IT Disaster Recovery Planning For Dummies

Sold by John Wiley & Sons
1
Free sample

If you have a business or a nonprofit organization, or ifyou’re the one responsible for information systems at such anoperation, you know that disaster recovery planning is prettyvital. But it’s easy to put it off. After all, where do youstart?

IT Disaster Recovery Planning For Dummies shows you howto get started by creating a safety net while you work out thedetails of your major plan. The right plan will get your businessback on track quickly, whether you're hit by a tornado or adisgruntled employee with super hacking powers. Here's how toassess the situation, develop both short-term and long-term plans,and keep your plans updated.

This easy-to-understand guide will help you

  • Prepare your systems, processes, and people for an organizedresponse to disaster when it strikes
  • Identify critical IT systems and develop a long-rangestrategy
  • Select and train your disaster recovery team
  • Conduct a Business Impact Analysis
  • Determine risks to your business from natural or human-madecauses
  • Get management support
  • Create appropriate plan documents
  • Test your plan

Some disasters get coverage on CNN, and some just createheadaches for the affected organization. With IT DisasterRecovery Planning For Dummies, you’ll be prepared foranything from hackers to hurricanes!

Read more

About the author

Peter H. Gregory, CISA, CISSP, is the author of fifteenbooks on security and technology, including Solaris Security(Prentice Hall), Computer Viruses For Dummies (Wiley),Blocking Spam and Spyware For Dummies (Wiley), andSecuring the Vista Environment (O’Reilly).
Peter is a security strategist at a publicly-traded financialmanagement software company located in Redmond, Washington. Priorto taking this position, he held tactical and strategic securitypositions in large wireless telecommunications organizations. Hehas also held development and operations positions in casinomanagement systems, banking, government, non-profit organizations,and academia since the late 1970s.
He’s on the board of advisors for the NSA-certifiedCertificate program in Information Assurance & Cybersecurity atthe University of Washington, and he’s a member of the boardof directors of the Evergreen State Chapter of InfraGard.
Read more
5.0
1 total
Loading...

Additional Information

Publisher
John Wiley & Sons
Read more
Published on
Mar 3, 2011
Read more
Pages
388
Read more
ISBN
9781118050637
Read more
Language
English
Read more
Genres
Computers / Networking / General
Read more
Content Protection
This content is DRM protected.
Read more
Read Aloud
Available on Android devices
Read more

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Computer viruses—just the thought of your trusty PC catchingone is probably enough to make you sick. Thanks to thecyber-sickies who persist in coming up with new strains,there’s a major new cyberattack nearly every day. Virusessneak in, usually through e-mail.

Fortunately, there are ways to inoculate and protect yourcomputer. Computer Viruses For Dummies helps you:

Understand the risks and analyze your PC’s currentconditionSelect, install, and configure antivirus softwareScan your computer and e-mailRid your computer of viruses it’s already caughtUpdate antivirus software and install security patchesUse firewalls and spyware blockersProtect handheld PDAs from virusesAdopt safe computing practices, especially with e-mail and whenyou’re surfing the Net

Written by Peter H. Gregory, coauthor of CISSP ForDummies and Security + For Dummies, Computer VirusesFor Dummies goes beyond viruses to explain other nasty computerinfections like Trojan horses, HiJackers, worms, phishing scams,spyware, and hoaxes. It also profiles major antivirus software tohelp you choose the best program(s) for your needs.

Remember, if you don’t protect your computer, not only doyou risk having your computer infiltrated and your datacontaminated, you risk unknowingly transmitting a virus, worm, orother foul computer germ to everybody in your address book! Thisguide will help you properly immunize your PC with antivirussoftware now and install updates and security patches that are likebooster shots to keep your software protected against newviruses.

The world's most infamous hacker offers an insider's view of thelow-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form oneof the most exhaustive FBI manhunts in history and have spawneddozens of articles, books, films, and documentaries. Since hisrelease from federal prison, in 1998, Mitnick has turned his lifearound and established himself as one of the most sought-aftercomputer security experts worldwide. Now, in The Art of Deception,the world's most notorious hacker gives new meaning to the oldadage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security,Mitnick explains why all the firewalls and encryption protocols inthe world will never be enough to stop a savvy grifter intent onrifling a corporate database or an irate employee determined tocrash a system. With the help of many fascinating true stories ofsuccessful attacks on business and government, he illustrates justhow susceptible even the most locked-down information systems areto a slick con artist impersonating an IRS agent. Narrating fromthe points of view of both the attacker and the victims, heexplains why each attack was so successful and how it could havebeen prevented in an engaging and highly readable style reminiscentof a true-crime novel. And, perhaps most importantly, Mitnickoffers advice for preventing these types of social engineeringhacks through security protocols, training programs, and manualsthat address the human element of security.
Get prepared for your Information Security job search!

Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an Information Security Job For Dummies provides no-nonsense guidance on everything you need to get ahead of the competition and launch yourself into your dream job as an Information Security (IS) guru. Inside, you'll discover the fascinating history, projected future, and current applications/issues in the IS field. Next, you'll get up to speed on the general educational concepts you'll be exposed to while earning your analyst certification and the technical requirements for obtaining an IS position. Finally, learn how to set yourself up for job hunting success with trusted and supportive guidance on creating a winning resume, gaining attention with your cover letter, following up after an initial interview, and much more.
Covers the certifications needed for various jobs in the Information Security fieldOffers guidance on writing an attention-getting resumeProvides access to helpful videos, along with other online bonus materialsOffers advice on branding yourself and securing your future in Information SecurityIf you're a student, recent graduate, or professional looking to break into the field of Information Security, this hands-on, friendly guide has you covered.
Hacker extraordinaire Kevin Mitnick delivers the explosiveencore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes hislife to helping businesses and governments combat data thieves,cybervandals, and other malicious computer intruders. In hisbestselling The Art of Deception, Mitnick presented fictionalizedcase studies that illustrated how savvy computer crackers use"social engineering" to compromise even the most technically securecomputer systems. Now, in his new book, Mitnick goes one stepfurther, offering hair-raising stories of real-life computerbreak-ins-and showing how the victims could have prevented them.Mitnick's reputation within the hacker community gave him uniquecredibility with the perpetrators of these crimes, who freelyshared their stories with him-and whose exploits Mitnick nowreveals in detail for the first time, including: A group of friends who won nearly a million dollars in LasVegas by reverse-engineering slot machinesTwo teenagers who were persuaded by terrorists to hack into theLockheed Martin computer systemsTwo convicts who joined forces to become hackers inside a TexasprisonA "Robin Hood" hacker who penetrated the computer systems ofmany prominent companies-andthen told them how he gainedaccessWith riveting "you are there" descriptions of real computerbreak-ins, indispensable tips on countermeasures securityprofessionals need to implement now, and Mitnick's own acerbiccommentary on the crimes he describes, this book is sure to reach awide audience-and attract the attention of both law enforcementagencies and the media.
Computer viruses—just the thought of your trusty PC catchingone is probably enough to make you sick. Thanks to thecyber-sickies who persist in coming up with new strains,there’s a major new cyberattack nearly every day. Virusessneak in, usually through e-mail.

Fortunately, there are ways to inoculate and protect yourcomputer. Computer Viruses For Dummies helps you:

Understand the risks and analyze your PC’s currentconditionSelect, install, and configure antivirus softwareScan your computer and e-mailRid your computer of viruses it’s already caughtUpdate antivirus software and install security patchesUse firewalls and spyware blockersProtect handheld PDAs from virusesAdopt safe computing practices, especially with e-mail and whenyou’re surfing the Net

Written by Peter H. Gregory, coauthor of CISSP ForDummies and Security + For Dummies, Computer VirusesFor Dummies goes beyond viruses to explain other nasty computerinfections like Trojan horses, HiJackers, worms, phishing scams,spyware, and hoaxes. It also profiles major antivirus software tohelp you choose the best program(s) for your needs.

Remember, if you don’t protect your computer, not only doyou risk having your computer infiltrated and your datacontaminated, you risk unknowingly transmitting a virus, worm, orother foul computer germ to everybody in your address book! Thisguide will help you properly immunize your PC with antivirussoftware now and install updates and security patches that are likebooster shots to keep your software protected against newviruses.

Get prepared for your Information Security job search!

Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an Information Security Job For Dummies provides no-nonsense guidance on everything you need to get ahead of the competition and launch yourself into your dream job as an Information Security (IS) guru. Inside, you'll discover the fascinating history, projected future, and current applications/issues in the IS field. Next, you'll get up to speed on the general educational concepts you'll be exposed to while earning your analyst certification and the technical requirements for obtaining an IS position. Finally, learn how to set yourself up for job hunting success with trusted and supportive guidance on creating a winning resume, gaining attention with your cover letter, following up after an initial interview, and much more.
Covers the certifications needed for various jobs in the Information Security fieldOffers guidance on writing an attention-getting resumeProvides access to helpful videos, along with other online bonus materialsOffers advice on branding yourself and securing your future in Information SecurityIf you're a student, recent graduate, or professional looking to break into the field of Information Security, this hands-on, friendly guide has you covered.
©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.