Backup and recovery:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Beijing [u.a.]
O'Reilly
2007
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Publisher description Inhaltsverzeichnis |
Beschreibung: | XXVIII, 729 S. Ill., graph. Darst. |
ISBN: | 0596102461 9780596102463 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022462689 | ||
003 | DE-604 | ||
005 | 20100811 | ||
007 | t | ||
008 | 070613s2007 cc ad|| |||| 00||| eng d | ||
010 | |a 2007273944 | ||
020 | |a 0596102461 |c pbk. |9 0-596-10246-1 | ||
020 | |a 9780596102463 |9 978-0-596-10246-3 | ||
035 | |a (OCoLC)123539755 | ||
035 | |a (DE-599)DNB 2007273944 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a cc |c CN | ||
049 | |a DE-N2 |a DE-703 |a DE-634 | ||
050 | 0 | |a QA76.9.B32 | |
082 | 0 | |a 005.8/6 |2 22 | |
084 | |a ST 270 |0 (DE-625)143638: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Preston, W. Curtis |e Verfasser |4 aut | |
245 | 1 | 0 | |a Backup and recovery |c W. Curtis Preston |
246 | 1 | 3 | |a Backup & recovery |
250 | |a 1. ed. | ||
264 | 1 | |a Beijing [u.a.] |b O'Reilly |c 2007 | |
300 | |a XXVIII, 729 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Electronic data processing |x Backup processing alternatives | |
650 | 4 | |a Database management | |
650 | 4 | |a Data recovery (Computer science) | |
650 | 4 | |a Data protection | |
650 | 0 | 7 | |a Sicherungskopie |0 (DE-588)4513560-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Wiederherstellung |g Informatik |0 (DE-588)4177289-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Sicherungskopie |0 (DE-588)4513560-5 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Wiederherstellung |g Informatik |0 (DE-588)4177289-1 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0715/2007273944-d.html |3 Publisher description | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015670331&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015670331 |
Datensatz im Suchindex
_version_ | 1804136546619621376 |
---|---|
adam_text | Titel: Backup and recovery
Autor: Preston, W. Curtis
Jahr: 2007
Table of Contents
Preface ................................................................ xv
Part I. Introduction
1. The Philosophy of Backup............................................ 3
Champagne Backup on a Beer Budget 3
Why Should I Read This Book? 4
Why Back Up? 8
Wax On, Wax Off: Finding a Balance 11
2. Backing It All Up................................................... 16
Don t Skip This Chapter! 16
Deciding Why You Are Backing Up 18
Deciding What to Back Up 19
Deciding When to Back Up 27
Deciding How to Back Up 34
Storing Your Backups 43
Testing Your Backups 47
Monitoring Your Backups 48
Following Proper Development Procedures 50
Unrelated Miscellanea 51
Good Luck 55
Part II. Open-Source Backup Utilities
3. Basic Backup and Recovery Utilities..................................59
An Overview 59
Backing Up and Restoring with ntbackup 65
Using System Restore in Windows 67
Backing Up with the dump Utility 70
Restoring with the restore Utility 82
Limitations of dump and restore 91
Features to Check For 92
Backing Up and Restoring with the cpio Utility 93
Backing Up and Restoring with the tar Utility 104
Backing Up and Restoring with the dd Utility 111
Using rsync 114
Backing Up and Restoring with the ditto Utility 118
Comparing tar, cpio, and dump 121
Using ssh or rsh as a Conduit Between Systems 123
4. Amanda.........................................................125
Summary of Important Features 128
Configuring Amanda 139
Backing Up Clients via NFS or Samba 143
Amanda Recovery 145
Community and Support Options 146
Future Plans 147
5. BackupPC........................................................148
BackupPC Features 148
How BackupPC Works 149
Installation How-To 151
Starting BackupPC 156
Per-Client Configuration 157
The BackupPC Community 157
The Future of BackupPC 158
viii | Table of Contents
6. Bacula ..........................................................159
Bacula Architecture 159
Bacula Features 163
An Example Configuration 166
Advanced Features 172
Future Directions 176
7. Open-Source Near-CDP............................................179
rsync with Snapshots 180
