Disaster Recovery Planning : Strategies for Protecting Critical Information Assets / Edition 2

Disaster Recovery Planning : Strategies for Protecting Critical Information Assets / Edition 2

by Jon William Toigo, Margaret Romano Toigo
     
 

ISBN-10: 013084506X

ISBN-13: 9780130845061

Pub. Date: 12/20/1999

Publisher: Pearson Education

The most complete guide to data protection, disaster recovery avoidance, and disaster recovery tools, techniques, and technologies!

Disaster Recovery Planning, Second Edition shows exactly how to implement world-class disaster recovery for today's distributed environments-without paying for expensive consultants or proprietary methodologies! Veteran planner

Overview

The most complete guide to data protection, disaster recovery avoidance, and disaster recovery tools, techniques, and technologies!

Disaster Recovery Planning, Second Edition shows exactly how to implement world-class disaster recovery for today's distributed environments-without paying for expensive consultants or proprietary methodologies! Veteran planner and analyst Jon William Toigo delivers strategies and insight that any company can use, large or small.

You'll find comprehensive coverage of disaster recovery techniques that reflect the latest technologies in data storage, networks, server systems, and the Internet:

  • E-business and Web based disaster planning and recovery
  • Recovery strategies for n-tier client/server and ERP systems-the Achilles heel of modern corporate IT
  • Low-cost steps you can take now to dramatically reduce the risks of disaster
  • Guidelines for leveraging current and next generation IT and network technologies to ensure maximum protection for mission-critical business processes

Disaster Recovery Planning, Second Edition is linked to an accompanying Web site, ...

Product Details

ISBN-13:
9780130845061
Publisher:
Pearson Education
Publication date:
12/20/1999
Edition description:
Older Edition
Pages:
464
Product dimensions:
7.37(w) x 9.49(h) x 1.43(d)

Table of Contents

1. Introduction.
2. Analyzing the Risk.
3. Facility Protection.
4. Data Recovery Planning.
5. Strategies for Centralized System Recovery.
6. Strategies for Decentralized System Recovery.
7. Strategies for End User Recovery.
8. Strategies for Networking Backup.
9. Emergency Decision Making.
10. The Recovery Management Improvement.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >