"Electronic books." . . "Photopoulos, Constantine" . . "BUSINESS & ECONOMICS Workplace Culture." . . "Protecció de la informació (Informàtica)" . . "Data protection." . . "BUSINESS & ECONOMICS Leadership." . . "Emergency management." . . "Desastres Prevenció." . . "Plans de continuité d'activité" . . . . . . . . . . . . . "Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes.*Addresses a very topical subject of great concern to security, general IT and business management*Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data.*Gathers in a single place all information about this criti." . . . . . . "Managing catastrophic loss of sensitive data : a guide for IT and security professionals" . . "Managing Catastrophic Loss of Sensitive Data A Guide for IT and Security Professionals" . "Electronic books"@en . "Electronic books" . . "Managing catastrophic loss of sensitive data" . "Managing catastrophic loss of sensitive data"@en . . . . . . . "Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes." . . "Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes. *Addresses a very topical subject of great concern to security, general IT and business management *Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data. *Gathers in a single place all information about this critical issue, including legal, public relations and regulatory issues."@en . "Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes. *Addresses a very topical subject of great concern to security, general IT and business management *Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data. *Gathers in a single place all information about this critical issue, including legal, public relations and regulatory issues." . . . . . "Livres électroniques" . . . "Managing catastrophic loss of sensitive data : [a guide for IT and security professional ; a step-by-step guide to recovering from catastrophic data loss and getting back to business ; a road map for navigating one of the most urgent issues for security, general IT, and business management ; provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data ; gathers in a single place all information about this critical issue, including legal, public relations, and regulatory issues]" . "Managing catastrophic loss of sensitive data a guide for IT and security professionals"@en . "Managing catastrophic loss of sensitive data a guide for IT and security professionals" . "Managing Catastrophic Loss of Sensitive Data" . "Llibres electrònics" . . . . . . "Managing catastrophic loss of sensitive data : [a guide for IT and security professionals]" . . . . . . . . . "Computer security." . . "BUSINESS & ECONOMICS Organizational Development." . . "BUSINESS & ECONOMICS Corporate Governance." . . "Protection de l'information (Informatique)" . . "Sécurité informatique." . .