IT disaster response : lessons learned in the field /: lessons learned in the field. (2016)
- Record Type:
- Book
- Title:
- IT disaster response : lessons learned in the field /: lessons learned in the field. (2016)
- Main Title:
- IT disaster response : lessons learned in the field
- Further Information:
- Note: Greg D. Moore.
- Authors:
- Moore, Greg D
- Contents:
- About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: A Different Approach; What Is a Disaster?; Real-World Example: Cave Rescue; Analysis ; Chapter 2: Why Disaster Response?; Disaster Preparedness; Factors to Consider; Focus on What's Important; Large vs. Small Disasters; Planned Downtime ; Unplanned Downtime; Real-World Example: Smokehouse Fire; Analysis; Exercise; Chapter 3: Introducing the Incident Command System; Command Staff; General Staff; Small Example: CEO's Hard Drive Fails; Medium Example: SAN Drive Failure. Large Example: Data Center FireReal-World Example: Y2K; Analysis; Conclusion; Recommended Resource; Chapter 4: Introducing CRM; Real-World Example: Eastern Airlines Flight 401 vs. US Airways Flight 1549; Analysis; Applying CRM to IT; Chapter 5: Checklists; Acronyms; Checklists in Air Travel; Ground Control; Planning for the Worst; Table-Topping; Not Using a Checklist; Real-World Example: Empty Database Copy; Analysis; Chapter 6: Roles of IT and Management; PTSD; Real-World Example: Pizza Delivery; Analysis; Recommended Reading; Chapter 7: People; Hiring the Right Person for the Right Job. Retaining the People You HirePeople During a Major Disaster; ICS and Your People; Real-World Example: Hires at My First Startup; Analysis; Chapter 8: The Small Stuff; Real-World Example: Lost Caving Party; Analysis; Chapter 9: The Big Stuff; Real-World Example: One Good, One Bad; Example Analysis; Chapter 10: When Is a Disaster ResponseAbout the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: A Different Approach; What Is a Disaster?; Real-World Example: Cave Rescue; Analysis ; Chapter 2: Why Disaster Response?; Disaster Preparedness; Factors to Consider; Focus on What's Important; Large vs. Small Disasters; Planned Downtime ; Unplanned Downtime; Real-World Example: Smokehouse Fire; Analysis; Exercise; Chapter 3: Introducing the Incident Command System; Command Staff; General Staff; Small Example: CEO's Hard Drive Fails; Medium Example: SAN Drive Failure. Large Example: Data Center FireReal-World Example: Y2K; Analysis; Conclusion; Recommended Resource; Chapter 4: Introducing CRM; Real-World Example: Eastern Airlines Flight 401 vs. US Airways Flight 1549; Analysis; Applying CRM to IT; Chapter 5: Checklists; Acronyms; Checklists in Air Travel; Ground Control; Planning for the Worst; Table-Topping; Not Using a Checklist; Real-World Example: Empty Database Copy; Analysis; Chapter 6: Roles of IT and Management; PTSD; Real-World Example: Pizza Delivery; Analysis; Recommended Reading; Chapter 7: People; Hiring the Right Person for the Right Job. Retaining the People You HirePeople During a Major Disaster; ICS and Your People; Real-World Example: Hires at My First Startup; Analysis; Chapter 8: The Small Stuff; Real-World Example: Lost Caving Party; Analysis; Chapter 9: The Big Stuff; Real-World Example: One Good, One Bad; Example Analysis; Chapter 10: When Is a Disaster Response Plan Not Enough?; Real-World Example: Ellison's Cave Rescue; Analysis; Chapter 11: Why Test?; Real-World Example: Cluster Failover Failure; Analysis; Chapter 12: Swiss Cheese; Disaster Mitigation; Disaster Prevention; The Human Factor. Real-World Example: Unlocked DoorAnalysis; Chapter 13: Epilogue; Other Books and Resources; Appendix A: Appendix; Change Review Plan; Goal; Reason; Plan; Preliminary ; Items to Review; SAN Sync; Log Shipping; Follow-up; Schedule; Risks; Rollback Procedure; Risk Analysis; Approval:; Index. … (more)
- Publisher Details:
- United States : Apress
- Publication Date:
- 2016
- Copyright Date:
- 2016
- Extent:
- 1 online resource
- Subjects:
- 004.068
004
Computer science
Information technology -- Management
Information technology -- Security measures
COMPUTERS -- Computer Literacy
COMPUTERS -- Computer Science
COMPUTERS -- Data Processing
COMPUTERS -- Hardware -- General
COMPUTERS -- Information Technology
COMPUTERS -- Machine Theory
COMPUTERS -- Reference
Information technology -- Management
Information technology -- Security measures
Computers -- Database Management -- General
Computers -- System Administration -- Storage & Retrieval
Databases
Information retrieval
Data protection
Database management
Information storage and retrieva
Computers -- Security -- General
Computer security
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9781484221846
1484221842 - Related ISBNs:
- 9781484221839
1484221834 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed January 26, 2017).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.353480
- Ingest File:
- 01_311.xml