Business continuity and disaster recovery for infosec managers /:
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day secu...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
Elsevier Digital Press,
©2005.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide. John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph. D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant. Provides critical strategies for maintaining basic business functions when and if systems are shut down Establishes up to date methods and techniques for maintaining second site back up and recovery Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters. |
Beschreibung: | 1 online resource (lxix, 338 pages) : illustrations |
Bibliographie: | Includes bibliographical references (pages 275-281) and index. |
ISBN: | 9781555583392 1555583393 9780080528335 0080528333 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn162595413 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 070806s2005 ne a ob 001 0 eng d | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OKU |d OCLCQ |d N$T |d YDXCP |d CDX |d UBY |d IDEBK |d QE2 |d ZCU |d E7B |d OCLCQ |d OCLCO |d OCLCF |d OCLCO |d OCLCQ |d COO |d OCLCO |d AGLDB |d OCLCQ |d VNS |d U3W |d D6H |d OCLCQ |d VTS |d CEF |d WYU |d REC |d UAB |d LEAUB |d M8D |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d SXB |d OCLCQ |d OCLCO | ||
019 | |a 173502594 |a 232311964 |a 456120506 |a 505138097 |a 506930253 |a 648316483 | ||
020 | |a 9781555583392 | ||
020 | |a 1555583393 | ||
020 | |a 9780080528335 |q (electronic bk.) | ||
020 | |a 0080528333 |q (electronic bk.) | ||
035 | |a (OCoLC)162595413 |z (OCoLC)173502594 |z (OCoLC)232311964 |z (OCoLC)456120506 |z (OCoLC)505138097 |z (OCoLC)506930253 |z (OCoLC)648316483 | ||
037 | |a 116302:116400 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a HF5548.37 |b .R58 2005eb | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
082 | 7 | |a 004/.0068/4 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Rittinghouse, John W. |1 https://id.oclc.org/worldcat/entity/E39PCjvpR3xThkGCQv3RVFrwmd |0 http://id.loc.gov/authorities/names/n2003002484 | |
245 | 1 | 0 | |a Business continuity and disaster recovery for infosec managers / |c John W. Rittinghouse, James F. Ransome. |
260 | |a Amsterdam ; |a Boston : |b Elsevier Digital Press, |c ©2005. | ||
300 | |a 1 online resource (lxix, 338 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references (pages 275-281) and index. | ||
505 | 0 | |a Contingency and continuity planning -- Assessing risk -- Mitigation strategies -- Preparing for a possible emergency -- Disaster recovery phase -- Business recovery phase -- Testing, auditing, and training -- Maintaining a business continuity plan. | |
520 | |a Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide. John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph. D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant. Provides critical strategies for maintaining basic business functions when and if systems are shut down Establishes up to date methods and techniques for maintaining second site back up and recovery Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Business |x Data processing |x Security measures. | |
650 | 0 | |a Crisis management. |0 http://id.loc.gov/authorities/subjects/sh85034122 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Information resources management. |0 http://id.loc.gov/authorities/subjects/sh85066147 | |
650 | 2 | |a Information Management |0 https://id.nlm.nih.gov/mesh/D019451 | |
650 | 6 | |a Gestion |x Informatique |x Sécurité |x Mesures. | |
650 | 6 | |a Gestion de crise. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Gestion de l'information. | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a Business |x Data processing |x Security measures |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Crisis management |2 fast | |
650 | 7 | |a Information resources management |2 fast | |
700 | 1 | |a Ransome, James F. |1 https://id.oclc.org/worldcat/entity/E39PCjKk3DMf4WBpqVMgDKjqcd |0 http://id.loc.gov/authorities/names/no2004040935 | |
776 | 0 | 8 | |i Print version: |a Rittinghouse, John W. |t Business continuity and disaster recovery for infosec managers. |d Amsterdam ; Boston : Elsevier Digital Press, ©2005 |z 1555583393 |z 9781555583392 |w (DLC) 2005052587 |w (OCoLC)61228806 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=203425 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781555583392 |3 Volltext |
938 | |a Coutts Information Services |b COUT |n 7174437 |c 39.64 GBP | ||
938 | |a ebrary |b EBRY |n ebr10188631 | ||
938 | |a EBSCOhost |b EBSC |n 203425 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 112042 | ||
938 | |a YBP Library Services |b YANK |n 2709554 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn162595413 |
---|---|
_version_ | 1816881651874004992 |
adam_text | |
any_adam_object | |
author | Rittinghouse, John W. |
author2 | Ransome, James F. |
author2_role | |
author2_variant | j f r jf jfr |
author_GND | http://id.loc.gov/authorities/names/n2003002484 http://id.loc.gov/authorities/names/no2004040935 |
author_facet | Rittinghouse, John W. Ransome, James F. |
author_role | |
author_sort | Rittinghouse, John W. |
author_variant | j w r jw jwr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.37 .R58 2005eb |
callnumber-search | HF5548.37 .R58 2005eb |
callnumber-sort | HF 45548.37 R58 42005EB |
callnumber-subject | HF - Commerce |
collection | ZDB-4-EBA |
contents | Contingency and continuity planning -- Assessing risk -- Mitigation strategies -- Preparing for a possible emergency -- Disaster recovery phase -- Business recovery phase -- Testing, auditing, and training -- Maintaining a business continuity plan. |
ctrlnum | (OCoLC)162595413 |
