with IBM tivoli access manager
par: Bücker, Axel
Publié: (2003)
par: Bücker, Axel
Publié: (2003)
Information security governance simplified from the boardroom to the keyboard /
par: Fitzgerald, Todd
Publié: (2012)
par: Fitzgerald, Todd
Publié: (2012)
Network and security issues for internet mobile entertainment
Publié: (2004)
Publié: (2004)
Wireless sensor network security
Publié: (2008)
Publié: (2008)
Designing and building enterprise DMZs
par: Flynn, Hal
Publié: (2006)
par: Flynn, Hal
Publié: (2006)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
par: Mowbray, Thomas J.
Publié: (2014)
par: Mowbray, Thomas J.
Publié: (2014)
Cyber security /
Publié: (2014)
Publié: (2014)
Internet security you can afford : using untangle as your internet gateway /
par: Dawson, Christopher
Publié: (2015)
par: Dawson, Christopher
Publié: (2015)
Cyber security and resiliency policy framework /
Publié: (2014)
Publié: (2014)
IoT security issues /
par: Gilchrist, Alasdair
Publié: (2017)
par: Gilchrist, Alasdair
Publié: (2017)
Security in ad hoc and sensor networks
par: Beyah, Raheem (Raheem A.), 1976-
Publié: (2010)
par: Beyah, Raheem (Raheem A.), 1976-
Publié: (2010)
Cyber risks for business professionals a management guide /
par: Kendrick, Rupert
Publié: (2010)
par: Kendrick, Rupert
Publié: (2010)
Designing network security : a practical guide to creating a secure network infrastructure /
par: Kaeo, Merike
Publié: (2004)
par: Kaeo, Merike
Publié: (2004)
Documents similaires
-
Computer security handbook /
Publié: (2014) -
Business continuity planning for data centers and systems a strategic implementation guide /
par: Bowman, Ronald H., 1960-
Publié: (2008) -
Security and control in information systems a guide for business and accounting /
par: Hawker, Andrew
Publié: (2000) -
Security architect : careers in information security /
par: Collins, Jon
Publié: (2014) -
Managing the human factor in information security how to win over staff and influence business managers /
par: Lacey, David
Publié: (2009)