Written to address the special disaster recovery planning issues of System i, this book is your step-by-step guide to developing an effective, workable plan to protect your company's assets should the unthinkable happen.
Businesses today are more dependent than ever on information technology. And, faced with threats from natural disasters to terrorism, IT managers must be prepared. To be ready, you must have an effective IT disaster recovery plan in place, and now is the time to create it.
Mapping out all the preparations necessary for an effective disaster recovery plan and its safeguard--a continuous maintenance program--this guide is aimed at IT managers of small and medium businesses using IBM's System i. Companies that do not have the budget or desire to hire expensive consultants will find this book especially helpful.
In the opening section, author and expert Richard Dolewski covers the initial steps of auditing vulnerability, ranking essential IT functions, and reviewing the storage of tape backups, with the following discussion focused on the elements of the plan itself. The plan includes a mission statement, a definition of disaster, the assignment of staff to teams, methods of compensating for human error, and standards for documenting the steps of recovery.
The final portion of the guide covers the all-important initial testing of the system as well as the proper maintenance follow-up. In this practical book, Richard includes many sample forms and reports and weighs in on the pros and cons of using outside vendors for recovery systems.
Don't wait until it's too late. Use this handy guide to establish your System i disaster recovery plan today.
With System i Disaster Recovery Planning, you will:
|Author Name:||Richard Dolewski|
|Publication Date:||April 1, 2008|
|Product Dimensions:||7 x 0.9 x 9 inches|
|Shipping Weight:||1.8 pounds|
Product Look Inside the Book Author Bio Specifications Welcome to the long-awaited update to IBM i Security Administration and Compliance the definitive IBM i security reference. In this Second...
Product Look Inside the Book Author Bio Specifications Mastering IBM i Security provides you with the how-to for using the modern interfaces provided in IBM i 7.5 and recent...
Product Look Inside the Book Author Bio Specifications In this new edition of IBM i Security Administration and Compliance, Carol Woodbury provides readers with everything they need to know...
Product Look Inside the Book Author Bio Specifications In this practical and highly readable guide--a V7 update to her acclaimed IBM i & i5/OS Security & Compliance book--security expert...