Business continuity and disaster recovery planning for IT professionals /
"Massive Tornado Hits Moore, OK. Mercy Hospital Destroyed in Joplin, MO Tornado. Powerful Earthquake Triggers Tsunami in Pacific. Super Storm Sandy Wipes Out New Jersey Boardwalk. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. These headlines are all too...
Sábháilte in:
Príomhchruthaitheoir: | Snedaker, Susan |
---|---|
Rannpháirtithe: | Rima, Chris |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Waltham, MA :
Syngress,
[2014]
|
Eagrán: | Second edition. |
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Computer security handbook /
Foilsithe / Cruthaithe: (2014)
Foilsithe / Cruthaithe: (2014)
Business continuity planning for data centers and systems a strategic implementation guide /
de réir: Bowman, Ronald H., 1960-
Foilsithe / Cruthaithe: (2008)
de réir: Bowman, Ronald H., 1960-
Foilsithe / Cruthaithe: (2008)
Security and control in information systems a guide for business and accounting /
de réir: Hawker, Andrew
Foilsithe / Cruthaithe: (2000)
de réir: Hawker, Andrew
Foilsithe / Cruthaithe: (2000)
Security architect : careers in information security /
de réir: Collins, Jon
Foilsithe / Cruthaithe: (2014)
de réir: Collins, Jon
Foilsithe / Cruthaithe: (2014)
Managing the human factor in information security how to win over staff and influence business managers /
de réir: Lacey, David
Foilsithe / Cruthaithe: (2009)
de réir: Lacey, David
Foilsithe / Cruthaithe: (2009)
Privacy online : OECD guidance on policy and practice.
Foilsithe / Cruthaithe: (2003)
Foilsithe / Cruthaithe: (2003)
IT disaster recovery planning for dummies
de réir: Gregory, Peter H.
Foilsithe / Cruthaithe: (2008)
de réir: Gregory, Peter H.
Foilsithe / Cruthaithe: (2008)
Enterprise information security and privacy
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
de réir: Alexander, Philip, 1963-
Foilsithe / Cruthaithe: (2008)
de réir: Alexander, Philip, 1963-
Foilsithe / Cruthaithe: (2008)
IT audit, control, and security
de réir: Moeller, Robert R.
Foilsithe / Cruthaithe: (2010)
de réir: Moeller, Robert R.
Foilsithe / Cruthaithe: (2010)
Managing information security : a program for the electronic information age /
de réir: Schweitzer, James A., 1929-
Foilsithe / Cruthaithe: (1982)
de réir: Schweitzer, James A., 1929-
Foilsithe / Cruthaithe: (1982)
The insider threat combatting the enemy within /
de réir: Blackwell, Clive
Foilsithe / Cruthaithe: (2009)
de réir: Blackwell, Clive
Foilsithe / Cruthaithe: (2009)
Control and security of E-commerce
de réir: Smith, Gordon E. (Gordon Edward)
Foilsithe / Cruthaithe: (2004)
de réir: Smith, Gordon E. (Gordon Edward)
Foilsithe / Cruthaithe: (2004)
Security in distributed and networking systems
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Distributed systems security issues, processes, and solutions /
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Protecting your library's digital sources the essential guide to planning and preservation /
de réir: Kahn, Miriam (Miriam B.)
Foilsithe / Cruthaithe: (2004)
de réir: Kahn, Miriam (Miriam B.)
Foilsithe / Cruthaithe: (2004)
Aspects of network and information security
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Data center handbook /
Foilsithe / Cruthaithe: (2015)
Foilsithe / Cruthaithe: (2015)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
de réir: Canavan, Tom
Foilsithe / Cruthaithe: (2011)
de réir: Canavan, Tom
Foilsithe / Cruthaithe: (2011)
Integrated identity management using IBM Tivoli security solutions
de réir: Bücker, Axel
Foilsithe / Cruthaithe: (2004)
de réir: Bücker, Axel
Foilsithe / Cruthaithe: (2004)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
de réir: Cordesman, Anthony H.
Foilsithe / Cruthaithe: (2002)
de réir: Cordesman, Anthony H.
