05632nam 22007814a 450 991082097560332120200520144314.09781118050637111805063097804702772180470277211(CKB)1000000000401833(EBL)331530(OCoLC)191881808(SSID)ssj0000075599(PQKBManifestationID)11110257(PQKBTitleCode)TC0000075599(PQKBWorkID)10130563(PQKB)11401028(JP-MeL)3000029942(Au-PeEL)EBL331530(CaPaEBR)ebr10226784(CaONFJC)MIL122244(CaSebORM)9780470039731(MiAaPQ)EBC331530(OCoLC)402442098(OCoLC)ocm402442098 (OCoLC)185036899(FINmELB)ELB177825(EXLCZ)99100000000040183320060315d2008 uy 0engur|n|---|||||txtccrIT disaster recovery planning for dummies /Peter Gregory ; foreword by Philip Jan Rothstein1st editionHoboken, NJ Wileyc20081 online resource (386 p.)For DummiesIncludes index.9780470039731 0470039736 IT Disaster Recovery Planning for Dummies; About the Author; Dedication; Author's Acknowledgments; Contents at a Glance; Table of Contents; Foreword; Introduction; About This Book; How This Book Is Organized; What This Book Is - and What It Isn't; Assumptions about Disasters; Icons Used in This Book; Where to Go from Here; Write to Us!; Part I: Getting Started with Disaster Recovery; Chapter 1: Understanding Disaster Recovery; Disaster Recovery Needs and Benefits; Beginning a Disaster Recovery Plan; Managing the DR Project; Understanding the Entire DR LifecycleChapter 2: Bootstrapping the DR Plan EffortStarting at Square One; Resources to Begin Planning; Emergency Operations Planning; Preparing an Interim DR Plan; Building the Interim Plan; Testing Interim DR Plans; Chapter 3: Developing and Using a Business Impact Analysis; Understanding the Purpose of a BIA; Scoping the Effort; Conducting a BIA: Taking a Common Approach; Capturing Data for the BIA; Introducing Threat Modeling and Risk Analysis; Performing Threat Modeling and Risk Analysis; Identifying Critical Components; Determining the Maximum Tolerable DowntimeCalculating the Recovery Time ObjectiveCalculating the Recovery Point Objective; Part II: Building Technology Recovery Plans; Chapter 4: Mapping Business Functions to Infrastructure; Finding and Using Inventories; Using High-Level Architectures; Identifying Dependencies; Chapter 5: Planning User Recovery; Managing and Recovering End-User Computing; Managing and Recovering End-User Communications; Chapter 6: Planning Facilities Protection and Recovery; Protecting Processing Facilities; Selecting Alternate Processing Sites; Chapter 7: Planning System and Network RecoveryManaging and Recovering Server ComputingManaging and Recovering Network Infrastructure; Implementing Standard Interfaces; Implementing Server Clustering; Chapter 8: Planning Data Recovery; Protecting and Recovering Application Data; Choosing How and Where to Store Data for Recovery; Protecting and Recovering Applications; Off-Site Media and Records Storage; Chapter 9: Writing the Disaster Recovery Plan; Determining Plan Contents; Structuring the Plan; Managing Plan Development; Preserving the Plan; Taking the Next Steps; Part III: Managing Recovery Plans; Chapter 10: Testing the Recovery PlanTesting the DR PlanConducting Paper Tests; Conducting Walkthrough Tests; Conducting Simulation Testing; Conducting Parallel Testing; Conducting Cutover Testing; Planning Parallel and Cutover Tests; Establishing Test Frequency; Chapter 11: Keeping DR Plans and Staff Current; Understanding the Impact of Changes on DR Plans; Incorporating DR into Business Lifecycle Processes; Establishing DR Requirements and Standards; A Multi-Tiered DR Standard Case Study; Maintaining DR Documentation; Training Response Teams; Chapter 12: Understanding the Role of PreventionPreventing Facilities-Related DisastersIf you have a business or a nonprofit organization, or if you're the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it's easy to put it off. After all, where do you start? IT Disaster Recovery Planning For Dummies shows you how to get started by creating a safety net while you work out the details of your major plan. The right plan will get your business back on track quickly, whether you're hit by a tornado or a disgruntled employee with super hacking powers. Here's how to assess the situation, develop both For DummiesInformation technologySecurity measuresInformation resources managementEmergency managementInformation technologySecurity measures.Information resources management.Emergency management.658.4/78336.57njb/09Gregory Peter H312629MiAaPQMiAaPQMiAaPQBOOK9910820975603321IT disaster recovery planning for dummies4051130UNINA