Business Continuity and Disaster Recovery Planning for IT Professionals: Edition 2

Newnes
3
Free sample

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. The new 2nd Edition of Business Continuity and Disaster Recovery for IT Professionals gives you the most up-to-date planning and risk management techniques for business continuity and disaster recovery (BCDR). With distributed networks, increasing demands for confidentiality, integrity and availability of data, and the widespread risks to the security of personal, confidential and sensitive data, no organization can afford to ignore the need for disaster planning.

Author Susan Snedaker shares her expertise with you, including the most current options for disaster recovery and communication, BCDR for mobile devices, and the latest infrastructure considerations including cloud, virtualization, clustering, and more. Snedaker also provides you with new case studies in several business areas, along with a review of high availability and information security in healthcare IT.

Don’t be caught off guard—Business Continuity and Disaster Recovery for IT Professionals, 2nd Edition , is required reading for anyone in the IT field charged with keeping information secure and systems up and running.

  • Complete coverage of the 3 categories of disaster: natural hazards, human-caused hazards, and accidental / technical hazards
  • Extensive disaster planning and readiness checklists for IT infrastructure, enterprise applications, servers and desktops
  • Clear guidance on developing alternate work and computing sites and emergency facilities
  • Actionable advice on emergency readiness and response
  • Up-to-date information on the legal implications of data loss following a security breach or disaster
Read more

About the author

Susan Snedaker, currently Director of IT and Information Security Officer at a large community hospital in Arizona, which has achieved HIMSS Analytics Stage 7 (EMR) certification and has been voted 100 Most Wired Hospitals two years in a row. Susan has over 20 years’ experience working in IT in both technical and executive positions including with Microsoft, Honeywell, and VirtualTeam Consulting. Her experience in executive roles has honed her extensive strategic and operational experience in managing data centers, core infrastructure, hardware, software and IT projects involving both small and large teams. Susan holds a Master’s degree in Business Administration (MBA) and a Bachelors degree in Management. She is a Certified Professional in Healthcare Information Management Systems (CPHIMS), Certified Information Security Manager (CISM), and was previously certified as a Microsoft Certified Systems Engineer (MCSE), a Microsoft Certified Trainer (MCT). Susan also holds a certificate in Advanced Project Management from Stanford University and an Executive Certificate in International Management from Thunderbird University’s Garvin School of International Management. She is the author of six books and numerous chapters on a variety of technical and IT subjects.

Read more
4.7
3 total
Loading...

Additional Information

Publisher
Newnes
Read more
Published on
Sep 10, 2013
Read more
Pages
620
Read more
ISBN
9780124114517
Read more
Language
English
Read more
Genres
Computers / Enterprise Applications / Business Intelligence Tools
Computers / Information Technology
Computers / Security / General
Read more
Content Protection
This content is DRM protected.
Read more
Read Aloud
Available on Android devices
Read more

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Finally--a single volume guide to really effective security for both voice and data wireless networks!

More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "bulletproof" wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers.

In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless applications.

Inside this book you'll find coverage of these essential topics: + Cryptographic protocols used in wireless networks. + Key-based protocols, including key exchange and authentication techniques + Various types of wireless network attacks, including reflection, session hijacks, and Fluhrer-Mantin-Shamir (FMS) attacks. + Encryption/decryption standards and methods. + Multi-layered security architectures. + Secure sockets layer (SSL) and transport layer security (TLS) protocols. + Cellular telephone network architectures and their vulnerabilities. + Modulation techniques, such as direct-sequence spread spectrum (DSSS) and orthogonal frequency division multiplexing (OFDM)And you'll also find coverage on such cutting-edge topics as security techniques for ad hoc networks and protecting Bluetooth networks. If you're serious about wireless security, then this title belongs on your reference bookshelf!
Between the high-level concepts of business intelligence and the nitty-gritty instructions for using vendors’ tools lies the essential, yet poorly-understood layer of architecture, design and process. Without this knowledge, Big Data is belittled – projects flounder, are late and go over budget. Business Intelligence Guidebook: From Data Integration to Analytics shines a bright light on an often neglected topic, arming you with the knowledge you need to design rock-solid business intelligence and data integration processes. Practicing consultant and adjunct BI professor Rick Sherman takes the guesswork out of creating systems that are cost-effective, reusable and essential for transforming raw data into valuable information for business decision-makers.

After reading this book, you will be able to design the overall architecture for functioning business intelligence systems with the supporting data warehousing and data-integration applications. You will have the information you need to get a project launched, developed, managed and delivered on time and on budget – turning the deluge of data into actionable information that fuels business knowledge. Finally, you’ll give your career a boost by demonstrating an essential knowledge that puts corporate BI projects on a fast-track to success.

Provides practical guidelines for building successful BI, DW and data integration solutions. Explains underlying BI, DW and data integration design, architecture and processes in clear, accessible language.Includes the complete project development lifecycle that can be applied at large enterprises as well as at small to medium-sized businesses Describes best practices and pragmatic approaches so readers can put them into action. Companion website includes templates and examples, further discussion of key topics, instructor materials, and references to trusted industry sources.
©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.