... 4335.book Page 465 Wednesday, June 9, 2004 7:01 PM In the early days of computer security, information security profes-sionals were pretty much left on their own to defend their systems against ... 4th set is used for every 16th backup, starting on Day 8 (i.e., Days 8, 24, 40, etc.). The final set is used for every 16th backup, starting on Day 16 (i.e., Days 16, 32, 48, etc.).The most ... prioritization.4335.book Page 466 Wednesday, June 9, 2004 7:01 PM 484 Chapter 16 Disaster Recovery Planning Hardware/Software Failures Like it or not, computer systems fail. Hardware components...