0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (6)
  • R500+ (833)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Administering Active Directory (Paperback): Mark Wilkins Administering Active Directory (Paperback)
Mark Wilkins
R1,251 R1,060 Discovery Miles 10 600 Save R191 (15%) Ships in 18 - 22 working days

Configure, manage, and optimize Active Directory on your Windows 2000 network

Deploy and administer a distributed, interoperable, and secure Windows 2000 directory system using Active Directory and this hands-on resource. Administering Active Directory explains how to configure and implement Active Directory as your enterprise directory service and improve network performance. You'll learn to use the core AD components and services, including DNS, replication, and group policy, and take advantage of the centralized management capabilities. With step-by-step walk-throughs, task-at-a-glance sections, and detailed screen shots, this is the ideal desktop reference to Active Directory-the fully integrated directory service feature at the heart of Windows 2000.

  • Understand Active Directory architecture and hierarchy
  • Manage user accounts and group resources
  • Integrate DNS with LDAP and WINS
  • Create and manage domain trees and forests
  • Manage the Active Directory replication process
  • Configure site links
  • Troubleshoot and optimize Active Directory
  • Back up and restore your AD servers
  • Implement an Active Directory naming strategy
  • Design schema policy
  • Handle a multiple domain administration
  • Use group policy for efficient administration of network resources
  • Analyze and design a complete Active Directory topology
  • Migrate from Windows NT 4.0 to Windows 2000
Admin911: Windows 2000 Terminal Services (Paperback, Ed): Larry Seltzer Admin911: Windows 2000 Terminal Services (Paperback, Ed)
Larry Seltzer
R1,111 R945 Discovery Miles 9 450 Save R166 (15%) Ships in 18 - 22 working days

The survival guide for system administrators!

Call on Admin911 to learn whats going on with your network, to understand your options, and to pick the right solutions. --David Chernicoff, Windows 2000 Magazine

Windows 2000 Registry - Survival Guide for System Administrators (Paperback): Kathy Ivens Windows 2000 Registry - Survival Guide for System Administrators (Paperback)
Kathy Ivens
R1,103 R936 Discovery Miles 9 360 Save R167 (15%) Ships in 18 - 22 working days

Call on Admin911 to learn what’s going on with your network, to understand your options, and pick the right solutions. -David Chernicoff, Windows 2000 Magazine

Troubleshooting Snmp and Analyzing Mibs (Paperback): Louis Steinberg Troubleshooting Snmp and Analyzing Mibs (Paperback)
Louis Steinberg
R1,479 R1,217 Discovery Miles 12 170 Save R262 (18%) Ships in 18 - 22 working days

-- Step by step approach shows how to analyze networks carrying mission critical data such as voice over IP applications, streaming video and e-commerce.
-- Shows how to:
-- prevent network meltdowns before they occur
-- to collect, analyze and interpret MIBS using network-monitoring tools.
-- Learn how to analyze MIB output from Cisco Network Monitoring Tools, such as Cisco Works and Nortel.
-- Case studies on how leading financial firms use MIBS to prevent network failure before it occurs!

Self-Stabilization (Paperback): Shlomi Dolev Self-Stabilization (Paperback)
Shlomi Dolev
R1,139 Discovery Miles 11 390 Ships in 18 - 22 working days

Self-stabilization, an important concept to theoreticians and practitioners in distributed computing and communication networks, refers to a system's ability to recover automatically from unexpected faults. In this book Shlomi Dolev presents the fundamentals of self-stabilization and demonstrates the process of designing self-stabilizing distributed systems. He details the algorithms that can be started in an arbitrary state, allowing the system to recover from the faults that brought it to that state. The book proceeds from the basic concept of self-stabilizing algorithms to advanced applications.

