Entry Landry:2006:DCD from jeric.bib
Last update: Sun Oct 15 02:29:09 MDT 2017
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
Y |
Z
BibTeX entry
@Article{Landry:2006:DCD,
author = "Brett J. L. Landry and M. Scott Koger",
title = "Dispelling 10 common disaster recovery myths:
{Lessons} learned from {Hurricane Katrina} and other
disasters",
journal = j-JERIC,
volume = "6",
number = "4",
pages = "6:1--6:??",
month = dec,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1145/1248453.1248459",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:35 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Disasters happen all the time; yet despite this, many
organizations are caught unprepared or make unrealistic
assumptions. These factors create environments that
will fail during a disaster. Most information
technology (IT) curricula do not cover disaster
recovery (DR) plans and strategies in depth. The
unfortunate result is that most new computer systems
are implemented without sufficient disaster recovery
plans and testing. Courses on network security need to
examine DR as a real threat and cover it as a core
module. By dispelling the 10 common myths,
organizations can better plan, develop, and test true
DR plans.",
acknowledgement = ack-nhfb,
articleno = "6",
keywords = "backups; business continuity; disaster recovery;
hardware failures; IT curricula; network attacks;
software failures; viruses; worms",
}
Related entries
- all,
5(4)1
- attack,
6(4)5
- better,
6(2)1,
7(4)5,
8(3)7,
8(4)12
- common,
5(4)1,
7(1)2,
7(4)2
- computer, 1-2es-z-z,
1(4)18,
1(4)31,
1(4)46,
1(4)60,
1(4)81,
2(1)1,
2(1)17,
2(1)131,
2(4)1,
3(2)1,
3(2)1,
3(3)1,
4(1)1,
4(1)1-1,
4(2)3,
4(2)4,
5(2)1,
5(4)1,
5(4)2,
5(4)3,
6(2)2,
6(3)1,
6(3)3,
6(3)4,
6(3)5,
6(3)6,
6(4)1,
6(4)2,
6(4)3,
6(4)4,
6(4)5,
7(2)1,
7(2)2,
7(4)2,
7(4)4,
7(4)5,
7(4)6,
8(1)2,
8(1)3,
8(2)5,
8(2)6,
8(3)7,
8(3)8,
8(4)11
- course, 1-1es-z-z-2,
2(4)1,
4(1)1,
4(3)1-1,
5(4)1,
5(4)2,
5(4)3,
6(1)2,
6(2)1,
6(2)2,
6(3)1,
6(3)4,
6(3)5,
6(3)6,
6(4)3,
6(4)4,
6(4)5,
7(3)1,
7(4)3,
7(4)4,
7(4)6,
8(1)3,
8(3)8,
8(3)9
- cover,
5(4)2,
6(2)2,
8(1)3
- create,
7(1)2
- curricula, 1-3es-z-z,
5(4)2,
8(1)3,
8(2)6
- despite,
8(4)12
- develop,
6(3)5,
7(1)3,
7(4)1,
8(1)3,
8(4)12
- disaster,
6(4)1
- during,
7(4)3,
8(1)3
- environments, 1-2es-z-z-3,
6(2)1,
7(1)2,
8(1)3
- examine,
5(4)3,
8(3)7,
8(4)11
- hardware,
6(2)2
- implemented,
5(4)2,
8(1)2
- information, 1-2es-z-z-3,
3(3)1,
6(1)2,
6(1)3,
6(3)1,
6(3)2,
6(3)3,
6(3)5,
6(4)1,
6(4)2,
6(4)4,
7(1)3,
8(1)3,
8(2)6
- learned,
4(3)1-1,
6(4)1,
8(1)2,
8(3)9
- lessons,
4(3)1-1,
6(4)1
- make,
2(1)17,
6(2)1,
8(3)9
- many,
5(4)1,
6(3)4,
6(3)6,
7(4)3,
7(4)5
- most,
5(4)2,
6(1)3,
7(1)2,
7(4)2,
8(4)10
- need,
5(4)1,
6(1)1,
6(2)1,
6(3)3,
7(4)6,
8(4)12
- network,
4(3)1,
5(1)1,
6(2)1,
6(4)1,
6(4)2,
6(4)4,
6(4)5
- new,
6(1)1,
6(2)2,
6(3)2,
7(1)1,
7(4)3,
8(1)1
- not,
5(4)1,
5(4)2,
7(1)2,
7(3)2,
7(4)3,
7(4)6
- organization,
1(4)46,
2(1)17,
6(2)2,
6(3)2,
8(3)8
- other,
6(3)3,
6(3)4,
6(4)1,
7(1)1,
7(1)2,
7(4)3,
7(4)4,
7(4)5
- real,
6(3)2,
7(4)6,
8(3)7,
8(3)9
- recovery,
6(4)1
- result,
5(4)1,
5(4)2,
6(1)2,
6(2)1,
6(4)5,
7(1)2,
7(4)3,
8(1)2,
8(1)3,
8(3)8
- security,
6(3)1,
6(3)2,
6(3)3,
6(3)4,
6(3)5,
6(4)1,
6(4)2,
6(4)3,
6(4)4,
6(4)5,
7(3)2,
8(1)3
- software,
2(4)1,
2(4)1,
4(1)1,
5(2)1,
5(4)1,
6(1)1,
6(2)2,
7(1)2,
7(4)4,
7(4)5,
8(1)2,
8(2)6
- strategy,
8(4)11
- system, 1-1es-z-z, 1-1es-z-z-2, 1-1es-z-z-6, 1-1es-z-z-7,
2(1)5,
2(4)1,
3(3)1,
4(4)1,
5(3)z-4,
6(1)2,
6(1)3,
6(2)2,
6(3)6,
6(4)2,
6(4)5,
7(1)2,
7(1)3,
8(1)3,
8(2)6,
8(4)12
- technology,
5(4)3,
7(2)1,
7(3)2,
8(3)9
- test,
3(3)1,
6(4)5,
8(2)6
- threat,
6(4)1,
6(4)5
- time,
5(4)2,
7(2)1
- will,
6(4)3,
7(1)1,
7(3)2
- yet,
8(4)12