Security Planning and Disaster Recovery
Proactively implement a successful security and disaster recovery plan--before a security breach occurs. Including hands-on security checklists, design maps, and sample plans, this expert resource is crucial for keeping your network safe from any outside intrusions.
What people are saying - Write a review
We haven't found any reviews in the usual places.
The Role of the Information Security Program
Laws and Regulations
22 other sections not shown
Other editions - View all
acceptable use policy anti-virus appropriate areas attack auditors authentication awareness training backup budget business units chapter checklist checksums compliance compromised computer systems conduct confidentiality configuration cost denial-of-service attack deploy determine disaster recovery plan document employees example firewall front-end server functions hardware HIPAA identify implement important incident response information security department information security policy information security program information security risk integrity internal audit Internet intrusion detection system issues lnformation log files Microsoft Windows monitoring organization organization's passwords penetration test perform phase policies and procedures potential problem project manager risk assessment SECURITY ALERT security awareness security controls security incident security manager security projects security requirements security staff member security systems senior management sensitive information single sign-on skills specific system administrators technical threats unauthorized understand user accounts vendor Web server