Disaster recovery planning : preparing for the unthinkable



Disaster recovery planning : preparing for the unthinkable

Jon William Toigo ; with illustrations by Margaret Romao Toigo

Prentice Hall, c2003

3rd ed.

大学図書館所蔵 件 / 3



Includes bibliographical references and index

HTTP:URL=http://www.loc.gov/catdir/toc/fy035/2002011553.html Information=Table of contents



Disaster Recovery Planning, Third Edition is a comprehensive, up-to-the-minute, IT professional's guide to planning for disaster recovery without hiring expensive consultants or implementing proprietary methodologies. It has been thoroughly revised and updated to reflect new strategies and technologies -- and the lessons of 9/11, as witnessed first-hand by the author, who wrote the Port Authority of New York and New Jersey's disaster recovery plan. Jon William Toigo presents step-by-step coverage of disaster recovery techniques that reflect the latest technologies in data storage, networks, server systems, and the Internet. Toigo presents focused, hands-on coverage of the disaster recovery issues that matter most to your organization, including Web, e-commerce, and ERP/supply chain disaster recovery; low-cost steps you can take right now to dramatically reduce your risks; and much more. This edition's extensive new coverage includes new data storage topologies, data re-hosting issues, protecting against ongoing power outages such as those recently faced in California; new mailroom procedures; new physical access controls; and much more.


Foreword by Michael Shannon. Foreword by Gregory Ferris. Author's Preface to the Third Edition. Preface to the Second Edition. Acknowledgments. 1. Introduction. What Is Disaster Recovery Planning? Purpose of This Book. A Working Definition of Disaster. The Time Factor in Disaster Recovery. The Need for Disaster Recovery Planning. The Auditor's View. An Imperfect Legal Mandate. Building Management Consensus for Disaster Recovery Planning. Who Should Write the Plan? A Straightforward, Project-Oriented Approach. A Note on Methodology. Endnotes. 2. Analyzing the Risk. The Purpose of Risk Analysis. Identifying and Prioritizing Assets and Functions. Collecting Input from End Users. A Criticality Spectrum. Collecting Data on Outage Costs. Identifying Threats to Assets and Functions. The Problem with Probability. A Few Compelling Statistics. Developing Plan Objectives. Endnotes. 3. Facility Protection. Water Detection. Fire Suppression. Contamination Reduction. Precombustion Detection. Power Failure. Physical Access Control. Endnotes. 4. Data Recovery Planning. The Primacy of Data. Planning for Data Recovery. Identifying the Information Asset. Classifying Criticality: Inputs and Outputs. Setting a Policy on Data Asset Identification, Classification, and Backup. Policy-based Management of Electronic Data via Software. Storage Consolidation. Tape Backup. Designing a storage Recovery Plan. Electronic Vaulting. Remote Mirroring. Mirroring Not a Panacea. Options for Records Storage. Selecting an Off-site Storage Vendor. Cost-Justify Off-site Storage. Implementing the Data Recovery Plan. Final Observations About Data Recovery Planning. Endnotes. PERSPECTIVE: EMC. PERSPECTIVE: LEGATO. PERSPECTIVE: IRON MOUNTAIN. PERSPECTIVE: NETWORK APPLIANCE. PERSPECTIVE: QUANTUM. PERSPECTIVE: STORABILITY. PERSPECTIVE: STORAGETEK. PERSPECTIVE: TEK-TOOLS. 5. Strategies for Centralized System Recovery. Developing Centralized System Backup Strategies. Cautions and Caveats. Mainframe Backup Strategies. Which Strategy Is Preferred? Selecting a Hot Site. The Bottom Line on Centralized System Recovery. Endnotes. PERSPECTIVE: HP BRS. PERSPECTIVE: SUNGARD AVAILABILITY SERVICE. 6. Strategies for Decentralized System Recovery. Distributed Client/Server Computing: The Achilles Heel of Disaster Recovery Planning. A Brief Overview of Distributed Computing. Contemporary Client/Server Applications. Preventive Measures. Proactive Measures. Planning for Recovery. Endnotes. 7. Strategies for End User Recovery. Developing an End User Recovery Strategy. Options for End User Recovery. Emerging Technology: Harnessing Remote Access Capabilities. Types of Remote Access. Considerations Regarding the Use of Remote Access for End User Recovery. Other Issues in End User Recovery. Final Thoughts on End User Recovery Strategies. Endnotes. 8. Strategies for Networking Backup. What Is Involved in Formulating a Network Recovery Strategy? Analyzing Networks: A Layered Approach. Preliminary Activities in Network Recovery Planning. Formulating Strategies for Internal Network Recovery. Backup Strategies for the Local Loop and Wide Area Network Services. Planning for the Restoral of Wide Area Voice and Data Network Links Following a User or Systems Relocation. Endnotes. PERSPECTIVE: CNT. PERSPECTIVE: SITESAFE. PERSPECTIVE: ZEROWAIT. 9 Emergency Decision Making. Designating Teams. Common Evacuation Project Functions and Teams. Common Recovery Project Functions and Teams. Relocation and Reentry Project Functions. Staffing Teams. Developing a Notification Directory. Creating the Emergency Management Flowchart. Emergency Response. Situation Assessment. Emergency Operations Center Activation. The Recovery Phase. The Relocation/Reentry Phase. Final Thoughts on Emergency Management Decision Making. Endnotes. 10. The Recovery Management Improvement. Researching Literature. Interviews and Tours. Professional DR Organizations. Professional Associations. The "Friction" of Disaster. Endnotes. 11. Plan Maintenance and Testing. Team Education. Plan Maintenance. Change Management . Managing the Results. Endnotes. 12. Conclusion. Preparing For the Unthinkable: Control The Damage. Endnotes. Glossary. Index.

「Nielsen BookData」 より