Business continuity and disaster recovery planning for IT professionals /
"Massive Tornado Hits Moore, OK. Mercy Hospital Destroyed in Joplin, MO Tornado. Powerful Earthquake Triggers Tsunami in Pacific. Super Storm Sandy Wipes Out New Jersey Boardwalk. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. These headlines are all too...
Сохранить в:
Главный автор: | Snedaker, Susan |
---|---|
Другие авторы: | Rima, Chris |
Формат: | Электронный ресурс eКнига |
Язык: | английский |
Опубликовано: |
Waltham, MA :
Syngress,
[2014]
|
Редактирование: | Second edition. |
Предметы: | |
Online-ссылка: | An electronic book accessible through the World Wide Web; click to view |
Метки: |
Добавить метку
Нет меток, Требуется 1-ая метка записи!
|
Схожие документы
Computer security handbook /
Опубликовано: (2014)
Опубликовано: (2014)
Business continuity planning for data centers and systems a strategic implementation guide /
по: Bowman, Ronald H., 1960-
Опубликовано: (2008)
по: Bowman, Ronald H., 1960-
Опубликовано: (2008)
Security and control in information systems a guide for business and accounting /
по: Hawker, Andrew
Опубликовано: (2000)
по: Hawker, Andrew
Опубликовано: (2000)
Security architect : careers in information security /
по: Collins, Jon
Опубликовано: (2014)
по: Collins, Jon
Опубликовано: (2014)
Managing the human factor in information security how to win over staff and influence business managers /
по: Lacey, David
Опубликовано: (2009)
по: Lacey, David
Опубликовано: (2009)
Privacy online : OECD guidance on policy and practice.
Опубликовано: (2003)
Опубликовано: (2003)
IT disaster recovery planning for dummies
по: Gregory, Peter H.
Опубликовано: (2008)
по: Gregory, Peter H.
Опубликовано: (2008)
Enterprise information security and privacy
Опубликовано: (2009)
Опубликовано: (2009)
Information security a manager's guide to thwarting data thieves and hackers /
по: Alexander, Philip, 1963-
Опубликовано: (2008)
по: Alexander, Philip, 1963-
Опубликовано: (2008)
IT audit, control, and security
по: Moeller, Robert R.
Опубликовано: (2010)
по: Moeller, Robert R.
Опубликовано: (2010)
Managing information security : a program for the electronic information age /
по: Schweitzer, James A., 1929-
Опубликовано: (1982)
по: Schweitzer, James A., 1929-
Опубликовано: (1982)
The insider threat combatting the enemy within /
по: Blackwell, Clive
Опубликовано: (2009)
по: Blackwell, Clive
Опубликовано: (2009)
Control and security of E-commerce
по: Smith, Gordon E. (Gordon Edward)
Опубликовано: (2004)
по: Smith, Gordon E. (Gordon Edward)
Опубликовано: (2004)
Security in distributed and networking systems
Опубликовано: (2007)
Опубликовано: (2007)
Distributed systems security issues, processes, and solutions /
Опубликовано: (2009)
Опубликовано: (2009)
Protecting your library's digital sources the essential guide to planning and preservation /
по: Kahn, Miriam (Miriam B.)
Опубликовано: (2004)
по: Kahn, Miriam (Miriam B.)
Опубликовано: (2004)
Aspects of network and information security
Опубликовано: (2008)
Опубликовано: (2008)
Data center handbook /
Опубликовано: (2015)
Опубликовано: (2015)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
по: Canavan, Tom
Опубликовано: (2011)
по: Canavan, Tom
Опубликовано: (2011)
Integrated identity management using IBM Tivoli security solutions
по: Bücker, Axel
Опубликовано: (2004)
по: Bücker, Axel
Опубликовано: (2004)
Cyber-threats, information warfare, and critical infrastructure protection defending the U.S. homeland /
по: Cordesman, Anthony H.
Опубликовано: (2002)
по: Cordesman, Anthony H.
Опубликовано: (2002)
Cyber conflict competing national perspectives /
по: Ventre, Daniel
Опубликовано: (2012)
по: Ventre, Daniel
Опубликовано: (2012)
Advances in cyber security : technology, operations, and experiences /
Опубликовано: (2013)
Опубликовано: (2013)
The death of the Internet
Опубликовано: (2012)
Опубликовано: (2012)
Strategic security management a risk assessment guide for decision makers /
по: Vellani, Karim H., 1971-
Опубликовано: (2007)
по: Vellani, Karim H., 1971-
Опубликовано: (2007)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
по: Winterfeld, Steve
Опубликовано: (2013)
по: Winterfeld, Steve
Опубликовано: (2013)
Web 2.0 security defending Ajax, RIA, and SOA /
по: Shah, Shreeraj
Опубликовано: (2008)
по: Shah, Shreeraj
Опубликовано: (2008)
Enterprise business portals II with IBM tivoli access manager
по: Bücker, Axel
Опубликовано: (2003)
по: Bücker, Axel
Опубликовано: (2003)
Information security governance simplified from the boardroom to the keyboard /
по: Fitzgerald, Todd
Опубликовано: (2012)
по: Fitzgerald, Todd
Опубликовано: (2012)
Designing and building enterprise DMZs
по: Flynn, Hal
Опубликовано: (2006)
по: Flynn, Hal
Опубликовано: (2006)
Network and security issues for internet mobile entertainment
Опубликовано: (2004)
Опубликовано: (2004)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
по: Mowbray, Thomas J.
Опубликовано: (2014)
по: Mowbray, Thomas J.
Опубликовано: (2014)
Wireless sensor network security
Опубликовано: (2008)
Опубликовано: (2008)
Cyber security /
Опубликовано: (2014)
Опубликовано: (2014)
Internet security you can afford : using untangle as your internet gateway /
по: Dawson, Christopher
Опубликовано: (2015)
по: Dawson, Christopher
Опубликовано: (2015)
Cyber security and resiliency policy framework /
Опубликовано: (2014)
Опубликовано: (2014)
IoT security issues /
по: Gilchrist, Alasdair
Опубликовано: (2017)
по: Gilchrist, Alasdair
Опубликовано: (2017)
Security in ad hoc and sensor networks
по: Beyah, Raheem (Raheem A.), 1976-
Опубликовано: (2010)
по: Beyah, Raheem (Raheem A.), 1976-
Опубликовано: (2010)
Cyber risks for business professionals a management guide /
по: Kendrick, Rupert
Опубликовано: (2010)
по: Kendrick, Rupert
Опубликовано: (2010)
Designing network security : a practical guide to creating a secure network infrastructure /
по: Kaeo, Merike
Опубликовано: (2004)
по: Kaeo, Merike
Опубликовано: (2004)
Схожие документы
-
Computer security handbook /
Опубликовано: (2014) -
Business continuity planning for data centers and systems a strategic implementation guide /
по: Bowman, Ronald H., 1960-
Опубликовано: (2008) -
Security and control in information systems a guide for business and accounting /
по: Hawker, Andrew
Опубликовано: (2000) -
Security architect : careers in information security /
по: Collins, Jon
Опубликовано: (2014) -
Managing the human factor in information security how to win over staff and influence business managers /
по: Lacey, David
Опубликовано: (2009)