Administering SMS (Paperback): Mark Wilkins Administering SMS (Paperback)
Mark Wilkins
R1,249 R1,057 Discovery Miles 10 570 Save R192 (15%) Ships in 18 - 22 working days

-- The hands-on daily bible for administrators working with SMS on large-scale Microsoft networks. Task-by-task instruction rather than overviews of the software and tools. Other essential tasks are covered in detail to get the network administrator quickly up to speed and on to the next job in their inbox.
-- Special elements in each of the Administering books include:
-- Task-at-a-glance labeled in each chapter Table of Contents
-- Task-oriented section guides propels readers directly to task
-- Walk-throughs provide readers with step-by-step instruction
-- Extensive screenshots and figures enhance the walk-throughs
-- Interactive checklists helps evaluate processes
-- Useful notes highlight key tips and warnings
-- For more information concludes the chapters with additional references
-- Troubleshooting shows the readers how to solve most common problems

Computer Networks and Open Systems: An Application Development Perspective - An Application Development Perspective... Computer Networks and Open Systems: An Application Development Perspective - An Application Development Perspective (Paperback)
L. N. Cassel, R. H. Austing
R4,591 Discovery Miles 45 910 Ships in 18 - 22 working days

Computer Networks and Open Systems: An Application Development Perspective covers principles, theory, and techniques of networks and open systems from a practical perspective, using real system and network applications as its basis. The selection of topics forms a core of material in computer networking, emphasizing methods and the environment for application development. The text aims to make readers immediately comfortable in today's networking environment while equipping them to keep pace in one of the fastest moving and most exciting areas of computer system development. Students will enter the study of networking through their own experience as a network users, and they will have the opportunity to practice the kind of networking tasks they will perform in the workplace. The authors take an application development perspective. This point of view reverses that traditional order of networking topics- instead of proceeding from the Physical Layer upward, the authors move from the Application Layer downward.

Cisco Access Lists Field Guide (Paperback): Gilbert Held, Kent Hundley Cisco Access Lists Field Guide (Paperback)
Gilbert Held, Kent Hundley
R809 Discovery Miles 8 090 Ships in 18 - 22 working days

ONE-STOP GUIDE TO CONFIGURING CISCO ACCESS LISTS.

Configuring access lists for Cisco Routers and for network operations is one of the most difficult tasks for network administrators working in a Cisco networking environment. Cisco- Access Lists Field Guide, by Gil
Held and Kent Hundley, CCNA, makes this task far less of a headache. This comprehensive reference thoroughly explores basic, dynamic, time-based, reflexive, and context-based access lists, and the use of keywords. Following a consistent, reader-friendly format, each chapter
covers the problem, offers a network illustration and access list, and a full explanation. This invaluable guide also describes potential pitfalls, and tells you how to avoid them. You also get hundreds of practical examples of access lists that can be tailored to your own environment.

Windows 2000 Administration (Paperback): George Spalding Windows 2000 Administration (Paperback)
George Spalding
R1,292 R1,101 Discovery Miles 11 010 Save R191 (15%) Ships in 18 - 22 working days

Implement and manage Microsoft's revolutionary directory-enabled platform.

Plan, deploy, and administer Windows 2000 in your enterprise. Windows 2000 Administration offers expert advice on all installation, migration, and management issues and provides in-depth details on Windows 2000 features, including the Active Directory, Microsoft Management Console (MMC), and Intellimirror. You'll also get complete information on the new security, backup, and disaster recovery options. No network administrator should be without this essential guide.

