Business continuity and disaster recovery planning for IT professionals /
"Massive Tornado Hits Moore, OK. Mercy Hospital Destroyed in Joplin, MO Tornado. Powerful Earthquake Triggers Tsunami in Pacific. Super Storm Sandy Wipes Out New Jersey Boardwalk. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. These headlines are all too...
I tiakina i:
Kaituhi matua: | Snedaker, Susan |
---|---|
Ētahi atu kaituhi: | Rima, Chris |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Waltham, MA :
Syngress,
[2014]
|
Putanga: | Second edition. |
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite
Computer security handbook /
I whakaputaina: (2014)
I whakaputaina: (2014)
Business continuity planning for data centers and systems a strategic implementation guide /
mā: Bowman, Ronald H., 1960-
I whakaputaina: (2008)
mā: Bowman, Ronald H., 1960-
I whakaputaina: (2008)
Security and control in information systems a guide for business and accounting /
mā: Hawker, Andrew
I whakaputaina: (2000)
mā: Hawker, Andrew
I whakaputaina: (2000)
Security architect : careers in information security /
mā: Collins, Jon
I whakaputaina: (2014)
mā: Collins, Jon
I whakaputaina: (2014)
Managing the human factor in information security how to win over staff and influence business managers /
mā: Lacey, David
I whakaputaina: (2009)
mā: Lacey, David
I whakaputaina: (2009)
Privacy online : OECD guidance on policy and practice.
I whakaputaina: (2003)
I whakaputaina: (2003)
IT disaster recovery planning for dummies
mā: Gregory, Peter H.
I whakaputaina: (2008)
mā: Gregory, Peter H.
I whakaputaina: (2008)
Enterprise information security and privacy
I whakaputaina: (2009)
I whakaputaina: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
mā: Alexander, Philip, 1963-
I whakaputaina: (2008)
mā: Alexander, Philip, 1963-
I whakaputaina: (2008)
IT audit, control, and security
mā: Moeller, Robert R.
I whakaputaina: (2010)
mā: Moeller, Robert R.
I whakaputaina: (2010)
Managing information security : a program for the electronic information age /
mā: Schweitzer, James A., 1929-
I whakaputaina: (1982)
mā: Schweitzer, James A., 1929-
I whakaputaina: (1982)
The insider threat combatting the enemy within /
mā: Blackwell, Clive
I whakaputaina: (2009)
mā: Blackwell, Clive
I whakaputaina: (2009)
Control and security of E-commerce
mā: Smith, Gordon E. (Gordon Edward)
I whakaputaina: (2004)
mā: Smith, Gordon E. (Gordon Edward)
I whakaputaina: (2004)
Security in distributed and networking systems
I whakaputaina: (2007)
I whakaputaina: (2007)
Distributed systems security issues, processes, and solutions /
I whakaputaina: (2009)
I whakaputaina: (2009)
Protecting your library's digital sources the essential guide to planning and preservation /
mā: Kahn, Miriam (Miriam B.)
I whakaputaina: (2004)
mā: Kahn, Miriam (Miriam B.)
I whakaputaina: (2004)
Aspects of network and information security
I whakaputaina: (2008)
I whakaputaina: (2008)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
mā: Canavan, Tom
I whakaputaina: (2011)
mā: Canavan, Tom
I whakaputaina: (2011)
Data center handbook /
I whakaputaina: (2015)
I whakaputaina: (2015)
Integrated identity management using IBM Tivoli security solutions
mā: Bücker, Axel
I whakaputaina: (2004)
mā: Bücker, Axel
I whakaputaina: (2004)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
mā: Cordesman, Anthony H.
I whakaputaina: (2002)
mā: Cordesman, Anthony H.
I whakaputaina: (2002)
Cyber conflict competing national perspectives /
mā: Ventre, Daniel
I whakaputaina: (2012)
mā: Ventre, Daniel
I whakaputaina: (2012)
Advances in cyber security : technology, operations, and experiences /
I whakaputaina: (2013)
I whakaputaina: (2013)
Strategic security management a risk assessment guide for decision makers /
mā: Vellani, Karim H., 1971-
I whakaputaina: (2007)
mā: Vellani, Karim H., 1971-
I whakaputaina: (2007)
The death of the Internet
I whakaputaina: (2012)
I whakaputaina: (2012)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
mā: Winterfeld, Steve
I whakaputaina: (2013)
mā: Winterfeld, Steve
I whakaputaina: (2013)
Web 2.0 security defending Ajax, RIA, and SOA /
mā: Shah, Shreeraj
I whakaputaina: (2008)
mā: Shah, Shreeraj
I whakaputaina: (2008)
Enterprise business portals II with IBM tivoli access manager
mā: Bücker, Axel
I whakaputaina: (2003)
mā: Bücker, Axel
I whakaputaina: (2003)
Information security governance simplified from the boardroom to the keyboard /
mā: Fitzgerald, Todd
I whakaputaina: (2012)
mā: Fitzgerald, Todd
I whakaputaina: (2012)
Wireless sensor network security
I whakaputaina: (2008)
I whakaputaina: (2008)
Designing and building enterprise DMZs
mā: Flynn, Hal
I whakaputaina: (2006)
mā: Flynn, Hal
I whakaputaina: (2006)
Network and security issues for internet mobile entertainment
I whakaputaina: (2004)
I whakaputaina: (2004)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
mā: Mowbray, Thomas J.
I whakaputaina: (2014)
mā: Mowbray, Thomas J.
I whakaputaina: (2014)
Cyber security /
I whakaputaina: (2014)
I whakaputaina: (2014)
IoT security issues /
mā: Gilchrist, Alasdair
I whakaputaina: (2017)
mā: Gilchrist, Alasdair
I whakaputaina: (2017)
Internet security you can afford : using untangle as your internet gateway /
mā: Dawson, Christopher
I whakaputaina: (2015)
mā: Dawson, Christopher
I whakaputaina: (2015)
Cyber security and resiliency policy framework /
I whakaputaina: (2014)
I whakaputaina: (2014)
Security in ad hoc and sensor networks
mā: Beyah, Raheem (Raheem A.), 1976-
I whakaputaina: (2010)
mā: Beyah, Raheem (Raheem A.), 1976-
I whakaputaina: (2010)
Cyber risks for business professionals a management guide /
mā: Kendrick, Rupert
I whakaputaina: (2010)
mā: Kendrick, Rupert
I whakaputaina: (2010)
Designing network security : a practical guide to creating a secure network infrastructure /
mā: Kaeo, Merike
I whakaputaina: (2004)
mā: Kaeo, Merike
I whakaputaina: (2004)
Ngā tūemi rite
-
Computer security handbook /
I whakaputaina: (2014) -
Business continuity planning for data centers and systems a strategic implementation guide /
mā: Bowman, Ronald H., 1960-
I whakaputaina: (2008) -
Security and control in information systems a guide for business and accounting /
mā: Hawker, Andrew
I whakaputaina: (2000) -
Security architect : careers in information security /
mā: Collins, Jon
I whakaputaina: (2014) -
Managing the human factor in information security how to win over staff and influence business managers /
mā: Lacey, David
I whakaputaina: (2009)