Data protection : ensuring data availability / Preston de Guise.
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9781482244151
- 1482244152
- Ensuring data availability
- QA76.9.A25 D43 2017
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 D43 2017 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30020000037750 | ||
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 D43 2017 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30020000037854 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
QA76.9.A25 D35 1997 Managing information system security / | QA76.9.A25 D37 2021 Practical AI for cybersecurity / | QA76.9.A25 D43 2017 Data protection : ensuring data availability / | QA76.9.A25 D43 2017 Data protection : ensuring data availability / | QA76.9 A25 D59 1999 Information system management / | QA76.9.A25 D67 1998 Managing information security : achieving BS7799 | QA76.9.A25 D78 2010 Epidemics and rumours in complex networks / |
"An Auerbach book"--Title page.
Includes bibliographical references and index.
Contextualizing data protection -- Data life cycle -- Elements of a protection system -- IT governance and data protection -- Monitoring and reporting -- Business continuity -- Data discovery -- Continuous availability and replication -- Snapshots -- Backup and recovery -- The Cloud -- Deduplication -- Protecting virtual infrastructure -- Big data -- Data storage protection -- Tape -- Converged infrastructure -- Data protection service catalogs -- Holistic data protection strategies -- Data recovery -- Choosing protection infrastructure -- The impact of Flash on data protection -- In closing.
"This is the fundamental truth about data protection: backup is dead. Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a stand-alone topic, it's been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization. So what is data protection? This book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology and activities that allow for data continuity. It shows how truly effective data protection comes from a holistic approach considering the entire data lifecycle and all required SLAs. Data protection is neither RAID nor is it continuous availability, replication, snapshots or backups--it is all of them, combined in a considered and measured approach to suit the criticality of the data and meet all the requirements of the business"-- Back cover.