Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Disaster Recovery Planning - Jon William Toigo

Disaster Recovery Planning

Strategies for Protecting Critical Information Assets
Buch | Softcover
464 Seiten
2000 | 2nd edition
Prentice Hall (Verlag)
978-0-13-084506-1 (ISBN)
CHF 79,20 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
PLEASE PROVIDE COURSE INFORMATION

PLEASE PROVIDE
8450F-5 The most complete guide to data protection, disaster recovery avoidance, and disaster recovery tools, techniques, and technologies! Disaster Recovery Planning, Second Edition shows exactly how to implement world-class disaster recovery for today's distributed environments-without paying for expensive consultants or proprietary methodologies! Veteran planner and analyst Jon William Toigo delivers strategies and insight that any company can use, large or small. You'll find comprehensive coverage of disaster recovery techniques that reflect the latest technologies in data storage, networks, server systems, and the Internet: *E-business and Web based disaster planning and recovery *Recovery strategies for n-tier client/server and ERP systems-the Achilles heel of modern corporate IT *Low-cost steps you can take now to dramatically reduce the risks of disaster *Guidelines for leveraging current and next generation IT and network technologies to ensure maximum protection for mission-critical business processes Disaster Recovery Planning, Second Edition is linked to an accompanying Web site, http://www.drplanning.org, that will serve as a "living appendix"-keeping IT professionals up-to-date on disaster recovery for years to come!

JON WILLIAM TOIGO is author of seven books, including The Holy Grail of Data Storage Management (Prentice Hall PTR, 2000), as well as more than 1000 articles for the business trade press. He is also a consultant providing ongoing research and writing services to a broad range of commercial clients, including AT&T, Cabletron, Cisco, Citrix, Compaq, Hewlett-Packard., Storage Technologies Corporation, and Network Systems Corporation. Over the past 15 years, he has helped numerous companies develop disaster recovery plans for their systems and networks.

1. Introduction.


What Is Disaster Recovery Planning? Purpose of This Book. A Working Definition of Disaster. The Time Factor in Disaster Recovery. The Need for Disaster Recovery Planning. The Auditor's View. An Imperfect Legal Mandate. Building Management Consensus for Disaster Recovery Planning. Who Should Write the Plan? A Straightforward, Project-Oriented Approach. A Note on Methodology. Endnotes.



2. Analyzing the Risk.


The Purpose of Risk Analysis. Identifying and Prioritizing Assets and Functions. Collecting Input from End Users. A Criticality Spectrum. Collecting Data on Outage Costs. Identifying Threats to Assets and Functions. The Problem with Probability. A Few Compelling Statistics. Developing Plan Objectives. Endnotes.



3. Facility Protection.


Water Detection. Fire Suppression. Contamination Reduction. Precombustion Detection. Power Failure. Physical Access Control. Endnotes.



4. Data Recovery Planning.


The Primacy of Data. Planning for Data Recovery. Identifying the Information Asset. Classifying Criticality: Inputs and Outputs. Setting a Policy on Data Asset Identification, Classification, and Backup. Policy-Based Management of Electronic Data via Software. Performance Considerations in Backup Software Selection. Planning for Backup or Restoral? Electronic Vaulting. Remote Mirroring. Mirroring Not a Panacea. Options for Records Storage. Selecting an Off-site Storage Vendor. Cost-Justify Off-Site Storage. Implementing the Data Recovery Plan. Final Observations About Data Recovery Planning. Endnotes.



5. Strategies for Centralized System Recovery.


Developing Centralized System Backup Strategies. Cautions and Caveats. Mainframe Backup Strategies. Which Strategy Is Preferred? Selecting a Hot Site. The Bottom Line on Centralized System Recovery. Endnotes.



6. Strategies for Decentralized System Recovery.


Distributed Client/Server Computing: The Achilles Heel of Disaster Recovery Planning. A Brief Overview of Distributed Computing. Contemporary Client/Server Applications. Preventive Measures. Proactive Measures. Planning for Recovery. Endnotes.



7. Strategies for End User Recovery.


Developing an End User Recovery Strategy. Options for End User Recovery. Emerging Technology: Harnessing Remote Access Capabilities. Types of Remote Access. Considerations Regarding the Use of Remote Access for End User Recovery. Other Issues in End User Recovery. Supply Logistics. Final Thoughts on End User Recovery Strategies. Endnotes.



8. Strategies for Networking Backup.


What Is Involved in Formulating a Network Recovery Strategy? Analyzing Networks: A Layered Approach. Preliminary Activities in Network Recovery Planning. Formulating Strategies for Internal Network Recovery. Backup Strategies for the Local Loop and Wide Area Network Services. Planning for the Restoral of Wide Area Voice and Data Network Links Following a User or Systems Relocation. Endnotes.



9. Emergency Decision Making.


Designating Teams. Common Evacuation Project Functions and Teams. Common Recovery Project Functions and Teams. Relocation and Reentry Project Functions. Staffing Teams. Developing a Notification Directory. Creating the Emergency Management Flowchart. Emergency Response. Situation Assessment. Emergency Operations Center Activation. The Recovery Phase. The Relocation/Reentry Phase. Final Thoughts on Emergency Management Decision Making. Endnotes.



10. The Recovery Management Improvement.


Researching Literature. Interviews and Tours. Professional DR Organizations. Professional Associations. Other Milieu Resources. Endnotes.



11. Plan Maintenance and Testing.


Team Education. Plan Maintenance. Change Management. Testing to Maintain the Plan. Managing the Results.



12. Conclusion.


Glossary.


Index.

Erscheint lt. Verlag 6.1.2000
Verlagsort Upper Saddle River
Sprache englisch
Maße 186 x 240 mm
Gewicht 1073 g
Themenwelt Informatik Theorie / Studium Kryptologie
ISBN-10 0-13-084506-X / 013084506X
ISBN-13 978-0-13-084506-1 / 9780130845061
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich