Amazon cover image
Image from Amazon.com

Business continuity and disaster recovery for infosec managers / John W. Rittinghouse, James F. Ransome.

By: Contributor(s): Material type: TextTextPublication details: Amsterdam ; Boston : Elsevier Digital Press, ©2005.Description: 1 online resource (lxix, 338 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781555583392
  • 1555583393
  • 9780080528335
  • 0080528333
Subject(s): Genre/Form: Additional physical formats: Print version:: Business continuity and disaster recovery for infosec managers.DDC classification:
  • 004/.0068/4 22
LOC classification:
  • HF5548.37 .R58 2005eb
Online resources:
Contents:
Contingency and continuity planning -- Assessing risk -- Mitigation strategies -- Preparing for a possible emergency -- Disaster recovery phase -- Business recovery phase -- Testing, auditing, and training -- Maintaining a business continuity plan.
Summary: Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide. John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph. D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant. Provides critical strategies for maintaining basic business functions when and if systems are shut down Establishes up to date methods and techniques for maintaining second site back up and recovery Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Includes bibliographical references (pages 275-281) and index.

Contingency and continuity planning -- Assessing risk -- Mitigation strategies -- Preparing for a possible emergency -- Disaster recovery phase -- Business recovery phase -- Testing, auditing, and training -- Maintaining a business continuity plan.

Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide. John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph. D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant. Provides critical strategies for maintaining basic business functions when and if systems are shut down Establishes up to date methods and techniques for maintaining second site back up and recovery Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters.

Print version record.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library