L'édition de cet ISBN n'est malheureusement plus disponible.
Afficher les exemplaires de cette édition ISBNLes informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Frais de port :
EUR 3,69
Vers Etats-Unis
Description du livre Etat : New. N° de réf. du vendeur ABLING22Oct2817100160406
Description du livre Soft Cover. Etat : new. This item is printed on demand. N° de réf. du vendeur 9781555706395
Description du livre PAP. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur IQ-9781555706395
Description du livre Paperback. Etat : Brand New. 1st edition. 245 pages. 10.75x8.50x0.50 inches. In Stock. N° de réf. du vendeur x-1555706398
Description du livre PAP. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur IQ-9781555706395
Description du livre N° de réf. du vendeur STOCK10291434
Description du livre Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. KlappentextrnrnA must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting your library s technology assets against the growing array of threats--from virus. N° de réf. du vendeur 448112403
Description du livre Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - A must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats--from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats. Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed inventory of your library's many technology platforms and identify the threats specific to each. Next is a detailed how-to for performing a thorough needs assessment leading to clear and detailed written policies, and finally, an appropriate recovery action plan. The authors explain the relevant technologies, security measures, and available software and hardware tools in simple terms, allowing you to see the big picture and create an effective security plan without getting bogged down in the technical details that are the province of the IT department. A carefully chosen collection of model plans and a glossary of technical terms round out this invaluable guide. N° de réf. du vendeur 9781555706395