Cisa Certified Information Systems Auditor All-In-One Exam Guide, Fourth Edition
by Peter H Gregory
In Hindsight
What causes disasters? In this book, the authors analyse the causes of some of the major disasters from the last thirty years and explain what could have been done better, before and after the event. Unlike many titles on business continuity and disaster recovery, In Hindsight: A compendium of Business Continuity case studies does not build up from the theory of business continuity planning. Instead, it takes apart real events such as Hurricane Katrina, the terrorist attacks in London, Madrid an...
Good backup and recovery strategies are key to the health of any organization. Medium- to very-large-scale systems administrators have to protect large amounts of critical data as well as design backup solutions that are scalable and optimized to meet changing conditions. Pro Data Backup and Recovery will cover some of the more common backup applications, such as Symantec NetBackup/BackupExec, EMC NetWorker, and CommVault, but the main discussion will focus on the implementation of 21st century...
Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
by Abhilash GB
This is a step by step guide that will help you understand disaster recovery using VMware vSphere Replication 5.5 and VMware vCenter Site Recovery Manager (SRM) 5.5. The topics and configuration procedures are accompanied with relevant screenshots, flowcharts, and logical diagrams that makes grasping the concepts easier. This book is a guide for anyone who is keen on using vSphere Replication or vCenter Site Recovery Manager as a disaster recovery solution. This is an excellent handbook for solu...
Chaos Engineering with Go
by Kapil Kumar Khandelwal and Mohit Garg
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers. The book discusses different infrastructures in a smart grid, such as the automatic metering infrastruc...
What would you do if the hard drive containing a year's worth of financial data and your wedding photos suddenly stops working? What would you do if Internet hackers run off with your credit card numbers and rack up several thousand dollars in 1-900 calls? Most people never even remotely consider the possibility of a computer disaster, but instead take it for granted that their computer will always work. Inevitably, disaster strikes in various forms, from hardware failures to hackers, fires, flo...
In recent years, a considerable amount of effort has been devoted, both in industry and academia, to the development, validation and verification of critical systems, i.e. those systems whose malfunctions or failures reach a critical level both in terms of risks to human life as well as having a large economic impact. Certifications of Critical Systems - The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the...
Don't wait for an attacker to find and exploit your security vulnerabilities-take the lead by assessing the state of your network's security. This book delivers advanced network testing strategies, including vulnerability scanning and penetration testing, from members of the Microsoft security teams. These real-world practitioners provide hands-on guidance on how to perform security assessments, uncover security vulnerabilities, and apply appropriate countermeasures. The companion CD features ti...
Discover the unified, distributed storage system and improve the performance of applications Key FeaturesExplore the latest features of Ceph's Mimic releaseGet to grips with advanced disaster and recovery practices for your storageHarness the power of Reliable Autonomic Distributed Object Store (RADOS) to help you optimize storage systemsBook DescriptionCeph is an open source distributed storage system that is scalable to Exabyte deployments. This second edition of Mastering Ceph takes you a ste...
Companies and institutions depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based. Business Continuity is the ability to do business under any circumstances and is an essential requirement faced by modern companies. Both concepts - High Availability and Disaster Recovery - are realized by redundant systems. This book presents requirements, concepts, and realizations of redundant systems on all abstraction levels, and a...
Microsoft Sharepoint 2013 Disaster Recovery Guide
by Professor & Chairman Department of Pathology Peter Ward, Peter Abreu, Pavlo Andrushkiw, Pat Esposito, Jeff Gellman, and Joel Plaut
The style and approach of the book is an easytoread SharePoint admin guide. This is not a stepbystep instruction book, but rather a guide on how to implement and execute a disaster recovery plan to your SharePoint environment.This book is great for both SharePoint and SQL administrators new to the SharePoint 2013 architecture, and who are looking to get a good grounding in how to use implement a solid disaster recoveryrecovery plan. It's assumed that you have some experience in SharePoint and Wi...
Microsoft System Center 2012 R2 Compliance Management Cookbook
by Andreas Baumgarten, Ronnie Isherwood, and Susan Roesner
Whether you are an IT manager, an administrator, or security professional who wants to learn how Microsoft Security Compliance Manager and Microsoft System Center can help fulfil compliance and security requirements, this is the book for you. Prior knowledge of Microsoft System Center is required.
SQL Server 7 Backup and Recovery (Database Professional's Library)
by Anil Desai
-- Provides real-world information for database administrators to develop, manage, plan and implement a data protection solution. -- Covers advanced tools and technologies for increasing uptime and performance, including clustering, replication, stand-by servers and advanced backup and recovery. Also reviews related information in data protection, security and performance on Windows NT4 and 2000. -- Author is a recognized SQL Server expert and contributor to MCP Magazine. He speaks nationally on...
As PCs continue to get more complicated, disasters continue to become more commonplace. This book focuses on helping users overcome the disasters that happen on their PCs as a result of viruses, system crashes, hard disk failures and the like. Unlike other books that focus on a single aspect of the problem, this book covers all the important issues including prevention, diagnosis, and troubleshooting. While other books contain theory and background that may be of interest to a network administra...