Foilsithe / Cruthaithe: (2002)
Cyber conflict competing national perspectives /
de réir: Ventre, Daniel
Foilsithe / Cruthaithe: (2012)
de réir: Ventre, Daniel
Foilsithe / Cruthaithe: (2012)
Advances in cyber security : technology, operations, and experiences /
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
The death of the Internet
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Strategic security management a risk assessment guide for decision makers /
de réir: Vellani, Karim H., 1971-
Foilsithe / Cruthaithe: (2007)
de réir: Vellani, Karim H., 1971-
Foilsithe / Cruthaithe: (2007)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
de réir: Winterfeld, Steve
Foilsithe / Cruthaithe: (2013)
de réir: Winterfeld, Steve
Foilsithe / Cruthaithe: (2013)
Web 2.0 security defending Ajax, RIA, and SOA /
de réir: Shah, Shreeraj
Foilsithe / Cruthaithe: (2008)
de réir: Shah, Shreeraj
Foilsithe / Cruthaithe: (2008)
Enterprise business portals II with IBM tivoli access manager
de réir: Bücker, Axel
Foilsithe / Cruthaithe: (2003)
de réir: Bücker, Axel
Foilsithe / Cruthaithe: (2003)
Information security governance simplified from the boardroom to the keyboard /
de réir: Fitzgerald, Todd
Foilsithe / Cruthaithe: (2012)
de réir: Fitzgerald, Todd
Foilsithe / Cruthaithe: (2012)
Security in ad hoc and sensor networks
de réir: Beyah, Raheem (Raheem A.), 1976-
Foilsithe / Cruthaithe: (2010)
de réir: Beyah, Raheem (Raheem A.), 1976-
Foilsithe / Cruthaithe: (2010)
Designing and building enterprise DMZs
de réir: Flynn, Hal
Foilsithe / Cruthaithe: (2006)
de réir: Flynn, Hal
Foilsithe / Cruthaithe: (2006)
Network and security issues for internet mobile entertainment
Foilsithe / Cruthaithe: (2004)
Foilsithe / Cruthaithe: (2004)
Wireless sensor network security
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
de réir: Mowbray, Thomas J.
Foilsithe / Cruthaithe: (2014)
de réir: Mowbray, Thomas J.
Foilsithe / Cruthaithe: (2014)
Cyber security /
Foilsithe / Cruthaithe: (2014)
Foilsithe / Cruthaithe: (2014)
Cyber security and resiliency policy framework /
Foilsithe / Cruthaithe: (2014)
Foilsithe / Cruthaithe: (2014)
Internet security you can afford : using untangle as your internet gateway /
de réir: Dawson, Christopher
Foilsithe / Cruthaithe: (2015)
de réir: Dawson, Christopher
Foilsithe / Cruthaithe: (2015)
IoT security issues /
de réir: Gilchrist, Alasdair
Foilsithe / Cruthaithe: (2017)
de réir: Gilchrist, Alasdair
Foilsithe / Cruthaithe: (2017)
Cyber risks for business professionals a management guide /
de réir: Kendrick, Rupert
Foilsithe / Cruthaithe: (2010)
de réir: Kendrick, Rupert
Foilsithe / Cruthaithe: (2010)
Designing network security : a practical guide to creating a secure network infrastructure /
de réir: Kaeo, Merike
Foilsithe / Cruthaithe: (2004)
de réir: Kaeo, Merike
Foilsithe / Cruthaithe: (2004)
Míreanna comhchosúla
-
Computer security handbook /
Foilsithe / Cruthaithe: (2014) -
Business continuity planning for data centers and systems a strategic implementation guide /
de réir: Bowman, Ronald H., 1960-
Foilsithe / Cruthaithe: (2008) -
Security and control in information systems a guide for business and accounting /
de réir: Hawker, Andrew
Foilsithe / Cruthaithe: (2000) -
Security architect : careers in information security /
de réir: Collins, Jon
Foilsithe / Cruthaithe: (2014) -
Managing the human factor in information security how to win over staff and influence business managers /
de réir: Lacey, David
Foilsithe / Cruthaithe: (2009)