Manager's Guide to Iso22301, A: A Practical Guide to Developing and Implementing a Business Continuity Management System
by Tony Drewitt
Now completely revised and updated for Oracle8, this Oracle Press best-seller is essential reading for every Oracle DBA. Understand Oracle8's enhancements for the maintenance of Very Large Databases (VLDBs). Master Oracle8's new backup and recovery features, such as Tablespace point-in-time recovery and Recovery Manager. Get in-depth knowledge of Oracle8 on Windows NT. Develop critical backup scripts for VMS, Windows NT, and UNIX environments. Gain valuable recovery principles and methods - plus...
A Risk Management Approach to Business Continuity
by Julia Graham and David Kaye
Planning, Deploying and Installing Data Protector 9 (Data Protector, #1)
by Greg Baker
Your one-step guide to understanding industrial cyber security, its control systems, and its operations. About This Book • Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices • Filled with practical examples to help you secure critical infrastructure systems efficiently • A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems Who This Book Is For...
Everything You Want to Know about Organisational Change (Everything You Want to Know About, #1)
by Brian Johnson and Darren Arcangel
A must-have book for every organisation that faces change! Your organisation can benefit from change. This book will show you how. Why do organisations change? What are the risks involved? Can we resist change? What is the best way to manage it? What are the key factors that drive change, and how? Why are some changes easier to survive than others? These are just some of the questions that Darren Arcangel and Brian Johnson address in Everything you want to know about Organisational Change. This...
A $90 Value! A library's worth of reference material and secrets in 2 books: Everything you to get the most out of Windows 7's features and keep it running in perfect shape. The two books included in this kit are: 9780735645202 Troubleshooting Windows 7 Inside Out 9780735626652 Windows 7 Inside Out
Homeland Security Preparedness and Information Systems (Advances in Digital Crime, Forensics, and Cyber Terrorism)
by Christopher G Reddick
Homeland security information systems are an important area of inquiry due to the tremendous influence information systems play on the preparation and response of government to a terrorist attack or natural disaster. ""Homeland Security Preparedness and Information Systems: Strategies for Managing Public Policy"" delves into the issues and challenges that public managers face in the adoption and implementation of information systems for homeland security. A defining collection of field advanceme...
Data Center / Information Technology (It) Disaster Recovery Plan Templates, Policies & Examples
by Jamie Vance
Forest Notebook Large Size 8.5 x 11 Ruled 150 Pages Softcover
by Wild Pages Press
It Service Continuity Management and Disaster Recovery Best Practice Handbook
by Gerard Blokdijk and Ivanka Menken
A study guide for Oracle database administrators who want OCP certification. Certification ensures a high level of competence in the DBA job role. An accompanying CD-ROM includes self-testing software and pre-assessment exams.
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions...
Covid-19
by Parag Verma, Ankur Dumka, Alaknanda Ashok, Amit Dumka, and Anuj Bhardwaj
This book highlights progress in terms of Virus Biology and Infection Detection, Prevention, and Control, along with Screening, Testing, and Detection Techniques, that will provide learners and researchers (from basic to advanced) with the most innovative computer-driven methodologies for the fight against COVID-19. In addition, this book also covers the Pre- and Post-Impact of the COVID-19 Pandemic Crisis that will definitely provide useful content for researchers to think broadly about the ana...
Good backup and recovery strategies are key to the health of any organization. Medium- to very-large-scale systems administrators have to protect large amounts of critical data as well as design backup solutions that are scalable and optimized to meet changing conditions. Pro Data Backup and Recovery will cover some of the more common backup applications, such as Symantec NetBackup/BackupExec, EMC NetWorker, and CommVault, but the main discussion will focus on the implementation of 21st century...
Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
by Abhilash GB
This is a step by step guide that will help you understand disaster recovery using VMware vSphere Replication 5.5 and VMware vCenter Site Recovery Manager (SRM) 5.5. The topics and configuration procedures are accompanied with relevant screenshots, flowcharts, and logical diagrams that makes grasping the concepts easier. This book is a guide for anyone who is keen on using vSphere Replication or vCenter Site Recovery Manager as a disaster recovery solution. This is an excellent handbook for solu...
Cisa Certified Information Systems Auditor All-In-One Exam Guide, Fourth Edition
by Peter H Gregory
Developing and Evaluating Security-Aware Software Systems
As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practi...