005 |
|
19990417172513.0 |
010 |
|
|a 96050424
|
020 |
|
|a1566079861 (pbk.) :|cNT|9458
|
035 |
|
|a96050424
|
040 |
|
|aTWNTU|cTWNTU|dTWNTU
|
041 |
|
|aeng
|
044 |
|
|aus
|
050 |
00
|
|aQA76.9.A25|bB333 1997
|
082 |
00
|
|a658.4/78|221
|
092 |
|
|a658.478/B985/1998///////E020486
|
095 |
|
|aNTTTCL|bG|cE020486|d658.478|eB985|pBOOK|y1998|fSYNSIA|zBOOK|m0|tDDC
|
100 |
1
|
|aButler, Janet G.
|
245 |
10
|
|aContingency planning and disaster recovery :|bprotecting your organization's resources /|cJanet G. Butler.
|
250 |
|
|a2nd ed.
|
260 |
|
|aCharleston, S.C. :|bComputer Technology Research,|cc1998.
|
300 |
|
|avi, 229 p. :|bill. ;|c28 cm.
|
650 |
0
|
|aComputer security.
|
650 |
0
|
|aData protection.
|
650 |
0
|
|aData recovery (Computer science)
|
650 |
0
|
|aElectronic data processing|xDistributed processing|xSecurity measures.
|
809 |
|
|d658.478|eB985|y1998|tDDC|pBOOK
|
939 |
|
|aE3645-2
|