Business continuity & disaster recovery for IT professionals /:
"Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT prof...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA :
Syngress,
©2007.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well." "As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, it's difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially." "Business Continuity Planning (BCP) and Disaster Recovery Planning (ORP) are emerging as the 'next big thing' in corporate IT circles. With distributed networks, increasing demands for confidentiality, integrity and availability of data, and the widespread risks to the security of personal, confidential and sensitive data, no organization can afford to ignore the need for disaster planning." "The British Standards Institute is releasing a new standard for BCP this year, the Disaster Recovery Institute has developed a certification for DRP/BCP professionals in conjunction with the British Standards Institute, trade shows are popping up on this topic and the news is filled with companies facing disasters from all sides."--Jacket |
Beschreibung: | 1 online resource (xxiv, 456 pages) : illustrations |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
ISBN: | 9780080553726 0080553729 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn183190572 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 071210s2007 maua o 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d ZCU |d OCLCE |d OCLCQ |d UMI |d CEF |d AU@ |d NHM |d OCLCQ |d DEBSZ |d OCLCQ |d OCLCO |d TEFOD |d OCLCQ |d OCLCO |d TEFOD |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d COO |d OCLCO |d OCLCQ |d OCLCO |d AGLDB |d Z5A |d MERUC |d OCLCQ |d JBG |d OCLCF |d VNS |d VTS |d OCLCQ |d UKMGB |d WYU |d OCLCQ |d STF |d UX1 |d VT2 |d NLW |d OCLCO |d OCLCQ |d KSU |d OCLCQ |d OCLCO | ||
016 | 7 | |a 017585195 |2 Uk | |
019 | |a 182732379 |a 271746516 |a 434042323 |a 506930263 |a 607823273 |a 649960941 |a 971458601 |a 979232438 |a 980290764 |a 988818284 |a 1044204786 |a 1056317434 |a 1058053249 |a 1060867847 |a 1062909486 |a 1073060804 |a 1083302237 |a 1091745417 |a 1103252133 |a 1104483645 |a 1129372807 | ||
020 | |a 9780080553726 |q (electronic bk.) | ||
020 | |a 0080553729 |q (electronic bk.) | ||
020 | |z 9781597491723 | ||
020 | |z 1597491721 | ||
035 | |a (OCoLC)183190572 |z (OCoLC)182732379 |z (OCoLC)271746516 |z (OCoLC)434042323 |z (OCoLC)506930263 |z (OCoLC)607823273 |z (OCoLC)649960941 |z (OCoLC)971458601 |z (OCoLC)979232438 |z (OCoLC)980290764 |z (OCoLC)988818284 |z (OCoLC)1044204786 |z (OCoLC)1056317434 |z (OCoLC)1058053249 |z (OCoLC)1060867847 |z (OCoLC)1062909486 |z (OCoLC)1073060804 |z (OCoLC)1083302237 |z (OCoLC)1091745417 |z (OCoLC)1103252133 |z (OCoLC)1104483645 |z (OCoLC)1129372807 | ||
037 | |a CL0500000046 |b Safari Books Online | ||
037 | |a 3E84038B-71A6-4A3B-B6E0-004A45F8CA79 |b OverDrive, Inc. |n http://www.overdrive.com | ||
042 | |a dlr | ||
050 | 4 | |a HF5548.37 |b .S67 2007eb | |
050 | 4 | |a HD | |
072 | 7 | |a BUS |x 097000 |2 bisacsh | |
072 | 7 | |a BUS |x 104000 |2 bisacsh | |
072 | 7 | |a BUS |x 071000 |2 bisacsh | |
072 | 7 | |a BUS |x 103000 |2 bisacsh | |
082 | 7 | |a 658.4/78 |2 22 | |
084 | |a 85.20 |2 bcl | ||
049 | |a MAIN | ||
100 | 1 | |a Snedaker, Susan. |0 http://id.loc.gov/authorities/names/n2001015003 | |
245 | 1 | 0 | |a Business continuity & disaster recovery for IT professionals / |c Susan Snedaker. |
246 | 3 | |a Business continuity and disaster recovery for IT professionals | |
260 | |a Burlington, MA : |b Syngress, |c ©2007. | ||
300 | |a 1 online resource (xxiv, 456 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Chapter 1. Business Continuity and Disaster Recovery Overview -- Case Study 1. Legal Obligations Regarding Data Security -- Chapter 2. Project Initiation -- Case Study 2. The Financial Impact of Disasters and Disruptions -- Chapter 3. Risk Assessment -- Chapter 4. Business Impact Analysis -- Chapter 5. Mitigation Strategy Development -- Chapter 6. Business Continuity/Disaster Recovery Plan Development -- Chapter 7. Emergency Response and Recovery -- Chapter 8. Training, Testing, and Auditing -- Chapter 9. BC/DR Plan Maintenance -- Appendix A. Risk Management Checklist -- Appendix B. Crisis Communications Checklist -- Appendix C. Business Continuity and Disaster Recovery Response Checklist -- Appendix D. Emergency and Recovery Response Checklist -- Appendix E. Business Continuity Checklist. | |
520 | 1 | |a "Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well." "As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, it's difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially." "Business Continuity Planning (BCP) and Disaster Recovery Planning (ORP) are emerging as the 'next big thing' in corporate IT circles. With distributed networks, increasing demands for confidentiality, integrity and availability of data, and the widespread risks to the security of personal, confidential and sensitive data, no organization can afford to ignore the need for disaster planning." "The British Standards Institute is releasing a new standard for BCP this year, the Disaster Recovery Institute has developed a certification for DRP/BCP professionals in conjunction with the British Standards Institute, trade shows are popping up on this topic and the news is filled with companies facing disasters from all sides."--Jacket | |
