Business continuity and disaster recovery for infosec managers:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier Digital Press
c2005
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Includes bibliographical references (p. 275-281) and index Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide. John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph. D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant. Provides critical strategies for maintaining basic business functions when and if systems are shut down Establishes up to date methods and techniques for maintaining second site back up and recovery Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters |
Beschreibung: | 1 Online-Ressource (lxix, 338 p.) |
ISBN: | 0080528333 1555583393 9780080528335 9781555583392 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307589 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2005 |||| o||u| ||||||eng d | ||
020 | |a 0080528333 |c electronic bk. |9 0-08-052833-3 | ||
020 | |a 1555583393 |9 1-55558-339-3 | ||
020 | |a 9780080528335 |c electronic bk. |9 978-0-08-052833-5 | ||
020 | |a 9781555583392 |9 978-1-55558-339-2 | ||
035 | |a (OCoLC)162595413 | ||
035 | |a (DE-599)BVBBV042307589 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 004/.0068/4 |2 22 | |
100 | 1 | |a Rittinghouse, John W. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Business continuity and disaster recovery for infosec managers |c John W. Rittinghouse, James F. Ransome |
264 | 1 | |a Amsterdam |b Elsevier Digital Press |c c2005 | |
300 | |a 1 Online-Ressource (lxix, 338 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 275-281) and index | ||
500 | |a Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide. John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph. D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant. Provides critical strategies for maintaining basic business functions when and if systems are shut down Establishes up to date methods and techniques for maintaining second site back up and recovery Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters | ||
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a Business / Data processing / Security measures |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Crisis management |2 fast | |
650 | 7 | |a Information resources management |2 fast | |
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Informatik | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Business |x Data processing |x Security measures | |
650 | 4 | |a Crisis management | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Information resources management | |
700 | 1 | |a Ransome, James F. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781555583392 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744581 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781555583392 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152893075357696 |
---|---|
any_adam_object | |
author | Rittinghouse, John W. |
author_facet | Rittinghouse, John W. |
author_role | aut |
author_sort | Rittinghouse, John W. |
author_variant | j w r jw jwr |
building | Verbundindex |
bvnumber | BV042307589 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)162595413 (DE-599)BVBBV042307589 |
dewey-full | 004/.0068/4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004/.0068/4 |
dewey-search | 004/.0068/4 |
dewey-sort | 14 268 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04102nmm a2200601zc 4500</leader><controlfield tag="001">BV042307589</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080528333</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-052833-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555583393</subfield><subfield code="9">1-55558-339-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080528335</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-052833-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583392</subfield><subfield code="9">978-1-55558-339-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162595413</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307589</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004/.0068/4</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rittinghouse, John W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Business continuity and disaster recovery for infosec managers</subfield><subfield code="c">John W. Rittinghouse, James F. Ransome</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier Digital Press</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (lxix, 338 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 275-281) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide. John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph. D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant. Provides critical strategies for maintaining basic business functions when and if systems are shut down Establishes up to date methods and techniques for maintaining second site back up and recovery Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business / Data processing / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Crisis management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information resources management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crisis management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information resources management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ransome, James F.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781555583392</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744581</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781555583392</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307589 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:56Z |
institution | BVB |
isbn | 0080528333 1555583393 9780080528335 9781555583392 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744581 |
oclc_num | 162595413 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (lxix, 338 p.) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Elsevier Digital Press |
record_format | marc |
spelling | Rittinghouse, John W. Verfasser aut Business continuity and disaster recovery for infosec managers John W. Rittinghouse, James F. Ransome Amsterdam Elsevier Digital Press c2005 1 Online-Ressource (lxix, 338 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (p. 275-281) and index Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide. John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph. D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant. Provides critical strategies for maintaining basic business functions when and if systems are shut down Establishes up to date methods and techniques for maintaining second site back up and recovery Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters COMPUTERS / Reference bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Computer Literacy bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Hardware / General bisacsh Business / Data processing / Security measures fast Computer networks / Security measures fast Crisis management fast Information resources management fast Datenverarbeitung Informatik Wirtschaft Business Data processing Security measures Crisis management Computer networks Security measures Information resources management Ransome, James F. Sonstige oth http://www.sciencedirect.com/science/book/9781555583392 Verlag Volltext |
spellingShingle | Rittinghouse, John W. Business continuity and disaster recovery for infosec managers COMPUTERS / Reference bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Computer Literacy bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Hardware / General bisacsh Business / Data processing / Security measures fast Computer networks / Security measures fast Crisis management fast Information resources management fast Datenverarbeitung Informatik Wirtschaft Business Data processing Security measures Crisis management Computer networks Security measures Information resources management |
title | Business continuity and disaster recovery for infosec managers |
title_auth | Business continuity and disaster recovery for infosec managers |
title_exact_search | Business continuity and disaster recovery for infosec managers |
title_full | Business continuity and disaster recovery for infosec managers John W. Rittinghouse, James F. Ransome |
title_fullStr | Business continuity and disaster recovery for infosec managers John W. Rittinghouse, James F. Ransome |
title_full_unstemmed | Business continuity and disaster recovery for infosec managers John W. Rittinghouse, James F. Ransome |
title_short | Business continuity and disaster recovery for infosec managers |
title_sort | business continuity and disaster recovery for infosec managers |
topic | COMPUTERS / Reference bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Computer Literacy bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Hardware / General bisacsh Business / Data processing / Security measures fast Computer networks / Security measures fast Crisis management fast Information resources management fast Datenverarbeitung Informatik Wirtschaft Business Data processing Security measures Crisis management Computer networks Security measures Information resources management |
topic_facet | COMPUTERS / Reference COMPUTERS / Machine Theory COMPUTERS / Computer Literacy COMPUTERS / Information Technology COMPUTERS / Data Processing COMPUTERS / Computer Science COMPUTERS / Hardware / General Business / Data processing / Security measures Computer networks / Security measures Crisis management Information resources management Datenverarbeitung Informatik Wirtschaft Business Data processing Security measures Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781555583392 |
work_keys_str_mv | AT rittinghousejohnw businesscontinuityanddisasterrecoveryforinfosecmanagers AT ransomejamesf businesscontinuityanddisasterrecoveryforinfosecmanagers |