[1] Petroski H. Technology and architecture in an age of terrorism[J].Technology in Society.2004, 26(2-3):161-167 [2] Anon. Blackouts. Threat of terrorism spur disaster recovery planning[J]. International Journal of Micrographics and Optical Technology, 2003, 21(4-5): 2-2. [3] Wang K, Su R D, and Li Z X, et al.. Robust disaster recovery system model[J].Wuhan University Journal of Natural Sciences.2006, 11(1):170-174 [4] Chow W S. Success factors for IS disaster recovery planning in Hong Kong[J].Information Management and Computer Security.2000, 8(2):80-86 [5] Smith D R, Cybrowski W J, and Zawislan F, et al.. Contingency/disaster recovery planning for transmission systems of the defense information system networks[J].IEEE Journal on Selected Areas in Communications.1994, 12(1):13-22 [6] Hayes P E and Hammons A. Disaster recovery project management[C]. Proceedings of IEEE 47th Petroleum and Chemical Industry Conference, San Antonio, TX, USA, 2000: 55-63. [7] Lam W. Ensuring business continuity[J]. IT Professional, 2002, 4(3): 19-25. [8] Uddin N and Engi D. Disaster management system for southwestern Indiana[J].Natural Hazards Review.2002, 3(1):19-30 [9] Fallara P. Disaster recovery planning[J]. IEEE Potentials, 2004, 22(5): 42-44. [10] Hawkins S M, Yen D C, and Chou D C. Disaster recovery planning: A strategy for data security[J].Information Management and Computer Security.2000, 8(5):222-229 [11] Corley J and Lejerskar D. Homeland defense center network-capitalizing on simulation modeling and visualization for emergency preparedness response and mitigation[C]. Proceedings of the 2003 Winter Simulation Conference: Driving Innovation, Piscataway, NJ, USA, 2003: 1061-1067.
|