588 | 0 | |a Print version record. | |
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [Place of publication not identified] : |c HathiTrust Digital Library, |d 2010. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2010 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
650 | 0 | |a Business |x Data processing |x Security measures. | |
650 | 0 | |a Electronic data processing departments |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh85042310 | |
650 | 0 | |a Crisis management. |0 http://id.loc.gov/authorities/subjects/sh85034122 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Management information systems |x Security measures. | |
650 | 6 | |a Gestion |x Informatique |x Sécurité |x Mesures. | |
650 | 6 | |a Centres de traitement de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Gestion de crise. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Systèmes d'information de gestion |x Sécurité |x Mesures. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Workplace Culture. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Corporate Governance. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Leadership. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Development. |2 bisacsh | |
650 | 7 | |a Business |x Data processing |x Security measures. |2 blmlsh | |
650 | 7 | |a Electronic data processing departments |x Security measures. |2 blmlsh | |
650 | 7 | |a Crisis management. |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures. |2 blmlsh | |
650 | 7 | |a Management information systems |x Security measures. |2 blmlsh | |
650 | 7 | |a Business |x Data processing |x Security measures |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Crisis management |2 fast | |
650 | 7 | |a Electronic data processing departments |x Security measures |2 fast | |
650 | 1 | 7 | |a Risk management. |2 gtt |
650 | 1 | 7 | |a Databescherming. |2 gtt |
776 | 0 | 8 | |i Print version: |a Snedaker, Susan. |t Business continuity & disaster recovery for IT professionals. |d Burlington, MA : Syngress, ©2007 |z 9781597491723 |z 1597491721 |w (DLC) 2007279256 |w (OCoLC)174502453 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211412 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 211412 | ||
938 | |a YBP Library Services |b YANK |n 2737768 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn183190572 |
---|---|
_version_ | 1816881658483179520 |
adam_text | |
any_adam_object | |
author | Snedaker, Susan |
author_GND | http://id.loc.gov/authorities/names/n2001015003 |
author_facet | Snedaker, Susan |
author_role | |
author_sort | Snedaker, Susan |
author_variant | s s ss |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.37 .S67 2007eb HD |
callnumber-search | HF5548.37 .S67 2007eb HD |
callnumber-sort | HF 45548.37 S67 42007EB |
callnumber-subject | HF - Commerce |
collection | ZDB-4-EBA |
contents | Chapter 1. Business Continuity and Disaster Recovery Overview -- Case Study 1. Legal Obligations Regarding Data Security -- Chapter 2. Project Initiation -- Case Study 2. The Financial Impact of Disasters and Disruptions -- Chapter 3. Risk Assessment -- Chapter 4. Business Impact Analysis -- Chapter 5. Mitigation Strategy Development -- Chapter 6. Business Continuity/Disaster Recovery Plan Development -- Chapter 7. Emergency Response and Recovery -- Chapter 8. Training, Testing, and Auditing -- Chapter 9. BC/DR Plan Maintenance -- Appendix A. Risk Management Checklist -- Appendix B. Crisis Communications Checklist -- Appendix C. Business Continuity and Disaster Recovery Response Checklist -- Appendix D. Emergency and Recovery Response Checklist -- Appendix E. Business Continuity Checklist. |
ctrlnum | (OCoLC)183190572 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07286cam a2200877 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn183190572</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">071210s2007 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UMI</subfield><subfield code="d">CEF</subfield><subfield code="d">AU@</subfield><subfield code="d">NHM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">Z5A</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCF</subfield><subfield code="d">VNS</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKMGB</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">UX1</subfield><subfield code="d">VT2</subfield><subfield code="d">NLW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">KSU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">017585195</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">182732379</subfield><subfield code="a">271746516</subfield><subfield code="a">434042323</subfield><subfield code="a">506930263</subfield><subfield code="a">607823273</subfield><subfield code="a">649960941</subfield><subfield code="a">971458601</subfield><subfield code="a">979232438</subfield><subfield code="a">980290764</subfield><subfield code="a">988818284</subfield><subfield code="a">1044204786</subfield><subfield