Business continuity and disaster recovery planning for IT professionals /
"Massive Tornado Hits Moore, OK. Mercy Hospital Destroyed in Joplin, MO Tornado. Powerful Earthquake Triggers Tsunami in Pacific. Super Storm Sandy Wipes Out New Jersey Boardwalk. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. These headlines are all too...
Na minha lista:
Autor principal: | Snedaker, Susan |
---|---|
Outros Autores: | Rima, Chris |
Formato: | Recurso Eletrônico livro eletrônico |
Idioma: | inglês |
Publicado em: |
Waltham, MA :
Syngress,
[2014]
|
Edição: | Second edition. |
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registros relacionados
Computer security handbook /
Publicado em: (2014)
Publicado em: (2014)
Business continuity planning for data centers and systems a strategic implementation guide /
por: Bowman, Ronald H., 1960-
Publicado em: (2008)
por: Bowman, Ronald H., 1960-
Publicado em: (2008)
Security and control in information systems a guide for business and accounting /
por: Hawker, Andrew
Publicado em: (2000)
por: Hawker, Andrew
Publicado em: (2000)
Security architect : careers in information security /
por: Collins, Jon
Publicado em: (2014)
por: Collins, Jon
Publicado em: (2014)
Managing the human factor in information security how to win over staff and influence business managers /
por: Lacey, David
Publicado em: (2009)
por: Lacey, David
Publicado em: (2009)
IT disaster recovery planning for dummies
por: Gregory, Peter H.
Publicado em: (2008)
por: Gregory, Peter H.
Publicado em: (2008)
Privacy online : OECD guidance on policy and practice.
Publicado em: (2003)
Publicado em: (2003)
Enterprise information security and privacy
Publicado em: (2009)
Publicado em: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
por: Alexander, Philip, 1963-
Publicado em: (2008)
por: Alexander, Philip, 1963-
Publicado em: (2008)
IT audit, control, and security
por: Moeller, Robert R.
Publicado em: (2010)
por: Moeller, Robert R.
Publicado em: (2010)
Managing information security : a program for the electronic information age /
por: Schweitzer, James A., 1929-
Publicado em: (1982)
por: Schweitzer, James A., 1929-
Publicado em: (1982)
The insider threat combatting the enemy within /
por: Blackwell, Clive
Publicado em: (2009)
por: Blackwell, Clive
Publicado em: (2009)
Control and security of E-commerce
por: Smith, Gordon E. (Gordon Edward)
Publicado em: (2004)
por: Smith, Gordon E. (Gordon Edward)
Publicado em: (2004)
Security in distributed and networking systems
Publicado em: (2007)
Publicado em: (2007)
Distributed systems security issues, processes, and solutions /
Publicado em: (2009)
Publicado em: (2009)
Protecting your library's digital sources the essential guide to planning and preservation /
por: Kahn, Miriam (Miriam B.)
Publicado em: (2004)
por: Kahn, Miriam (Miriam B.)
Publicado em: (2004)
Aspects of network and information security
Publicado em: (2008)
Publicado em: (2008)
Data center handbook /
Publicado em: (2015)
Publicado em: (2015)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
por: Canavan, Tom
Publicado em: (2011)
por: Canavan, Tom
Publicado em: (2011)
Integrated identity management using IBM Tivoli security solutions
por: Bücker, Axel
Publicado em: (2004)
por: Bücker, Axel
Publicado em: (2004)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
por: Cordesman, Anthony H.
Publicado em: (2002)
por: Cordesman, Anthony H.
Publicado em: (2002)
Cyber conflict competing national perspectives /
por: Ventre, Daniel
Publicado em: (2012)
por: Ventre, Daniel
Publicado em: (2012)
Advances in cyber security : technology, operations, and experiences /
Publicado em: (2013)
Publicado em: (2013)
Strategic security management a risk assessment guide for decision makers /
por: Vellani, Karim H., 1971-
Publicado em: (2007)
por: Vellani, Karim H., 1971-
Publicado em: (2007)
The death of the Internet
Publicado em: (2012)
Publicado em: (2012)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
por: Winterfeld, Steve
Publicado em: (2013)
por: Winterfeld, Steve
Publicado em: (2013)
Web 2.0 security defending Ajax, RIA, and SOA /
por: Shah, Shreeraj
Publicado em: (2008)
por: Shah, Shreeraj
Publicado em: (2008)
Information security governance simplified from the boardroom to the keyboard /
por: Fitzgerald, Todd
Publicado em: (2012)
por: Fitzgerald, Todd
Publicado em: (2012)
Enterprise business portals II with IBM tivoli access manager
por: Bücker, Axel
Publicado em: (2003)
por: Bücker, Axel
Publicado em: (2003)
Network and security issues for internet mobile entertainment
Publicado em: (2004)
Publicado em: (2004)
Designing and building enterprise DMZs
por: Flynn, Hal
Publicado em: (2006)
por: Flynn, Hal
Publicado em: (2006)
Wireless sensor network security
Publicado em: (2008)
Publicado em: (2008)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
por: Mowbray, Thomas J.
Publicado em: (2014)
por: Mowbray, Thomas J.
Publicado em: (2014)
Cyber security /
Publicado em: (2014)
Publicado em: (2014)
Internet security you can afford : using untangle as your internet gateway /
por: Dawson, Christopher
Publicado em: (2015)
por: Dawson, Christopher
Publicado em: (2015)
Cyber security and resiliency policy framework /
Publicado em: (2014)
Publicado em: (2014)
IoT security issues /
por: Gilchrist, Alasdair
Publicado em: (2017)
por: Gilchrist, Alasdair
Publicado em: (2017)
Security in ad hoc and sensor networks
por: Beyah, Raheem (Raheem A.), 1976-
Publicado em: (2010)
por: Beyah, Raheem (Raheem A.), 1976-
Publicado em: (2010)
Cyber risks for business professionals a management guide /
por: Kendrick, Rupert
Publicado em: (2010)
por: Kendrick, Rupert
Publicado em: (2010)
Designing network security : a practical guide to creating a secure network infrastructure /
por: Kaeo, Merike
Publicado em: (2004)
por: Kaeo, Merike
Publicado em: (2004)
Registros relacionados
-
Computer security handbook /
Publicado em: (2014) -
Business continuity planning for data centers and systems a strategic implementation guide /
por: Bowman, Ronald H., 1960-
Publicado em: (2008) -
Security and control in information systems a guide for business and accounting /
por: Hawker, Andrew
Publicado em: (2000) -
Security architect : careers in information security /
por: Collins, Jon
Publicado em: (2014) -
Managing the human factor in information security how to win over staff and influence business managers /
por: Lacey, David
Publicado em: (2009)