April 2003
Intermediate to advanced
398 pages
9h 43m
English

“This is not a bank robbery—I am hacking your web site.”
Jesse James rides into town to rob your bank. He walks in and blows up the safe. In the process the bank is destroyed. Your situation is now very bad: no money, no safe and no bank. Now what do you do?
You, the information technology (IT) manager, may face the same situation, in which the infrastructure is damaged beyond use. Now what do you do? One answer is to scramble and quickly try to repair the damage from the disaster, or try to find another site. Suppose your data center burns to the ground—let’s look at minimum steps needed to get the ...