code="a">1056317434</subfield><subfield code="a">1058053249</subfield><subfield code="a">1060867847</subfield><subfield code="a">1062909486</subfield><subfield code="a">1073060804</subfield><subfield code="a">1083302237</subfield><subfield code="a">1091745417</subfield><subfield code="a">1103252133</subfield><subfield code="a">1104483645</subfield><subfield code="a">1129372807</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080553726</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080553729</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597491723</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597491721</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)183190572</subfield><subfield code="z">(OCoLC)182732379</subfield><subfield code="z">(OCoLC)271746516</subfield><subfield code="z">(OCoLC)434042323</subfield><subfield code="z">(OCoLC)506930263</subfield><subfield code="z">(OCoLC)607823273</subfield><subfield code="z">(OCoLC)649960941</subfield><subfield code="z">(OCoLC)971458601</subfield><subfield code="z">(OCoLC)979232438</subfield><subfield code="z">(OCoLC)980290764</subfield><subfield code="z">(OCoLC)988818284</subfield><subfield code="z">(OCoLC)1044204786</subfield><subfield code="z">(OCoLC)1056317434</subfield><subfield code="z">(OCoLC)1058053249</subfield><subfield code="z">(OCoLC)1060867847</subfield><subfield code="z">(OCoLC)1062909486</subfield><subfield code="z">(OCoLC)1073060804</subfield><subfield code="z">(OCoLC)1083302237</subfield><subfield code="z">(OCoLC)1091745417</subfield><subfield code="z">(OCoLC)1103252133</subfield><subfield code="z">(OCoLC)1104483645</subfield><subfield code="z">(OCoLC)1129372807</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000046</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">3E84038B-71A6-4A3B-B6E0-004A45F8CA79</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">dlr</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5548.37</subfield><subfield code="b">.S67 2007eb</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">097000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">104000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">071000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">103000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">85.20</subfield><subfield code="2">bcl</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Snedaker, Susan.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2001015003</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Business continuity & disaster recovery for IT professionals /</subfield><subfield code="c">Susan Snedaker.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Business continuity and disaster recovery for IT professionals</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Burlington, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxiv, 456 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Business Continuity and Disaster Recovery Overview -- Case Study 1. Legal Obligations Regarding Data Security -- Chapter 2. Project Initiation -- Case Study 2. The Financial Impact of Disasters and Disruptions -- Chapter 3. Risk Assessment -- Chapter 4. Business Impact Analysis -- Chapter 5. Mitigation Strategy Development -- Chapter 6. Business Continuity/Disaster Recovery Plan Development -- Chapter 7. Emergency Response and Recovery -- Chapter 8. Training, Testing, and Auditing -- Chapter 9. BC/DR Plan Maintenance -- Appendix A. Risk Management Checklist -- Appendix B. Crisis Communications Checklist -- Appendix C. Business Continuity and Disaster Recovery Response Checklist -- Appendix D. Emergency and Recovery Response Checklist -- Appendix E. Business Continuity Checklist.</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well." "As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, it's difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially." "Business Continuity Planning (BCP) and Disaster Recovery Planning (ORP) are emerging as the 'next big thing' in corporate IT circles. With distributed networks, increasing demands for confidentiality, integrity and availability of data, and the widespread risks to the security of personal, confidential and sensitive data, no organization can afford to ignore the need for disaster planning." "The British Standards Institute is releasing a new standard for BCP this year, the Disaster Recovery Institute has developed a certification for DRP/BCP professionals in conjunction with the British Standards Institute, trade shows are popping up on this topic and the news is filled with companies facing disasters from all sides."--Jacket</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[Place of publication not identified] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2010.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2010</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85042310</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Crisis management.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85034122</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Management information systems</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Gestion</subfield><subfield code="x">Informatique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Centres de traitement de l'information</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Gestion de crise.