rsnapshot 191
rdiff-backup 195
Part III. Commercial Backup
8. Commercial Backup Utilities .......................................203
What to Look For 204
Full Support of Your Platforms 205
Backup of Raw Partitions 206
Backup of Very Large Filesystems and Files 207
Aggressive Requirements 208
Simultaneous Backup of Many Clients to One Drive 218
Disk-to-Disk-to-Tape Backup 219
Simultaneous Backup of One Client to Many Drives 220
Data Requiring Special Treatment 222
Storage Management Features 224
Reduction in Network Traffic 231
Support of a Standard or Custom Backup Format 234
Ease of Administration 237
Security 240
Ease of Recovery 241
Protection of the Backup Index 242
Robustness 244
Automation 245
Volume Verification 246
Cost 247
Vendor 247
Final Thoughts 248
Table of Contents
9. Backup Hardware.................................................249
Decision Factors 249
Using Backup Hardware 258
Tape Drives 261
Optical Drives 273
Automated Backup Hardware 278
Disk Targets 280
Part IV. Bare-Metal Recovery
10. Solaris Bare-Metal Recovery .......................................297
Using Flash Archive 297
Preparing for an Interactive Restore 301
Setup of a Noninteractive Restore 307
Final Thoughts 313
11. Linux and Windows...............................................315
How It Works 316
The Steps in Theory 321
Assumptions 326
Alt-Boot Full Image Method 326
Alt-Boot Partition Image Method 329
Live Method 331
Alt-Boot Filesystem Method 334
Automate Bare-Metal Recovery with G4L 337
Commercial Solutions 339
12. HP-UX Bare-Metal Recovery........................................340
System Recovery with Ignite-UX 340
Planning for Ignite-UX Archive Storage and Recovery 347
Implementation Example 353
System Cloning 360
Security 361
System Recovery and Disk Mirroring 362
13. AIX Bare-Metal Recovery ..........................................363
IBM s mksysb and savevg Utilities 363
Backing Up with mksysb 368
Table of Contents
Setting Up NIM 374
savevg Operations 376
Verifying a mksysb or savevg Backup 376
Restoring an AIX System with mksysb .377
System Cloning 378
14. Mac OS X Bare-Metal Recovery .....................................380
How It Works 380
A Sample Bare-Metal Recovery 382
Part V. Database Backup
15. Backing Up Databases.............................................391
Can It Be Done? 392
Confusion: The Mysteries of Database Architecture 393
The Muck Stops Here: Databases in Plain English 393
What s the Big Deal? 394
Database Structure 395
An Overview of a Page Change 407
ACID Compliance 409
What Can Happen to an RDBMS? 409
Backing Up an RDBMS 410
Restoring an RDBMS 417
Documentation and Testing 420
Unique Database Requirements 421
16. Oracle Backup and Recovery .......................................422
Two Backup Methods 422
Oracle Architecture 424
Physical Backups Without rman 436
Physical Backups with rman 443
Flashback 449
Managing the Archived Redo Logs 450
Recovering Oracle 451
Logical Backups 486
A Broken Record 488
Table of Contents
17. Sybase Backup and Recovery....................................... 489
Sybase Architecture 490
The Power User s View 493
The DBA s View 496
Protecting Your Database 503
Backup Automation Through Scripting 510
Physical Backups with a Storage Manager 515
Recovering Your Database 516
Common Sybase Procedures 518
Sybase Recovery Procedure 523
18. IBM DB2BackupandRecovery ..................................... 531
DB2 Architecture 532
The backup, restore, rollforward, and recover Commands 541
Recovering Your Database 553
19. SQL Server....................................................... 562
Overview of SQL Server 563
The Power User s View 564
The DBA s View 568
Backups 573
Logical (Table-Level) Backups 586
Restore and Recovery 586
20. Exchange........................................................ 594
Exchange Architecture 594
Storage Groups 597
Backup 602
Using ntbackup to Back Up 608
Restore 613
Excha nge Restore 616
21. Postg reSQL ...................................................... 628
PostgreSQL Architecture 628
Backu p and Recovery 632
Point- in-Time Recovery 636
xii | Table of Contents
22. MySQL ..........................................................640
MySQL Architecture 641
