Business continuity & disaster recovery for IT professionals:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress
©2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index. - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Chapter 1. Business Continuity and Disaster Recovery Overview -- Case Study 1. Legal Obligations Regarding Data Security -- Chapter 2. Project Initiation -- Case Study 2. The Financial Impact of Disasters and Disruptions -- Chapter 3. Risk Assessment -- Chapter 4. Business Impact Analysis -- Chapter 5. Mitigation Strategy Development -- Chapter 6. Business Continuity/Disaster Recovery Plan Development -- Chapter 7. Emergency Response and Recovery -- Chapter 8. Training, Testing, and Auditing -- Chapter 9. BC/DR Plan Maintenance -- Appendix A. Risk Management Checklist -- Appendix B. Crisis Communications Checklist -- Appendix C. Business Continuity and Disaster Recovery Response Checklist -- Appendix D. Emergency and Recovery Response Checklist -- Appendix E. Business Continuity Checklist "Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well." "As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, it's difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially." "Business Continuity Planning (BCP) and Disaster Recovery Planning (ORP) are emerging as the 'next big thing' in corporate IT circles. With distributed networks, increasing demands for confidentiality, integrity and availability of data, and the widespread risks to the security of personal, confidential and sensitive data, no organization can afford to ignore the need for disaster planning." "The British Standards Institute is releasing a new standard for BCP this year, the Disaster Recovery Institute has developed a certification for DRP/BCP professionals in conjunction with the British Standards Institute, trade shows are popping up on this topic and the news is filled with companies facing disasters from all sides."--Jacket |
Beschreibung: | 1 Online-Ressource (xxiv, 456 pages) |
ISBN: | 0080553729 1597491721 9780080553726 9781597491723 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043118828 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080553729 |c electronic bk. |9 0-08-055372-9 | ||
020 | |a 1597491721 |9 1-59749-172-1 | ||
020 | |a 9780080553726 |c electronic bk. |9 978-0-08-055372-6 | ||
020 | |a 9781597491723 |9 978-1-59749-172-3 | ||
035 | |a (OCoLC)183190572 | ||
035 | |a (DE-599)BVBBV043118828 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 658.4/78 |2 22 | |
100 | 1 | |a Snedaker, Susan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Business continuity & disaster recovery for IT professionals |c Susan Snedaker |
246 | 1 | 3 | |a Business continuity and disaster recovery for IT professionals |
264 | 1 | |a Burlington, MA |b Syngress |c ©2007 | |
300 | |a 1 Online-Ressource (xxiv, 456 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index. - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 | ||
500 | |a Chapter 1. Business Continuity and Disaster Recovery Overview -- Case Study 1. Legal Obligations Regarding Data Security -- Chapter 2. Project Initiation -- Case Study 2. The Financial Impact of Disasters and Disruptions -- Chapter 3. Risk Assessment -- Chapter 4. Business Impact Analysis -- Chapter 5. Mitigation Strategy Development -- Chapter 6. Business Continuity/Disaster Recovery Plan Development -- Chapter 7. Emergency Response and Recovery -- Chapter 8. Training, Testing, and Auditing -- Chapter 9. BC/DR Plan Maintenance -- Appendix A. Risk Management Checklist -- Appendix B. Crisis Communications Checklist -- Appendix C. Business Continuity and Disaster Recovery Response Checklist -- Appendix D. Emergency and Recovery Response Checklist -- Appendix E. Business Continuity Checklist | ||
500 | |a "Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well." "As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, it's difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially." "Business Continuity Planning (BCP) and Disaster Recovery Planning (ORP) are emerging as the 'next big thing' in corporate IT circles. With distributed networks, increasing demands for confidentiality, integrity and availability of data, and the widespread risks to the security of personal, confidential and sensitive data, no organization can afford to ignore the need for disaster planning." "The British Standards Institute is releasing a new standard for BCP this year, the Disaster Recovery Institute has developed a certification for DRP/BCP professionals in conjunction with the British Standards Institute, trade shows are popping up on this topic and the news is filled with companies facing disasters from all sides."--Jacket | ||
650 | 4 | |a Business / Data processing / Security measures | |
650 | 4 | |a Electronic data processing departments / Security measures | |
650 | 4 | |a Crisis management | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Management information systems / Security measures | |
650 | 7 | |a BUSINESS & ECONOMICS / Workplace Culture |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Corporate Governance |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Leadership |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Development |2 bisacsh | |
650 | 7 | |a Business / Data processing / Security measures |2 blmlsh | |
650 | 7 | |a Electronic data processing departments / Security measures |2 blmlsh | |
650 | 7 | |a Crisis management |2 blmlsh | |
650 | 7 | |a Computer networks / Security measures |2 blmlsh | |
650 | 7 | |a Management information systems / Security measures |2 blmlsh | |
650 | 7 | |a Risk management |2 gtt | |
650 | 7 | |a Databescherming |2 gtt | |
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Führung | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Business |x Data processing |x Security measures | |
650 | 4 | |a Electronic data processing departments |x Security measures | |
650 | 4 | |a Crisis management | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Management information systems |x Security measures | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211412 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028543019 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211412 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211412 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175546118045696 |
---|---|
any_adam_object | |
author | Snedaker, Susan |
author_facet | Snedaker, Susan |
author_role | aut |
author_sort | Snedaker, Susan |
author_variant | s s ss |
building | Verbundindex |
bvnumber | BV043118828 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)183190572 (DE-599)BVBBV043118828 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05329nmm a2200685zc 4500</leader><controlfield tag="001">BV043118828</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080553729</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055372-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491721</subfield><subfield code="9">1-59749-172-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080553726</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055372-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491723</subfield><subfield code="9">978-1-59749-172-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)183190572</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043118828</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Snedaker, Susan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Business continuity & disaster recovery for IT professionals</subfield><subfield code="c">Susan Snedaker</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Business continuity and disaster recovery for IT professionals</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">©2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiv, 456 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter 1. Business Continuity and Disaster Recovery Overview -- Case Study 1. Legal Obligations Regarding Data Security -- Chapter 2. Project Initiation -- Case Study 2. The Financial Impact of Disasters and Disruptions -- Chapter 3. Risk Assessment -- Chapter 4. Business Impact Analysis -- Chapter 5. Mitigation Strategy Development -- Chapter 6. Business Continuity/Disaster Recovery Plan Development -- Chapter 7. Emergency Response and Recovery -- Chapter 8. Training, Testing, and Auditing -- Chapter 9. BC/DR Plan Maintenance -- Appendix A. Risk Management Checklist -- Appendix B. Crisis Communications Checklist -- Appendix C. Business Continuity and Disaster Recovery Response Checklist -- Appendix D. Emergency and Recovery Response Checklist -- Appendix E. Business Continuity Checklist</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well." "As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, it's difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially." "Business Continuity Planning (BCP) and Disaster Recovery Planning (ORP) are emerging as the 'next big thing' in corporate IT circles. With distributed networks, increasing demands for confidentiality, integrity and availability of data, and the widespread risks to the security of personal, confidential and sensitive data, no organization can afford to ignore the need for disaster planning." "The British Standards Institute is releasing a new standard for BCP this year, the Disaster Recovery Institute has developed a certification for DRP/BCP professionals in conjunction with the British Standards Institute, trade shows are popping up on this topic and the news is filled with companies facing disasters from all sides."--Jacket</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business / Data processing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crisis management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Workplace Culture</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Corporate Governance</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Leadership</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Development</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business / Data processing / Security measures</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing departments / Security measures</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Crisis management</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Management information systems / Security measures</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Risk management</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Databescherming</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Führung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crisis management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211412</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028543019</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211412</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211412</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043118828 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:00Z |
institution | BVB |
isbn | 0080553729 1597491721 9780080553726 9781597491723 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028543019 |
oclc_num | 183190572 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxiv, 456 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress |
record_format | marc |
spelling | Snedaker, Susan Verfasser aut Business continuity & disaster recovery for IT professionals Susan Snedaker Business continuity and disaster recovery for IT professionals Burlington, MA Syngress ©2007 1 Online-Ressource (xxiv, 456 pages) txt rdacontent c rdamedia cr rdacarrier Includes index. - Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Chapter 1. Business Continuity and Disaster Recovery Overview -- Case Study 1. Legal Obligations Regarding Data Security -- Chapter 2. Project Initiation -- Case Study 2. The Financial Impact of Disasters and Disruptions -- Chapter 3. Risk Assessment -- Chapter 4. Business Impact Analysis -- Chapter 5. Mitigation Strategy Development -- Chapter 6. Business Continuity/Disaster Recovery Plan Development -- Chapter 7. Emergency Response and Recovery -- Chapter 8. Training, Testing, and Auditing -- Chapter 9. BC/DR Plan Maintenance -- Appendix A. Risk Management Checklist -- Appendix B. Crisis Communications Checklist -- Appendix C. Business Continuity and Disaster Recovery Response Checklist -- Appendix D. Emergency and Recovery Response Checklist -- Appendix E. Business Continuity Checklist "Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well." "As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, it's difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially." "Business Continuity Planning (BCP) and Disaster Recovery Planning (ORP) are emerging as the 'next big thing' in corporate IT circles. With distributed networks, increasing demands for confidentiality, integrity and availability of data, and the widespread risks to the security of personal, confidential and sensitive data, no organization can afford to ignore the need for disaster planning." "The British Standards Institute is releasing a new standard for BCP this year, the Disaster Recovery Institute has developed a certification for DRP/BCP professionals in conjunction with the British Standards Institute, trade shows are popping up on this topic and the news is filled with companies facing disasters from all sides."--Jacket Business / Data processing / Security measures Electronic data processing departments / Security measures Crisis management Computer networks / Security measures Management information systems / Security measures BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Business / Data processing / Security measures blmlsh Electronic data processing departments / Security measures blmlsh Crisis management blmlsh Computer networks / Security measures blmlsh Management information systems / Security measures blmlsh Risk management gtt Databescherming gtt Datenverarbeitung Führung Wirtschaft Business Data processing Security measures Electronic data processing departments Security measures Computer networks Security measures Management information systems Security measures http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211412 Aggregator Volltext |
spellingShingle | Snedaker, Susan Business continuity & disaster recovery for IT professionals Business / Data processing / Security measures Electronic data processing departments / Security measures Crisis management Computer networks / Security measures Management information systems / Security measures BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Business / Data processing / Security measures blmlsh Electronic data processing departments / Security measures blmlsh Crisis management blmlsh Computer networks / Security measures blmlsh Management information systems / Security measures blmlsh Risk management gtt Databescherming gtt Datenverarbeitung Führung Wirtschaft Business Data processing Security measures Electronic data processing departments Security measures Computer networks Security measures Management information systems Security measures |
title | Business continuity & disaster recovery for IT professionals |
title_alt | Business continuity and disaster recovery for IT professionals |
title_auth | Business continuity & disaster recovery for IT professionals |
title_exact_search | Business continuity & disaster recovery for IT professionals |
title_full | Business continuity & disaster recovery for IT professionals Susan Snedaker |
title_fullStr | Business continuity & disaster recovery for IT professionals Susan Snedaker |
title_full_unstemmed | Business continuity & disaster recovery for IT professionals Susan Snedaker |
title_short | Business continuity & disaster recovery for IT professionals |
title_sort | business continuity disaster recovery for it professionals |
topic | Business / Data processing / Security measures Electronic data processing departments / Security measures Crisis management Computer networks / Security measures Management information systems / Security measures BUSINESS & ECONOMICS / Workplace Culture bisacsh BUSINESS & ECONOMICS / Corporate Governance bisacsh BUSINESS & ECONOMICS / Leadership bisacsh BUSINESS & ECONOMICS / Organizational Development bisacsh Business / Data processing / Security measures blmlsh Electronic data processing departments / Security measures blmlsh Crisis management blmlsh Computer networks / Security measures blmlsh Management information systems / Security measures blmlsh Risk management gtt Databescherming gtt Datenverarbeitung Führung Wirtschaft Business Data processing Security measures Electronic data processing departments Security measures Computer networks Security measures Management information systems Security measures |
topic_facet | Business / Data processing / Security measures Electronic data processing departments / Security measures Crisis management Computer networks / Security measures Management information systems / Security measures BUSINESS & ECONOMICS / Workplace Culture BUSINESS & ECONOMICS / Corporate Governance BUSINESS & ECONOMICS / Leadership BUSINESS & ECONOMICS / Organizational Development Risk management Databescherming Datenverarbeitung Führung Wirtschaft Business Data processing Security measures Electronic data processing departments Security measures Computer networks Security measures Management information systems Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211412 |
work_keys_str_mv | AT snedakersusan businesscontinuitydisasterrecoveryforitprofessionals AT snedakersusan businesscontinuityanddisasterrecoveryforitprofessionals |