The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup and recovery, and explores such additional considerations as legal, privacy, and ethical issues
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup and recovery, and explores such additional considerations as legal, privacy, and ethical issuesHinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Preston de Guise has been working with data recovery products for his entire career - designing, implementing and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too.
Inhaltsangabe
1 Introduction 2 Contextualizing Data Protection 3 Data Lifecycle 4 Elements of a Protection System 5 IT Governance and Data Protection 6 Monitoring and Reporting 7 Business Continuity 8 Data Discovery 9 Security, Privacy, Ethical, and Legal Considerations 10 Continuous Availability, Replication, and CDP 11 Snapshots 12 Backup and Recovery 13 Deduplication 14 The Cloud 15 Protecting Virtual Infrastructure 16 Big Data 17 Protecting the Edge 18 Data Storage Fault Tolerance 19 Tape 20 Converged Infrastructure 21 Data Protection Service Catalogs 22 Holistic Data Protection Strategies 23 Making Data Protection Smarter 24 Data Recovery 25 Long-Term Retention Considerations 26 Choosing Protection Infrastructure 27 The Impact of Flash on Data Protection 28 In Closing
1 Introduction 2 Contextualizing Data Protection 3 Data Lifecycle 4 Elements of a Protection System 5 IT Governance and Data Protection 6 Monitoring and Reporting 7 Business Continuity 8 Data Discovery 9 Security, Privacy, Ethical, and Legal Considerations 10 Continuous Availability, Replication, and CDP 11 Snapshots 12 Backup and Recovery 13 Deduplication 14 The Cloud 15 Protecting Virtual Infrastructure 16 Big Data 17 Protecting the Edge 18 Data Storage Fault Tolerance 19 Tape 20 Converged Infrastructure 21 Data Protection Service Catalogs 22 Holistic Data Protection Strategies 23 Making Data Protection Smarter 24 Data Recovery 25 Long-Term Retention Considerations 26 Choosing Protection Infrastructure 27 The Impact of Flash on Data Protection 28 In Closing
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826