Security Planning & Disaster Recovery
Proactively implement a successful security and disaster recovery plan--before a security breach occurs. Including hands-on security checklists, design maps, and sample plans, this expert resource is crucial for keeping your network safe from any outside intrusions.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Laws and Regulations
21 other sections not shown
Other editions - View all
acceptable use policy anti-virus appropriate areas attack auditors authentication awareness training backup budget business unit chapter checklist checksums compliance compromised computer systems conduct confidentiality configuration cost denial-of-service attack deploy determine disaster recovery plan document employees encryption ensure example firewall front-end server functions hardware HIPAA identify implement important incident response information security department information security policy information security program information security risk internal audit Internet intrusion detection systems issues log files metrics Microsoft Windows monitoring operations organization organization's passwords penetration test perform phase policies and procedures potential problem recommendations risk assessment security awareness security controls security incident security manager security projects security requirements security services security systems senior management sensitive information single sign-on skills specific system administrators technical threats unauthorized understand user accounts vendor vulnerability scans Web server