A must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats--from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats. Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed inventory of your library's many technology platforms and identify the threats specific to each. Next is a detailed how-to for performing a thorough needs assessment leading to clear and detailed written policies, and finally, an appropriate recovery action plan. The authors explain the relevant technologies, security measures, and available software and hardware tools in simple terms, allowing you to see the big picture and create an effective security plan without getting bogged down in the technical details that are the province of the IT department. A carefully chosen collection of model plans and a glossary of technical terms round out this invaluable guide.
"synopsis" may belong to another edition of this title.
This is a worst-case survival handbook for protecting your library's valuable technology assets.A must-have preparedness handbook for every library and information center, this non-technical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats - from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats.Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed inventory of your library's many technology platforms and identify the threats specific to each. Next is a detailed how-to for performing a thorough needs assessment leading to clear and detailed written policies, and finally, an appropriate recovery action plan.The authors explain the relevant technologies, security measures, and available software and hardware tools in simple terms, allowing you to see the big picture and create an effective security plan without getting bogged down in the technical details that are the province of the IT department.
A carefully chosen collection of model plans and a glossary of technical terms round out this invaluable guide."About this title" may belong to another edition of this title.
FREE shipping within United Kingdom
Destination, rates & speedsSeller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 6848529-n
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # IQ-9781555706395
Quantity: 15 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # IQ-9781555706395
Quantity: 15 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 6848529-n
Quantity: Over 20 available
Seller: Rarewaves USA United, OSWEGO, IL, U.S.A.
Paperback. Condition: New. This is a worst-case survival handbook for protecting your library's valuable technology assets.A must-have preparedness handbook for every library and information center, this non-technical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats - from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats.Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed inventory of your library's many technology platforms and identify the threats specific to each. Next is a detailed how-to for performing a thorough needs assessment leading to clear and detailed written policies, and finally, an appropriate recovery action plan.The authors explain the relevant technologies, security measures, and available software and hardware tools in simple terms, allowing you to see the big picture and create an effective security plan without getting bogged down in the technical details that are the province of the IT department. A carefully chosen collection of model plans and a glossary of technical terms round out this invaluable guide. Seller Inventory # LU-9781555706395
Quantity: Over 20 available
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. KlappentextrnrnA must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting your library s technology assets against the growing array of threats--from virus. Seller Inventory # 448112403
Quantity: Over 20 available
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 1st edition. 245 pages. 10.75x8.50x0.50 inches. In Stock. Seller Inventory # x-1555706398
Quantity: 2 available
Seller: Rarewaves.com UK, London, United Kingdom
Paperback. Condition: New. This is a worst-case survival handbook for protecting your library's valuable technology assets.A must-have preparedness handbook for every library and information center, this non-technical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats - from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats.Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed inventory of your library's many technology platforms and identify the threats specific to each. Next is a detailed how-to for performing a thorough needs assessment leading to clear and detailed written policies, and finally, an appropriate recovery action plan.The authors explain the relevant technologies, security measures, and available software and hardware tools in simple terms, allowing you to see the big picture and create an effective security plan without getting bogged down in the technical details that are the province of the IT department. A carefully chosen collection of model plans and a glossary of technical terms round out this invaluable guide. Seller Inventory # LU-9781555706395
Quantity: Over 20 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - A must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats--from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats. Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed inventory of your library's many technology platforms and identify the threats specific to each. Next is a detailed how-to for performing a thorough needs assessment leading to clear and detailed written policies, and finally, an appropriate recovery action plan. The authors explain the relevant technologies, security measures, and available software and hardware tools in simple terms, allowing you to see the big picture and create an effective security plan without getting bogged down in the technical details that are the province of the IT department. A carefully chosen collection of model plans and a glossary of technical terms round out this invaluable guide. Seller Inventory # 9781555706395
Quantity: 1 available
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLING22Oct2817100160406
Quantity: Over 20 available