dewey-full | 004/.0068/4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004/.0068/4 |
dewey-search | 004/.0068/4 |
dewey-sort | 14 268 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06120cam a2200805 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn162595413</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">070806s2005 ne a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OKU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">CDX</subfield><subfield code="d">UBY</subfield><subfield code="d">IDEBK</subfield><subfield code="d">QE2</subfield><subfield code="d">ZCU</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VNS</subfield><subfield code="d">U3W</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">WYU</subfield><subfield code="d">REC</subfield><subfield code="d">UAB</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">173502594</subfield><subfield code="a">232311964</subfield><subfield code="a">456120506</subfield><subfield code="a">505138097</subfield><subfield code="a">506930253</subfield><subfield code="a">648316483</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583392</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555583393</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080528335</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080528333</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162595413</subfield><subfield code="z">(OCoLC)173502594</subfield><subfield code="z">(OCoLC)232311964</subfield><subfield code="z">(OCoLC)456120506</subfield><subfield code="z">(OCoLC)505138097</subfield><subfield code="z">(OCoLC)506930253</subfield><subfield code="z">(OCoLC)648316483</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">116302:116400</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5548.37</subfield><subfield code="b">.R58 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004/.0068/4</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rittinghouse, John W.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjvpR3xThkGCQv3RVFrwmd</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2003002484</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Business continuity and disaster recovery for infosec managers /</subfield><subfield code="c">John W. Rittinghouse, James F. Ransome.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Elsevier Digital Press,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (lxix, 338 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 275-281) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Contingency and continuity planning -- Assessing risk -- Mitigation strategies -- Preparing for a possible emergency -- Disaster recovery phase -- Business recovery phase -- Testing, auditing, and training -- Maintaining a business continuity plan.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide. John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph. D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant. Provides critical strategies for maintaining basic business functions when and if systems are shut down Establishes up to date methods and techniques for maintaining second site back up and recovery Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Crisis management.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85034122</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information resources management.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85066147</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Information Management</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D019451</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Gestion</subfield><subfield code="x">Informatique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Gestion de crise.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Gestion de l'information.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Crisis management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information resources management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ransome, James F.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjKk3DMf4WBpqVMgDKjqcd</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004040935</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Rittinghouse, John W.</subfield><subfield code="t">Business continuity and disaster recovery for infosec managers.</subfield><subfield code="d">Amsterdam ; Boston : Elsevier Digital Press, ©2005</subfield><subfield code="z">1555583393</subfield><subfield code="z">9781555583392</subfield><subfield code="w">(DLC) 2005052587</subfield><subfield code="w">(OCoLC)61228806</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=203425</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781555583392</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">7174437</subfield><subfield code="c">39.64 GBP</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10188631</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">203425</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">112042</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2709554</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn162595413 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:07Z |
institution | BVB |
isbn | 9781555583392 1555583393 9780080528335 0080528333 |
language | English |
oclc_num | 162595413 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (lxix, 338 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Elsevier Digital Press, |
record_format | marc |