MySQL Backup and Recovery Methodologies 646
Part VI. Potpourri
23. VMware and Miscellanea ..........................................659
Backing Up VMware Servers 659
Volatile Filesystems 664
Demystifying dump 668
How Do I Read This Volume? 676
Gigabit Ethernet 685
Disk Recovery Companies 686
Yesterday 686
Trust Me About the Backups 687
24. It s All About Data Protection.......................................689
Business Reasons for Data Protection 690
Technical Reasons for Data Protection 693
Backup and Archive 696
What Needs to Be Backed Up? 698
What Needs to Be Archived? 698
Examples of Backup and Archive 700
Can Open-Source Backup Do the Job? 701
Disaster Recovery 704
Everything Starts with the Business 705
Storage Security 711
Conclusion 713
Index.................................................................715
Table of Contents
|
adam_txt |
Titel: Backup and recovery
Autor: Preston, W. Curtis
Jahr: 2007
Table of Contents
Preface . xv
Part I. Introduction
1. The Philosophy of Backup. 3
Champagne Backup on a Beer Budget 3
Why Should I Read This Book? 4
Why Back Up? 8
Wax On, Wax Off: Finding a Balance 11
2. Backing It All Up. 16
Don't Skip This Chapter! 16
Deciding Why You Are Backing Up 18
Deciding What to Back Up 19
Deciding When to Back Up 27
Deciding How to Back Up 34
Storing Your Backups 43
Testing Your Backups 47
Monitoring Your Backups 48
Following Proper Development Procedures 50
Unrelated Miscellanea 51
Good Luck 55
Part II. Open-Source Backup Utilities
3. Basic Backup and Recovery Utilities.59
An Overview 59
Backing Up and Restoring with ntbackup 65
Using System Restore in Windows 67
Backing Up with the dump Utility 70
Restoring with the restore Utility 82
Limitations of dump and restore 91
Features to Check For 92
Backing Up and Restoring with the cpio Utility 93
Backing Up and Restoring with the tar Utility 104
Backing Up and Restoring with the dd Utility 111
Using rsync 114
Backing Up and Restoring with the ditto Utility 118
Comparing tar, cpio, and dump 121
Using ssh or rsh as a Conduit Between Systems 123
4. Amanda.125
Summary of Important Features 128
Configuring Amanda 139
Backing Up Clients via NFS or Samba 143
Amanda Recovery 145
Community and Support Options 146
Future Plans 147
5. BackupPC.148
BackupPC Features 148
How BackupPC Works 149
Installation How-To 151
Starting BackupPC 156
Per-Client Configuration 157
The BackupPC Community 157
The Future of BackupPC 158
viii | Table of Contents
6. Bacula .159
Bacula Architecture 159
Bacula Features 163
An Example Configuration 166
Advanced Features 172
Future Directions 176
7. Open-Source Near-CDP.179
rsync with Snapshots 180
rsnapshot 191
rdiff-backup 195
Part III. Commercial Backup
8. Commercial Backup Utilities .203
What to Look For 204
Full Support of Your Platforms 205
Backup of Raw Partitions 206
Backup of Very Large Filesystems and Files 207
Aggressive Requirements 208
Simultaneous Backup of Many Clients to One Drive 218
Disk-to-Disk-to-Tape Backup 219
Simultaneous Backup of One Client to Many Drives 220
Data Requiring Special Treatment 222
Storage Management Features 224
Reduction in Network Traffic 231
Support of a Standard or Custom Backup Format 234
Ease of Administration 237
Security 240
Ease of Recovery 241
Protection of the Backup Index 242
Robustness 244
Automation 245
Volume Verification 246
Cost 247
Vendor 247
Final Thoughts 248
Table of Contents
9. Backup Hardware.249
Decision Factors 249
Using Backup Hardware 258
Tape Drives 261
Optical Drives 273
Automated Backup Hardware 278
Disk Targets 280
Part IV. Bare-Metal Recovery
10. Solaris Bare-Metal Recovery .297
Using Flash Archive 297
Preparing for an Interactive Restore 301
Setup of a Noninteractive Restore 307
Final Thoughts 313
11. Linux and Windows.315
How It Works 316
The Steps in Theory 321
Assumptions 326
Alt-Boot Full Image Method 326
Alt-Boot Partition Image Method 329
Live Method 331
Alt-Boot Filesystem Method 334
Automate Bare-Metal Recovery with G4L 337
Commercial Solutions 339
12. HP-UX Bare-Metal Recovery.340
System Recovery with Ignite-UX 340
Planning for Ignite-UX Archive Storage and Recovery 347
Implementation Example 353
System Cloning 360
Security 361
System Recovery and Disk Mirroring 362