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes d'information de gestion</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Workplace Culture.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Corporate Governance.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Leadership.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Organizational Development.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Crisis management.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Management information systems</subfield><subfield code="x">Security measures.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Crisis management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing departments</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1="1" ind2="7"><subfield code="a">Risk management.</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1="1" ind2="7"><subfield code="a">Databescherming.</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Snedaker, Susan.</subfield><subfield code="t">Business continuity & disaster recovery for IT professionals.</subfield><subfield code="d">Burlington, MA : Syngress, ©2007</subfield><subfield code="z">9781597491723</subfield><subfield code="z">1597491721</subfield><subfield code="w">(DLC) 2007279256</subfield><subfield code="w">(OCoLC)174502453</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211412</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">211412</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2737768</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn183190572 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:13Z |
institution | BVB |
isbn | 9780080553726 0080553729 |
language | English |
oclc_num | 183190572 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxiv, 456 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress, |
record_format | marc |
spelling | Snedaker, Susan. http://id.loc.gov/authorities/names/n2001015003 Business continuity & disaster recovery for IT professionals / Susan Snedaker. Business continuity and disaster recovery for IT professionals Burlington, MA : Syngress, ©2007. 1 online resource (xxiv, 456 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Chapter 1. Business Continuity and Disaster Recovery Overview -- Case Study 1. Legal Obligations Regarding Data Security -- Chapter 2. Project Initiation -- Case Study 2. The Financial Impact of Disasters and Disruptions -- Chapter 3. Risk Assessment -- Chapter 4. Business Impact Analysis -- Chapter 5. Mitigation Strategy Development -- Chapter 6. Business Continuity/Disaster Recovery Plan Development -- Chapter 7. Emergency Response and Recovery -- Chapter 8. Training, Testing, and Auditing -- Chapter 9. BC/DR Plan Maintenance -- Appendix A. Risk Management Checklist -- Appendix B. Crisis Communications Checklist -- Appendix C. Business Continuity and Disaster Recovery Response Checklist -- Appendix D. Emergency and Recovery Response Checklist -- Appendix E. Business Continuity Checklist. "Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well." "As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, it's difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially." "Business Continuity Planning (BCP) and Disaster Recovery Planning (ORP) are emerging as the 'next big thing' in corporate IT circles. With distributed networks, increasing demands for confidentiality, integrity and availability of data, and the widespread risks to the security of personal, confidential and sensitive data, no organization can afford to ignore the need for disaster planning." "The British Standards Institute is releasing a new standard for BCP this year, the Disaster Recovery Institute has developed a certification for DRP/BCP professionals in conjunction with the British Standards Institute, trade shows are popping up on this topic and the news is filled with companies facing disasters from all sides."--Jacket Print version record. Use copy Restrictions unspecified star MiAaHDL Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL Business Data processing Security measures. Electronic data processing departments Security measures. http://id.loc.gov/authorities/subjects/sh85042310 Crisis management. http://id.loc.gov/authorities/subjects/sh85034122 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Management information systems Security measures. Gestion Informatique Sécurité Mesures. Centres de traitement de l'information Sécurité Mesures. Gestion de crise. Réseaux d'ordinateurs Sécurité Mesures. Systèmes d'information de gestion Sécurité Mesures. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Business Data processing Security measures. blmlsh Electronic data processing departments Security measures. blmlsh Crisis management. blmlsh Computer networks Security measures. blmlsh Management information systems Security measures. blmlsh Business Data processing Security measures fast Computer networks Security measures fast Crisis management fast Electronic data processing departments Security measures fast Risk management. gtt Databescherming. gtt Print version: Snedaker, Susan. Business continuity & disaster recovery for IT professionals. Burlington, MA : Syngress, ©2007 9781597491723 1597491721 (DLC) 2007279256 (OCoLC)174502453 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211412 Volltext |
