Digital data integrity: the evolution from passive protection to active management
Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Little, David B. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Chichester John Wiley & Sons c2007
Schlagworte:
Online-Zugang:FAW01
FAW02
Volltext
Beschreibung:Includes index
Cover -- Digital Data Integrity -- TOC36;Contents -- Acknowledgements -- Introduction -- CH36;146; An Introduction to Data Protection Today -- 146;1 Introduction -- 146;2 Traditional Backup and Recovery -- 146;3 Hierarchical Storage Migration 40;HSM41; -- 146;4 Disaster Recovery -- 146;5 Vaulting -- 146;546;1 Offsiting Original Backup -- 146;546;2 Create Multiple Copies of the Backup -- 146;546;3 Duplicate the Original Backup -- 146;6 Encryption -- 146;646;1 Client Side Encryption -- 146;646;2 Media Server Encryption -- 146;646;3 Encryption Appliance -- 146;7 Management and Reporting -- 146;746;1 Service Level Management -- 146;8 Summary -- CH36;246; The Evolution -- 246;1 Introduction -- 246;2 Storage Virtualization -- 246;246;1 Why Storage Virtualization63; -- 246;3 RAID -- 246;346;1 So What Does This Really Mean63; -- 246;4 RAID Levels -- 246;5 What Mirroring and RAID Do Not Do -- 246;546;1 Which RAID Should I Use When63; -- 246;6 Replication --
- 246;646;1 Host45;Based Replication -- 246;646;2 RAID System Replication -- 246;7 Standby or DR Site -- 246;8 Summary -- CH36;346; Backup Integration -- 346;1 Introduction -- 346;2 Snapshots -- 346;246;1 Mirror -- 346;246;2 COW Snapshot -- 346;246;3 Replication -- 346;246;4 Applications -- 346;246;5 Summary -- CH36;446; Bare Metal Restore -- 446;1 Introduction -- 446;2 Background -- 446;246;1 Why BMR63; -- 446;246;2 Why Has This Taken So Long63; -- 446;3 The Evolution of BMR Capabilities -- 446;346;1 The Manual Reinstall45;and45;Restore Method -- 446;346;2 Operating System Provided Recovery Solutions -- 446;346;3 Hybrid or Home45;Grown Recovery Solutions -- 446;4 Filling the Gap 8211; Integrated BMR -- 446;446;1 The Bar Rises -- 446;5 The Problem of Dissimilar Disk Recovery -- 446;546;1 Approach 158; Changing the Disk and Volume Configuration Information -- 446;546;2 Approach 258; Adjusting the Volumes and File Systems During Recovery -- 446;6 The Problem of Automating Disk Mapping --
- 446;7 The Problem of Dissimilar System Recovery -- 446;746;1 Windows Dissimilar System Restore Issues -- 446;746;2 UNIX Dissimilar System Restore Issues -- 446;8 The Current State of Integrated BMR -- 446;9 The Future of BMR -- 446;946;1 Enterprise Data Protection Server Self45;Restore -- 446;946;2 Automated Dissimilar Disk Restore -- 446;946;3 Automated Dissimilar System Recovery -- 446;946;4 Network Integration -- 446;10 New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery -- 446;1046;1 Continuous Data Protection 40;CDP41; -- 446;1046;2 Single Instance Store 40;SIS41; -- 446;1046;3 Storage Area Network 40;SAN41; -- 446;11 Large45;Scale Automated Bare Metal Recovery -- 446;12 Summary -- CH36;546; Management -- 546;1 Introduction -- 546;2 Protecting Data Throughout Its Life Cycle -- 546;3 Architecting for Efficient Management -- 546;4 Reporting -- 546;446;1 Backup Operations Reporting -- 546;446;2 Alerting and Notification --
- 546;446;3 Backup Reporting to Business Units -- 546;5 Business Unit Chargeback -- 546;546;1 Backup Service P.
Beschreibung:1 Online-Ressource (xvi, 240 p.)
ISBN:0470018275
0470035188
0470035196
9780470018279
9780470035184
9780470035191

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand! Volltext öffnen