LEADER 04030nam a2200421Ii 4500 001 991003247899707536 006 m d 007 cr cn||||||||| 008 070806s2005 ne a sb 001 0 eng d 020 $a9781555583392 020 $a1555583393 035 $ab1365505x-39ule_inst 037 $a116302:116400$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a004/.0068/4$222 100 1 $aRittinghouse, John W.$0627521 245 10$aBusiness continuity and disaster recovery for infosec managers$h[electronic resource] /$cJohn W. Rittinghouse, James F. Ransome. 260 $aAmsterdam ;$aBoston :$bElsevier Digital Press,$cc2005. 300 $alxix, 338 p. :$bill. ;$c24 cm. 504 $aIncludes bibliographical references (p. 275-281) and index. 505 0 $aIntroduction - Business Security; Contingency and Continuity Planning; Assessing; Mitigation Strategies; Preparing for a Possible Emergency; Disaster Recovery; Business Recovery Phase; Testing, Auditing, and Training; Maintaining a Business Continuity Plan; General References; Index. 520 $aEvery year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide. John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant. Provides critical strategies for maintaining basic business functions when and if systems are shut down Establishes up to date methods and techniques for maintaining second site back up and recovery Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aBusiness$xData processing$xSecurity measures. 650 0$aCrisis management. 650 0$aComputer networks$xSecurity measures. 650 0$aInformation resources management. 655 7$aElectronic books.$2local 700 1 $aRansome, James F. 776 1 $cOriginal$z1555583393$z9781555583392$w(DLC) 2005052587$w(OCoLC)61228806 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781555583392$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b1365505x$b24-02-22$c24-01-08 912 $a991003247899707536 994 $aC0$bTEF 996 $aBusiness continuity and disaster recovery for infosec managers$91212809 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gne $h0$i0