spellingShingle | Snedaker, Susan Business continuity & disaster recovery for IT professionals / Chapter 1. Business Continuity and Disaster Recovery Overview -- Case Study 1. Legal Obligations Regarding Data Security -- Chapter 2. Project Initiation -- Case Study 2. The Financial Impact of Disasters and Disruptions -- Chapter 3. Risk Assessment -- Chapter 4. Business Impact Analysis -- Chapter 5. Mitigation Strategy Development -- Chapter 6. Business Continuity/Disaster Recovery Plan Development -- Chapter 7. Emergency Response and Recovery -- Chapter 8. Training, Testing, and Auditing -- Chapter 9. BC/DR Plan Maintenance -- Appendix A. Risk Management Checklist -- Appendix B. Crisis Communications Checklist -- Appendix C. Business Continuity and Disaster Recovery Response Checklist -- Appendix D. Emergency and Recovery Response Checklist -- Appendix E. Business Continuity Checklist. Business Data processing Security measures. Electronic data processing departments Security measures. http://id.loc.gov/authorities/subjects/sh85042310 Crisis management. http://id.loc.gov/authorities/subjects/sh85034122 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Management information systems Security measures. Gestion Informatique Sécurité Mesures. Centres de traitement de l'information Sécurité Mesures. Gestion de crise. Réseaux d'ordinateurs Sécurité Mesures. Systèmes d'information de gestion Sécurité Mesures. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Business Data processing Security measures. blmlsh Electronic data processing departments Security measures. blmlsh Crisis management. blmlsh Computer networks Security measures. blmlsh Management information systems Security measures. blmlsh Business Data processing Security measures fast Computer networks Security measures fast Crisis management fast Electronic data processing departments Security measures fast Risk management. gtt Databescherming. gtt |
subject_GND | http://id.loc.gov/authorities/subjects/sh85042310 http://id.loc.gov/authorities/subjects/sh85034122 http://id.loc.gov/authorities/subjects/sh94001277 |
title | Business continuity & disaster recovery for IT professionals / |
title_alt | Business continuity and disaster recovery for IT professionals |
title_auth | Business continuity & disaster recovery for IT professionals / |
title_exact_search | Business continuity & disaster recovery for IT professionals / |
title_full | Business continuity & disaster recovery for IT professionals / Susan Snedaker. |
title_fullStr | Business continuity & disaster recovery for IT professionals / Susan Snedaker. |
title_full_unstemmed | Business continuity & disaster recovery for IT professionals / Susan Snedaker. |
title_short | Business continuity & disaster recovery for IT professionals / |
title_sort | business continuity disaster recovery for it professionals |
topic | Business Data processing Security measures. Electronic data processing departments Security measures. http://id.loc.gov/authorities/subjects/sh85042310 Crisis management. http://id.loc.gov/authorities/subjects/sh85034122 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Management information systems Security measures. Gestion Informatique Sécurité Mesures. Centres de traitement de l'information Sécurité Mesures. Gestion de crise. Réseaux d'ordinateurs Sécurité Mesures. Systèmes d'information de gestion Sécurité Mesures. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Business Data processing Security measures. blmlsh Electronic data processing departments Security measures. blmlsh Crisis management. blmlsh Computer networks Security measures. blmlsh Management information systems Security measures. blmlsh Business Data processing Security measures fast Computer networks Security measures fast Crisis management fast Electronic data processing departments Security measures fast Risk management. gtt Databescherming. gtt |
topic_facet | Business Data processing Security measures. Electronic data processing departments Security measures. Crisis management. Computer networks Security measures. Management information systems Security measures. Gestion Informatique Sécurité Mesures. Centres de traitement de l'information Sécurité Mesures. Gestion de crise. Réseaux d'ordinateurs Sécurité Mesures. Systèmes d'information de gestion Sécurité Mesures. BUSINESS & ECONOMICS Workplace Culture. BUSINESS & ECONOMICS Corporate Governance. BUSINESS & ECONOMICS Leadership. BUSINESS & ECONOMICS Organizational Development. Business Data processing Security measures Computer networks Security measures Crisis management Electronic data processing departments Security measures Risk management. Databescherming. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211412 |
work_keys_str_mv | AT snedakersusan businesscontinuitydisasterrecoveryforitprofessionals AT snedakersusan businesscontinuityanddisasterrecoveryforitprofessionals |