{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB11600088.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB11600088#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB11600088.json"},"dc:title":[{"@value":"Disaster recovery : principles and practices"}],"dc:creator":"April J. Wells, Charlyne Walker, Timothy Walker","dc:publisher":[{"@value":"Pearson Prentice Hall"}],"dcterms:extent":"xxii, 296 p.","cinii:size":"23 cm","dc:language":"eng","dc:date":"2007","cinii:ncid":"BB11600088","cinii:ownerCount":"1","foaf:maker":[{"@type":"foaf:Person","foaf:name":[{"@value":"Wells, April J."}]},{"@type":"foaf:Person","foaf:name":[{"@value":"Walker, Charlyne"}]},{"@type":"foaf:Person","foaf:name":[{"@value":"Walker, Timothy (Timothy R.)"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA015635","@type":"foaf:Organization","foaf:name":"兵庫県立大学 明石看護学術情報館","rdfs:seeAlso":{"@id":"https://lib.laic.u-hyogo.ac.jp/opac/search?s_ncid=BB11600088"}}],"bibo:lccn":["2006025316"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2006025316"}],"prism:publicationDate":["c2007"],"cinii:note":["Includes bibliographical references and index","HTTP:URL=http://www.loc.gov/catdir/toc/ecip0618/2006025316.html Information=Table of contents only"],"dc:subject":["LCC:HD49","DC22:363.34/8"],"cinii:contentOfWorks":["Introduction to disaster recovery","Preparing to develop the disaster recovery plan","Assessing risk and impact","Prioritizing systems and functions for recovery","Identify data storage and recovery sites","Developing plans, procedures, and relationships","Developing procedures for special circumstances","Implementing the disaster recovery plan","Continued assessment of needs, threats, and solutions"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Emergency+management+--+Handbooks%2C+manuals%2C+etc","dc:title":"Emergency management -- Handbooks, manuals, etc"},{"@id":"https://ci.nii.ac.jp/books/search?q=Crisis+management+--+Handbooks%2C+manuals%2C+etc","dc:title":"Crisis management -- Handbooks, manuals, etc"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security+--+Handbooks%2C+manuals%2C+etc","dc:title":"Computer security -- Handbooks, manuals, etc"},{"@id":"https://ci.nii.ac.jp/books/search?q=Data+protection+--+Handbooks%2C+manuals%2C+etc","dc:title":"Data protection -- Handbooks, manuals, etc"},{"@id":"https://ci.nii.ac.jp/books/search?q=Data+recovery+%28Computer+science%29+--+Planning+--+Handbooks%2C+manuals%2C+etc","dc:title":"Data recovery (Computer science) -- Planning -- Handbooks, manuals, etc"},{"@id":"https://ci.nii.ac.jp/books/search?q=Business+planning+--+Handbooks%2C+manuals%2C+etc","dc:title":"Business planning -- Handbooks, manuals, etc"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BA79875105#entity","dc:title":"Security series","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:9780131711273"}]}]}