13. AIX Bare-Metal Recovery .363
IBM's mksysb and savevg Utilities 363
Backing Up with mksysb 368
Table of Contents
Setting Up NIM 374
savevg Operations 376
Verifying a mksysb or savevg Backup 376
Restoring an AIX System with mksysb .377
System Cloning 378
14. Mac OS X Bare-Metal Recovery .380
How It Works 380
A Sample Bare-Metal Recovery 382
Part V. Database Backup
15. Backing Up Databases.391
Can It Be Done? 392
Confusion: The Mysteries of Database Architecture 393
The Muck Stops Here: Databases in Plain English 393
What's the Big Deal? 394
Database Structure 395
An Overview of a Page Change 407
ACID Compliance 409
What Can Happen to an RDBMS? 409
Backing Up an RDBMS 410
Restoring an RDBMS 417
Documentation and Testing 420
Unique Database Requirements 421
16. Oracle Backup and Recovery .422
Two Backup Methods 422
Oracle Architecture 424
Physical Backups Without rman 436
Physical Backups with rman 443
Flashback 449
Managing the Archived Redo Logs 450
Recovering Oracle 451
Logical Backups 486
A Broken Record 488
Table of Contents
17. Sybase Backup and Recovery. 489
Sybase Architecture 490
The Power User's View 493
The DBA's View 496
Protecting Your Database 503
Backup Automation Through Scripting 510
Physical Backups with a Storage Manager 515
Recovering Your Database 516
Common Sybase Procedures 518
Sybase Recovery Procedure 523
18. IBM DB2BackupandRecovery . 531
DB2 Architecture 532
The backup, restore, rollforward, and recover Commands 541
Recovering Your Database 553
19. SQL Server. 562
Overview of SQL Server 563
The Power User's View 564
The DBA's View 568
Backups 573
Logical (Table-Level) Backups 586
Restore and Recovery 586
20. Exchange. 594
Exchange Architecture 594
Storage Groups 597
Backup 602
Using ntbackup to Back Up 608
Restore 613
Excha nge Restore 616
21. Postg reSQL . 628
PostgreSQL Architecture 628
Backu p and Recovery 632
Point- in-Time Recovery 636
xii | Table of Contents
22. MySQL .640
MySQL Architecture 641
MySQL Backup and Recovery Methodologies 646
Part VI. Potpourri
23. VMware and Miscellanea .659
Backing Up VMware Servers 659
Volatile Filesystems 664
Demystifying dump 668
How Do I Read This Volume? 676
Gigabit Ethernet 685
Disk Recovery Companies 686
Yesterday 686
Trust Me About the Backups 687
24. It's All About Data Protection.689
Business Reasons for Data Protection 690
Technical Reasons for Data Protection 693
Backup and Archive 696
What Needs to Be Backed Up? 698
What Needs to Be Archived? 698
Examples of Backup and Archive 700
Can Open-Source Backup Do the Job? 701
Disaster Recovery 704
Everything Starts with the Business 705
Storage Security 711
Conclusion 713
Index.715
Table of Contents |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Preston, W. Curtis |
author_facet | Preston, W. Curtis |
author_role | aut |
author_sort | Preston, W. Curtis |
author_variant | w c p wc wcp |
building | Verbundindex |
bvnumber | BV022462689 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.B32 |
callnumber-search | QA76.9.B32 |
callnumber-sort | QA 276.9 B32 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 270 ST 276 |
ctrlnum | (OCoLC)123539755 (DE-599)DNB 2007273944 |
dewey-full | 005.8/6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/6 |
dewey-search | 005.8/6 |
dewey-sort | 15.8 16 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01915nam a2200517zc 4500</leader><controlfield tag="001">BV022462689</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100811 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070613s2007 cc ad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007273944</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596102461</subfield><subfield code="c">pbk.</subfield><subfield code="9">0-596-10246-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596102463</subfield><subfield code="9">978-0-596-10246-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)123539755</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB 2007273944</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">cc</subfield><subfield code="c">CN</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-N2</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.B32</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/6</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 270</subfield><subfield code="0">(DE-625)143638:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Preston, W. Curtis</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Backup and recovery</subfield><subfield code="c">W. Curtis Preston</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Backup & recovery</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing [u.a.]