  • Install, configure, and deploy essential Windows 2000 network services, such as Dynamic DNS and Dynamic Host Configuration Protocol (DHCP)
  • Manage a secure, distributed network using the Active Directory
  • Create and organize AD objects - domains, organizational units (OUs), users, groups, computers, printers, and shared folders
  • Implement the Windows 2000 NTFSv5 File System and the Storage Management features
  • Take advantage of centralized deployment and administration features--offline folders, remote OS install, and the Group Policy-based controls of Intellimirror
  • Administer the entire enterprise from within the MMC
  • Enable remote access with Routing and Remote Access Service (RRAS)
  • Secure your network using Kerberos v5, file encryption, Public Key Infrastructure (PKI) support, and Windows File Protection
  • Backup to Zip drives, CDs, other hard drives or volumes, and tapes
UNIX Backup and Recovery (Paperback): W.Curtis Preston UNIX Backup and Recovery (Paperback)
W.Curtis Preston
R1,299 Discovery Miles 12 990 Ships in 10 - 15 working days

This guide provides a complete overview of all facets of Unix backup and recovery and offers practical, affordable backup and recovery solutions for environments of all sizes and budgets. It explains everything from freely available backup systems to large-scale commercial utilities.

The Systems Librarian - Designing Roles, Defining Skills (Paperback): The Systems Librarian - Designing Roles, Defining Skills (Paperback)
R1,089 Discovery Miles 10 890 Ships in 18 - 22 working days

What is a systems librarian? Both history and practice indicate a wide variation in the field, strong commitments to local arrangements and a lack of functional standards. Library administrators and managers struggle with the broad requirements of the position, weighing the skill sets of degree holding professionals and the non-MLS technologists. Systems librarians are often designers, planners, implementors, consultants, technology representatives or facilitators. This text provides an assessment of what system librarianship is and what it can be, outlining the type of training needed for people to fill these positions, and illustrates challenges for libraries - and systems librarians - in computing and networking.

Ecosystems and Technology - Idea Generation and Content Model Processing (Hardcover): Cyrus F Nourani Ecosystems and Technology - Idea Generation and Content Model Processing (Hardcover)
Cyrus F Nourani
R2,697 Discovery Miles 26 970 Ships in 10 - 15 working days

Ecosystems and Technology: Idea Generation and Content Model Processing, presents important new innovations in the area of management and computing. Innovation is the generation and application of new ideas and skills to produce new products, processes, and services that improve economic and social prosperity. This includes management and design policy decisions and encompasses innovation research, analysis, and best practice in enterprises, public and private sector service organizations, government, regional societies and economies. The book, the first volume in the Innovation Management and Computing book series, looks at technology that improves efficiency and idea generation, including systems for business, medical/health, education, and more. The book provides detailed examples to provide readers with current issues, including Venture planning for innovations New technologies supporting innovations systems Competitive business modeling Context-driven innovation modeling The generation of ideas faster The measurement of relevant data Virtual interfaces Business intelligence and content processing Predictive modeling Haptic expression and emotion recognition innovations, with applications to neurocognitive medical science This book provides a wealth of information that will be useful for IT and business professionals, educators, and students in many fields.

Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security... Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security Standard (Hardcover)
Heru Susanto, Mohammad Nabil Almunawar
R2,808 Discovery Miles 28 080 Ships in 10 - 15 working days

This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001. The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.

Reliable Distributed Computing with the Isis Toolkit (Hardcover): K.P. Birman Reliable Distributed Computing with the Isis Toolkit (Hardcover)
K.P. Birman
R3,201 Discovery Miles 32 010 Ships in 10 - 15 working days

In distributed computing systems--the software for networks--a system may have a huge number of components resulting in a high level of complexity. That and issues such as fault-tolerance, security, system management, and exploitation of concurrency make the development of complex distributed systems a challenge.

The Isis Toolkit has become one of the most successful approaches for building reliable distributed software since its release in 1987. Commercially available since 1990, Isis is used in hundreds of settings, including the New York Stock Exchange, the Electronic Stock Exchange of Switzerland, the data acquisition system of the CERN high-energy physics particle accelerator, VLSI fabrication control systems, the Iridium telecommunication system, database applications at the World Bank, and an Arctic weather environment monitoring system. Isis is also widely used for instructional purposes.

