"synopsis" may belong to another edition of this title.
"About this title" may belong to another edition of this title.
Shipping:
US$ 3.99
Within U.S.A.
Book Description Condition: New. Seller Inventory # ABLING22Oct2817100160406
Book Description Soft Cover. Condition: new. This item is printed on demand. Seller Inventory # 9781555706395
Book Description PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # IQ-9781555706395
Book Description Paperback. Condition: Brand New. 1st edition. 245 pages. 10.75x8.50x0.50 inches. In Stock. Seller Inventory # x-1555706398
Book Description PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # IQ-9781555706395
Book Description Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. KlappentextrnrnA must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting your library s technology assets against the growing array of threats--from virus. Seller Inventory # 448112403
Book Description Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - A must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats--from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats. Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed inventory of your library's many technology platforms and identify the threats specific to each. Next is a detailed how-to for performing a thorough needs assessment leading to clear and detailed written policies, and finally, an appropriate recovery action plan. The authors explain the relevant technologies, security measures, and available software and hardware tools in simple terms, allowing you to see the big picture and create an effective security plan without getting bogged down in the technical details that are the province of the IT department. A carefully chosen collection of model plans and a glossary of technical terms round out this invaluable guide. Seller Inventory # 9781555706395