|
|
|||
|
||||
OverviewEvery year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide. John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant. Full Product DetailsAuthor: John Rittinghouse, PhD, CISM (SVP, Professional Security Services at SecureInfo Corporation in San Antonio, TX) , James F. Ransome, PhD, CISM, CISSP (James F. Ransome, Ph.D., CISSP, CISM,SVP, Managed Security Services)Publisher: Elsevier Science & Technology Imprint: Digital Press Dimensions: Width: 19.10cm , Height: 2.10cm , Length: 23.50cm Weight: 0.860kg ISBN: 9781555583392ISBN 10: 1555583393 Pages: 408 Publication Date: 26 October 2005 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of stock The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsIntroduction - Business Security; Contingency and Continuity Planning; Assessing; Mitigation Strategies; Preparing for a Possible Emergency; Disaster Recovery; Business Recovery Phase; Testing, Auditing, and Training; Maintaining a Business Continuity Plan; General References; IndexReviews"""With the recent release of the Department of Homeland Security's National Infrastructure Protection Plan, this single-source repository for business continuance and disaster recovery planning and deployment could not have been better timed. Drs. Rittinghouse and Ransome have captured the strategic and technical essentials necessary for governmental and business leaders to make informed decisions concerning the survival of their organizations, be it day-to-day or in extraordinary situations. As we all continue to face increased threat activities, this book is a must have for your organization. There is something for everyone in this work, from understanding the process of risk mitigation for the leadership to detailed checklists for the technical implementer. I strongly recommend this book."" Harley Rinerson, Chief Information Officer for the Colorado Department of Military & Veterans Affairs" With the recent release of the Department of Homeland Security's National Infrastructure Protection Plan, this single-source repository for business continuance and disaster recovery planning and deployment could not have been better timed. Drs. Rittinghouse and Ransome have captured the strategic and technical essentials necessary for governmental and business leaders to make informed decisions concerning the survival of their organizations, be it day-to-day or in extraordinary situations. As we all continue to face increased threat activities, this book is a must have for your organization. There is something for everyone in this work, from understanding the process of risk mitigation for the leadership to detailed checklists for the technical implementer. I strongly recommend this book. Harley Rinerson, Chief Information Officer for the Colorado Department of Military & Veterans Affairs There is something for everyone in this work, from understanding the process of risk mitigation for the leadership to detailed checklists for the technical implementer. I strongly recommend this book. Harley Rinerson, Chief Information Officer for the Colorado Department of Military & Veterans Affairs Author InformationJohn has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliabiltiy and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James F. Ransome, Ph.D., CISSP, CISM, has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently Vice President of Integrated Information Security at CH2M HILL in Denver, CO. Tab Content 6Author Website:Countries AvailableAll regions |