This book comprises papers that document Isis and describe its important applications. Many of these are previously unpublished papers that give a broad overview of Isis, provide details of the underlying protocols and theory, and discuss the best ways to exploit Isis features in real applications. This volume will be of use to practitioners developing Isis-based applications, to instructors using Isis in classroom settings, and to researchers who want a single reference source for this important approach to distributed computing.

Introduction to Healthcare Information - Enabling Technologies (Paperback): Raymond Gensinger Introduction to Healthcare Information - Enabling Technologies (Paperback)
Raymond Gensinger
R1,913 Discovery Miles 19 130 Ships in 10 - 15 working days

Based on HIMSS' highly successful Annual Conference workshop, "Introduction to Healthcare and IT Enabling Technologies: All You Wanted to Know and Were Afraid to Ask," this book is a valuable resource for individuals new to healthcare, healthcare professionals transitioning into the field of information technology, students or anyone wanting a better understanding of the role IT plays within today's healthcare system. The book introduces many enabling technologies currently used within healthcare, including electronic health records, personal health records, medication dispensing devices, bioelectronic equipment and patient identification technologies. In addition, the books contributors--nationally recognized leaders of their organizations' successful IT implementations--explore how external influences, such as the evolving legislative activities in Washington DC, are responsible for the rapid changes facing health IT today. With chapters focused on IT use from bedside to board room, Introduction to Healthcare Information Enabling Technologies examines today's health IT environment from various stakeholder perspectives, including nurses, physicians and the C-Suite--CEO, CFO and CIO. (2010.)

Data Analytics in Marketing, Entrepreneurship, and Innovation (Hardcover): Mounir Kehal, Shahira El Alfy Data Analytics in Marketing, Entrepreneurship, and Innovation (Hardcover)
Mounir Kehal, Shahira El Alfy
R2,468 R1,516 Discovery Miles 15 160 Save R952 (39%) Ships in 9 - 17 working days

Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences. Data Analytics in Marketing, Entrepreneurship, and Innovation covers techniques, processes, models, tools, and practices for creating business opportunities through data analytics. It features case studies that provide realistic examples of applications. This multifaceted examination of data analytics looks at: Business analytics Applying predictive analytics Using discrete choice analysis for decision-making Marketing and customer analytics Developing new products Technopreneurship Disruptive versus incremental innovation The book gives researchers and practitioners insight into how data analytics is used in the areas of innovation, entrepreneurship, and marketing. Innovation analytics helps identify opportunities to develop new products and services, and improve existing methods of product manufacturing and service delivery. Entrepreneurial analytics facilitates the transformation of innovative ideas into strategy and helps entrepreneurs make critical decisions based on data-driven techniques. Marketing analytics is used in collecting, managing, assessing, and analyzing marketing data to predict trends, investigate customer preferences, and launch campaigns.

Effective Processes for Quality Assurance (Paperback): Boyd L. Summers Effective Processes for Quality Assurance (Paperback)
Boyd L. Summers
R1,371 R1,248 Discovery Miles 12 480 Save R123 (9%) Ships in 10 - 15 working days

Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices, improvements, and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies, institutions, military programs, and successful businesses by encouraging a cooperative, proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage, and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains: Quality Assurance methods Measuring benefits of Quality Assurance process improvement Quality Assurance performance and improvement Risk management Quality Assurance improvement with metrics Effective processes for Quality Assurance Quantitative process performance and commitments Quality Assurance plans Quality Assurance for customers and suppliers Supporting software configuration Effective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.