</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVIII, 729 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing</subfield><subfield code="x">Backup processing alternatives</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data recovery (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherungskopie</subfield><subfield code="0">(DE-588)4513560-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wiederherstellung</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4177289-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherungskopie</subfield><subfield code="0">(DE-588)4513560-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Wiederherstellung</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4177289-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0715/2007273944-d.html</subfield><subfield code="3">Publisher description</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015670331&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015670331</subfield></datafield></record></collection> |
id | DE-604.BV022462689 |
illustrated | Illustrated |
index_date | 2024-07-02T17:41:04Z |
indexdate | 2024-07-09T20:58:07Z |
institution | BVB |
isbn | 0596102461 9780596102463 |
language | English |
lccn | 2007273944 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015670331 |
oclc_num | 123539755 |
open_access_boolean | |
owner | DE-N2 DE-703 DE-634 |
owner_facet | DE-N2 DE-703 DE-634 |
physical | XXVIII, 729 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | O'Reilly |
record_format | marc |
spelling | Preston, W. Curtis Verfasser aut Backup and recovery W. Curtis Preston Backup & recovery 1. ed. Beijing [u.a.] O'Reilly 2007 XXVIII, 729 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Datenverarbeitung Electronic data processing Backup processing alternatives Database management Data recovery (Computer science) Data protection Sicherungskopie (DE-588)4513560-5 gnd rswk-swf Wiederherstellung Informatik (DE-588)4177289-1 gnd rswk-swf Sicherungskopie (DE-588)4513560-5 s DE-604 Wiederherstellung Informatik (DE-588)4177289-1 s http://www.loc.gov/catdir/enhancements/fy0715/2007273944-d.html Publisher description HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015670331&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Preston, W. Curtis Backup and recovery Datenverarbeitung Electronic data processing Backup processing alternatives Database management Data recovery (Computer science) Data protection Sicherungskopie (DE-588)4513560-5 gnd Wiederherstellung Informatik (DE-588)4177289-1 gnd |
subject_GND | (DE-588)4513560-5 (DE-588)4177289-1 |
title | Backup and recovery |
title_alt | Backup & recovery |
title_auth | Backup and recovery |
title_exact_search | Backup and recovery |
title_exact_search_txtP | Backup and recovery |
title_full | Backup and recovery W. Curtis Preston |
title_fullStr | Backup and recovery W. Curtis Preston |
title_full_unstemmed | Backup and recovery W. Curtis Preston |
title_short | Backup and recovery |
title_sort | backup and recovery |
topic | Datenverarbeitung Electronic data processing Backup processing alternatives Database management Data recovery (Computer science) Data protection Sicherungskopie (DE-588)4513560-5 gnd Wiederherstellung Informatik (DE-588)4177289-1 gnd |
topic_facet | Datenverarbeitung Electronic data processing Backup processing alternatives Database management Data recovery (Computer science) Data protection Sicherungskopie Wiederherstellung Informatik |
url | http://www.loc.gov/catdir/enhancements/fy0715/2007273944-d.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015670331&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT prestonwcurtis backupandrecovery AT prestonwcurtis backuprecovery |