Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Business Continuity and Disaster Recovery Planning for IT Professionals

Buy
Increase Your Companys Odds of Surviving a Major Disaster

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well.

As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, its difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially.

Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) are emerging as the next big thing in corporate IT circles. With distributed networks, increasing demands for confidentiality, integrity and availability of data, and the widespread risks to the security of personal, confidential and sensitive data, no organization can afford to ignore the need for disaster planning.

The British Standards Institute is releasing a new standard for BCP this year, the Disaster Recovery Institute has developed a certification for DRP/BCP professionals in conjunction with the British Standards Institute, trade shows are popping up on this topic and the news is filled with companies facing disasters from all sides.

In this book you will find:

* Complete coverage of the 3 categories of disaster: natural hazards, human-caused hazards, and accidental/ technical hazards.
* Updated information on risks from cyber attacks, rioting, protests, product tampering, bombs, explosions, and terrorism.
* Extensive disaster planning and readiness checklists for IT infrastructure, enterprise applications, servers and desktops.
* Clear guidance on developing alternate work and computing sites and emergency facilities.
* Actionable advice on emergency readiness and response.
* Up-to-date information on the legal implications of data loss following a security breach or disaster.

Featuring Case Studies from:
Deanna Conn, Partner, Quarles & Brady, LLP, information security expert
Debbie Earnest, Disaster Recovery and IT expert
Patty Hoenig, Communications and PR expert

* Complete coverage of the 3 categories of disaster: natural hazards, human-caused hazards, and accidental and technical hazards.
* Only published source of information on the new BCI standards and government requirements.
* Up dated information on recovery from cyber attacks, rioting, protests, product tampering, bombs, explosions, and terrorism.

About the Author

Susan Snedaker, Principal Consultant and founder of Virtual Team Consulting, LLC has over 20 years experience working in IT in both technical and executive positions including with Microsoft, Honeywell, and Logical Solutions. Her experience in executive roles at both Keane, Inc. and Apta Software, Inc. provided extensive strategic and operational experience in managing hardware, software and other IT projects involving both small and large teams. As a consultant, she and her team work with companies of all sizes to improve operations, which often entails auditing IT functions and building stronger project management skills, both in the IT department and company-wide. She has developed customized project management training for a number of clients and has taught project management in a variety of settings. Ms. Snedaker holds a Masters degree in Business Administration (MBA) and a Bachelors degree in Management. She is a Microsoft Certified Systems Engineer (MCSE), a Microsoft Certified Trainer (MCT), and has a certificate in Advanced Project Management from Stanford University.
(HTML tags aren't allowed.)

358: Metabolomics: Methods and Protocols (Methods in Molecular Biology)
358: Metabolomics: Methods and Protocols (Methods in Molecular Biology)

Metabolomics: Methods and Protocols examines the state-of-the-art in metabolomic analysis. Leading researchers in the field present protocols for the application of complementary analytical methods, such as gas chromatography-mass spectrometry (GC-MS). Metabolomics: Methods and Protocols contains forward-looking protocols,...

Corporate Sigma: Optimizing the Health of Your Company with Systems Thinking
Corporate Sigma: Optimizing the Health of Your Company with Systems Thinking

One study after the next shows that most employees are unhappy with their jobs and that less than a third actively engage with their work. That means that two out of every three are merely putting in their time, rather than maximizing productivity and attaining satisfaction. One could argue that such a malaise is the symptom of an unhealthy...

Codes and Cryptography
Codes and Cryptography

This text unifies the concepts of information, codes and cryptography as first studied by Shannon in his seminal papers on communication and secrecy systems. The first five chapters cover the fundamental ideas of information theory, compact encoding of messages and the theory of error-correcting codes. After a discussion of mathematical...


XML Topic Maps: Creating and Using Topic Maps for the Web
XML Topic Maps: Creating and Using Topic Maps for the Web

The explosive growth of the World Wide Web is fueling the need for a new generation of technologies for managing information flow, data, and knowledge. This developer's overview and how-to book provides a complete introduction and application guide to the world of topic maps, a powerful new means of navigating the World Wide...

Mobile Networks and Management: First International Conference
Mobile Networks and Management: First International Conference

The First International ICST Conference on Mobile Networks and Management (MONAMI) was held in Athens, Greece during October 13–14, 2009, hosted by the National Technical University of Athens. Through what we hope will be a long-lasting series of events, this new international conference aims at bringing together top researchers,...

Microsoft Exchange Server 2013 High Availability
Microsoft Exchange Server 2013 High Availability

Design a highly available Exchange 2013 messaging environment using real-world examples

Overview

  • Use the easy-to-follow guidelines and tips to achieve the highest availability
  • Covers all the aspects that need to be considered before, during and after implementation of high availability
  • ...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy