Fire in the computer room, what now? Disaster recovery for business survival
Saved in:
| Main Author: | NeagalhGregor |
|---|---|
| Other Authors: | Winters, Laufman |
| Format: | Book |
| Published: |
New JerseylbPrentice Halllc1997
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Windows forensics and incident recovery
by: Carvey, Harlan A.
Published: (2005)
by: Carvey, Harlan A.
Published: (2005)
SQL server 2000 backup & recovery
by: Desai
Published: (2001)
by: Desai
Published: (2001)
Disaster Recovery Planning strategies for protecting critical information
by: Toigo lhJon
by: Toigo lhJon
Security in distributed computing Did you lock the Door?
by: Bruce
Published: (1997)
by: Bruce
Published: (1997)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Forensic discovery
by: Farmer
Published: (2005)
by: Farmer
Published: (2005)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
SQL server 7 backup & recovery
by: DesailhAnil
by: DesailhAnil
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989)
by: Cooper
Published: (1989)
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
Facing cyber threats head on protecting yourself and your business
by: Minick, Brian
Published: (2016)
by: Minick, Brian
Published: (2016)
Computer security handbook
Published: (2014)
Published: (2014)
Digital rights management an introduction
Published: (2010)
Published: (2010)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Online business computer applications
by: EliasonlhAlan L
by: EliasonlhAlan L
Problem solving and uncertainty modeling through optimization and soft computing applications
Published: (2016)
Published: (2016)
The security risk assessment handbook a complete guide for performing security risk assessments
by: Landoll, Douglas J.
Published: (2010)
by: Landoll, Douglas J.
Published: (2010)
Data and text mining a business applications approach
by: Miller, Thomas W. 1955-
Published: (2005)
by: Miller, Thomas W. 1955-
Published: (2005)
Corporate computer and network security
by: Panko, R. R.
Published: (2010)
by: Panko, R. R.
Published: (2010)
The power of now how winning companies sense and respond to change using real-time technology
by: RanadivelhVivek
by: RanadivelhVivek
Computer programming for technology and engineering
by: CarterlhJohn
by: CarterlhJohn
Computing essentials multimedia edition 1997-1998
by: O'Leary
Published: (1997)
by: O'Leary
Published: (1997)
iPhone and iOS forensics investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices
by: Hoog, Andrew, et al.
Published: (2011)
by: Hoog, Andrew, et al.
Published: (2011)
Computers
by: Long
Published: (1998)
by: Long
Published: (1998)
Computers
by: Long
Published: (1993)
by: Long
Published: (1993)
Computers
by: LonglhLarry E.
by: LonglhLarry E.
Computers
by: Long
Published: (1999)
by: Long
Published: (1999)
Computers
by: Long
Published: (1998)
by: Long
Published: (1998)
Computing essentials 2000-2001
by: O'Leary
by: O'Leary
Computing essentials 2000-2001
by: O'Leary lhTimothy J
by: O'Leary lhTimothy J
Graph analysis and visualization discovering business opportunity in linked data
by: Brath, Richard
Published: (2015)
by: Brath, Richard
Published: (2015)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
The power of now winning companies sense and response To Change Using Real- Time Technology
by: Ranadive
by: Ranadive
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Fundamentals of computing II abstraction, data structures, and large software systems
Published: (1993)
Published: (1993)
Distributed computing principles and applications
by: Liu lhMei-Ling L
by: Liu lhMei-Ling L
Similar Items
-
Windows forensics and incident recovery
by: Carvey, Harlan A.
Published: (2005) -
SQL server 2000 backup & recovery
by: Desai
Published: (2001) -
Disaster Recovery Planning strategies for protecting critical information
by: Toigo lhJon -
Security in distributed computing Did you lock the Door?
by: Bruce
Published: (1997) -
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)


