Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-3 of 3
Keywords: Data security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Outsourcing and replication considerations in disaster recovery planning
Available to Purchase
Journal:
Disaster Prevention and Management
Disaster Prevention and Management: An International Journal (2012) 21 (2): 172–183.
Published: 20 April 2012
... entering into an outsourcing relationship. The intense debate on the benefits of in‐house versus outsourced IT continues and is discussed further in the following sections. Disaster recovery Disasters Data center Data management Data security Information security Recovery planning...
Journal Articles
Managing computer security issues: preventing and limiting future threats and disasters
Available to Purchase
Journal:
Disaster Prevention and Management
Disaster Prevention and Management: An International Journal (2005) 14 (4): 493–505.
Published: 01 September 2005
...) of Trend Micro, The Love Bug virus that was launched in May, 2000, was said to have caused US$8.75 billion worth of damage and a direct action worm which attacked web servers and infected 250,000 computers in nine hours caused an estimated US$2.4 billion worth of damage. Internet Intelligence Data...
Journal Articles
Using assignment model as an automated recovery system
Available to Purchase
Journal:
Disaster Prevention and Management
Disaster Prevention and Management: An International Journal (2005) 14 (1): 89–96.
Published: 01 February 2005
... 2005 Disasters Data security Data handling System monitoring There is no software engineer on Earth that feels comfortable after a server failure. Especially on real‐time applications based on distributed databases, used mostly on military institutions and nation‐wide organizations...