Network Programmability with YANG - The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI (Hardcover):... Network Programmability with YANG - The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI (Hardcover)
Benoit Claise, Joe Clarke, Jan Lindblad
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

Today, networks must evolve and scale faster than ever. You can't manage everything by hand anymore: You need to automate relentlessly. YANG, along with the NETCONF, RESTCONF, or gRPC/gNMI protocols, is the most practical solution, but most implementers have had to learn by trial and error. Now, Network Programmability with YANG gives you complete and reliable guidance for unlocking the full power of network automation using model-driven APIs and protocols. Authored by three YANG pioneers, this plain-spoken book guides you through successfully applying software practices based on YANG data models. The authors focus on the network operations layer, emphasizing model-driven APIs, and underlying transports. Whether you're a network operator, DevOps engineer, software developer, orchestration engineer, NMS/OSS architect, service engineer, or manager, this guide can help you dramatically improve value, agility, and manageability throughout your network. Discover the value of implementing YANG and Data Model-Driven Management in your network Explore the layers and components of a complete working solution Build a business case where value increases as your solution grows Drill down into transport protocols: NETCONF, RESTCONF, and gNMI/gRPC See how telemetry can establish a valuable automated feedback loop Find data models you can build on, and evaluate models with similar functionality Understand models, metadata, and tools from several viewpoints: architect, operator, module author, and application developer Walk through a complete automation journey: business case, service model, service implementation, device integration, and operation Leverage the authors' experience to design successful YANG models and avoid pitfalls

Security without Obscurity - A Guide to Confidentiality, Authentication, and Integrity (Hardcover): J. J. Stapleton Security without Obscurity - A Guide to Confidentiality, Authentication, and Integrity (Hardcover)
J. J. Stapleton
R3,031 Discovery Miles 30 310 Ships in 9 - 17 working days

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about information security based on his experience developing dozens of ISO Technical Committee 68 and ANSI accredited X9 standards. Starting with the fundamentals, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication. The text delves beyond the typical cryptographic abstracts of encryption and digital signatures as the fundamental security controls to explain how to implement them into applications, policies, and procedures to meet business and compliance requirements. Providing you with a foundation in cryptography, it keeps things simple regarding symmetric versus asymmetric cryptography, and only refers to algorithms in general, without going too deeply into complex mathematics. Presenting comprehensive and in-depth coverage of confidentiality, integrity, authentication, non-repudiation, privacy, and key management, this book supplies authoritative insight into the commonalities and differences of various users, providers, and regulators in the U.S. and abroad.

?Como se hace un bebe? - Spanish Language Edition (Spanish, Paperback): Cory Silverberg ?Como se hace un bebe? - Spanish Language Edition (Spanish, Paperback)
Cory Silverberg; Illustrated by Fiona Smyth
R261 R240 Discovery Miles 2 400 Save R21 (8%) Ships in 18 - 22 working days
Network Marketing Sawal Aapke Jawab Surya Sinha Ke (Hindi, Paperback): Surya Sinha Network Marketing Sawal Aapke Jawab Surya Sinha Ke (Hindi, Paperback)
Surya Sinha
R440 Discovery Miles 4 400 Ships in 18 - 22 working days
Kya Hai Network Marketing Jaaniyen (Hindi, Paperback): Surya Sinha Kya Hai Network Marketing Jaaniyen (Hindi, Paperback)
Surya Sinha
R516 Discovery Miles 5 160 Ships in 18 - 22 working days
Network Security with NetFlow  and IPFIX - Big Data Analytics for Information Security (Paperback): Omar Santos Network Security with NetFlow and IPFIX - Big Data Analytics for Information Security (Paperback)
Omar Santos
R1,283 Discovery Miles 12 830 Ships in 18 - 22 working days

A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security Today's world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibility into the network is an indispensable tool for network and security professionals and Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. Network Security with NetFlow and IPFIX is a key resource for introducing yourself to and understanding the power behind the Cisco NetFlow solution. Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of numerous books including the CCNA Security 210-260 Official Cert Guide, details the importance of NetFlow and demonstrates how it can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. This book also examines NetFlow's potential as a powerful network security tool. Network Security with NetFlow and IPFIX explores everything you need to know to fully understand and implement the Cisco Cyber Threat Defense Solution. It also provides detailed configuration and troubleshooting guidance, sample configurations with depth analysis of design scenarios in every chapter, and detailed case studies with real-life scenarios. You can follow Omar on Twitter: @santosomar NetFlow and IPFIX basics Cisco NetFlow versions and features Cisco Flexible NetFlow NetFlow Commercial and Open Source Software Packages Big Data Analytics tools and technologies such as Hadoop, Flume, Kafka, Storm, Hive, HBase, Elasticsearch, Logstash, Kibana (ELK) Additional Telemetry Sources for Big Data Analytics for Cyber Security Understanding big data scalability Big data analytics in the Internet of everything Cisco Cyber Threat Defense and NetFlow Troubleshooting NetFlow Real-world case studies

Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover): Maryann Simmons Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover)
Maryann Simmons
R3,656 Discovery Miles 36 560 Ships in 10 - 15 working days

In this book, new developments in network coding and data compression are examined. The first chapter proposes a new multipath transmission scheme that employs network coding at the source for rate-delay adaptation. The second chapter presents the theory, applications and challenges of a physical-layer network coding technique that promises significant improvement to the spectral efficiency and interference mitigation challenges in future heterogenous cellular and wireless networks. In this third chapter, network and distributed turbo coding based HARQ protocol are examined for wireless broadcasting systems. The last three chapters included in this book present three models that are based on Data Envelopment Analysis (DEA) methodology to appropriately evaluate the efficiency of multicast energy and further minimizes energy transmission in wireless networks without affecting the overall network performance; the development of methods of experimental statistical modeling of physical laws and the cascade scheme of data compression in multimode fibre systems.

Business Continuity Planning - A Step-by-Step Guide With Planning Forms on CD-ROM, 3rd Edition (Paperback, 3rd Enlarged ed.):... Business Continuity Planning - A Step-by-Step Guide With Planning Forms on CD-ROM, 3rd Edition (Paperback, 3rd Enlarged ed.)
Kenneth L Fulmer; Edited by Philip Jan Rothstein
R1,168 Discovery Miles 11 680 Ships in 18 - 22 working days

Your businessa survival depends on a solid business continuity and disaster recover plan. If you are overwhelmed by the very thought of creating a continuity plan for your business, this is the book for you.

It acknowledges the day-to-day realities of running an enterprise or any size by taking you step-by-step through the generally accepted abest practices, a enabling you to construct an appropriately sized recovery plan. It will neither overwhelm you nor break the bank and it will get your business continuity program running surprisingly fast and with a lot less effort than you expect. The author uses straightforward, jargon-free writing and supplements it with checklists, tables and worksheets to illustrate the easiest path to your destination.

Once you have the basic structure in place, you can refer back to this guide time and time again to build on your business continuity plan as your business evolves. The simplicity of this reference and the accompanying materials on CD-ROM will allay your concerns and allow you to confidently devote more time and resources to this critical process. As you move through the steps, you will see the practical and measurable results of a business that is becoming more resilient, more agile, and better prepared to take advantage of the next business change.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Randomly Deployed Wireless Sensor…
XI Chen Paperback R3,004 Discovery Miles 30 040
Managing Resources for Futuristic…
Tariq Umer Hardcover R5,327 Discovery Miles 53 270
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, … Paperback R2,667 Discovery Miles 26 670
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang Paperback R2,606 Discovery Miles 26 060
Governance of Picture Archiving and…
Carrison K.S. Tong, Eric T.T. Wong Hardcover R5,612 Discovery Miles 56 120
Meeting People via WiFi and Bluetooth
Joshua Schroeder, Henry Dalziel Paperback R777 Discovery Miles 7 770
XML in Data Management - Understanding…
Peter Aiken, M. David Allen Paperback R1,150 Discovery Miles 11 500
Channel Coding: Theory, Algorithms, and…
David Declercq, Marc Fossorier, … Paperback R3,340 R3,126 Discovery Miles 31 260
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, … Paperback R2,763 Discovery Miles 27 630
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830

 

Partners