spelling | Rittinghouse, John W. https://id.oclc.org/worldcat/entity/E39PCjvpR3xThkGCQv3RVFrwmd http://id.loc.gov/authorities/names/n2003002484 Business continuity and disaster recovery for infosec managers / John W. Rittinghouse, James F. Ransome. Amsterdam ; Boston : Elsevier Digital Press, ©2005. 1 online resource (lxix, 338 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references (pages 275-281) and index. Contingency and continuity planning -- Assessing risk -- Mitigation strategies -- Preparing for a possible emergency -- Disaster recovery phase -- Business recovery phase -- Testing, auditing, and training -- Maintaining a business continuity plan. Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide. John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph. D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant. Provides critical strategies for maintaining basic business functions when and if systems are shut down Establishes up to date methods and techniques for maintaining second site back up and recovery Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters. Print version record. Business Data processing Security measures. Crisis management. http://id.loc.gov/authorities/subjects/sh85034122 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Information resources management. http://id.loc.gov/authorities/subjects/sh85066147 Information Management https://id.nlm.nih.gov/mesh/D019451 Gestion Informatique Sécurité Mesures. Gestion de crise. Réseaux d'ordinateurs Sécurité Mesures. Gestion de l'information. COMPUTERS Reference. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Computer Literacy. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Hardware General. bisacsh Business Data processing Security measures fast Computer networks Security measures fast Crisis management fast Information resources management fast Ransome, James F. https://id.oclc.org/worldcat/entity/E39PCjKk3DMf4WBpqVMgDKjqcd http://id.loc.gov/authorities/names/no2004040935 Print version: Rittinghouse, John W. Business continuity and disaster recovery for infosec managers. Amsterdam ; Boston : Elsevier Digital Press, ©2005 1555583393 9781555583392 (DLC) 2005052587 (OCoLC)61228806 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=203425 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781555583392 Volltext |
spellingShingle | Rittinghouse, John W. Business continuity and disaster recovery for infosec managers / Contingency and continuity planning -- Assessing risk -- Mitigation strategies -- Preparing for a possible emergency -- Disaster recovery phase -- Business recovery phase -- Testing, auditing, and training -- Maintaining a business continuity plan. Business Data processing Security measures. Crisis management. http://id.loc.gov/authorities/subjects/sh85034122 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Information resources management. http://id.loc.gov/authorities/subjects/sh85066147 Information Management https://id.nlm.nih.gov/mesh/D019451 Gestion Informatique Sécurité Mesures. Gestion de crise. Réseaux d'ordinateurs Sécurité Mesures. Gestion de l'information. COMPUTERS Reference. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Computer Literacy. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Hardware General. bisacsh Business Data processing Security measures fast Computer networks Security measures fast Crisis management fast Information resources management fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85034122 http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85066147 https://id.nlm.nih.gov/mesh/D019451 |
title | Business continuity and disaster recovery for infosec managers / |
title_auth | Business continuity and disaster recovery for infosec managers / |
title_exact_search | Business continuity and disaster recovery for infosec managers / |
title_full | Business continuity and disaster recovery for infosec managers / John W. Rittinghouse, James F. Ransome. |
title_fullStr | Business continuity and disaster recovery for infosec managers / John W. Rittinghouse, James F. Ransome. |
title_full_unstemmed | Business continuity and disaster recovery for infosec managers / John W. Rittinghouse, James F. Ransome. |
title_short | Business continuity and disaster recovery for infosec managers / |
title_sort | business continuity and disaster recovery for infosec managers |
topic | Business Data processing Security measures. Crisis management. http://id.loc.gov/authorities/subjects/sh85034122 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Information resources management. http://id.loc.gov/authorities/subjects/sh85066147 Information Management https://id.nlm.nih.gov/mesh/D019451 Gestion Informatique Sécurité Mesures. Gestion de crise. Réseaux d'ordinateurs Sécurité Mesures. Gestion de l'information. COMPUTERS Reference. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Computer Literacy. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Hardware General. bisacsh Business Data processing Security measures fast Computer networks Security measures fast Crisis management fast Information resources management fast |
topic_facet | Business Data processing Security measures. Crisis management. Computer networks Security measures. Information resources management. Information Management Gestion Informatique Sécurité Mesures. Gestion de crise. Réseaux d'ordinateurs Sécurité Mesures. Gestion de l'information. COMPUTERS Reference. COMPUTERS Machine Theory. COMPUTERS Computer Literacy. COMPUTERS Information Technology. COMPUTERS Data Processing. COMPUTERS Computer Science. COMPUTERS Hardware General. Business Data processing Security measures Computer networks Security measures Crisis management Information resources management |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=203425 https://www.sciencedirect.com/science/book/9781555583392 |
work_keys_str_mv | AT rittinghousejohnw businesscontinuityanddisasterrecoveryforinfosecmanagers AT ransomejamesf businesscontinuityanddisasterrecoveryforinfosecmanagers |