Data protection: ensuring data availability
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
[2017]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xxi, 400 Seiten Illustrationen, Diagramme |
ISBN: | 9781482244151 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044509157 | ||
003 | DE-604 | ||
005 | 20180612 | ||
007 | t | ||
008 | 170921s2017 a||| |||| 00||| eng d | ||
020 | |a 9781482244151 |c pbk |9 978-1-4822-4415-1 | ||
035 | |a (OCoLC)989168779 | ||
035 | |a (DE-599)BVBBV044509157 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-11 |a DE-M382 |a DE-739 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a De Guise, Preston |e Verfasser |4 aut | |
245 | 1 | 0 | |a Data protection |b ensuring data availability |c Preston de Guise |
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a xxi, 400 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-351-68951-9 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029908989&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029908989 |
Datensatz im Suchindex
_version_ | 1804177844933230592 |
---|---|
adam_text | Contents
Preface.................................................................. xvii
Acknowledgments...........................................................xix
Author................................................................... xxi
Chapter 1 Introduction.........................................1
1.1 The Lay of the Land..................................... 2
1.2 What Are You Doing Here?..................................2
1.3 What s Changed in the Datacenter?.........................3
1A What Is Data Protection?..................................4
1.5 Key Challenges............................................5
1.5.1 Rise of Unstructured Data..........................5
1.5.2 Big Data....................................... 7
1.5.3 Cloud..............................................7
1.5.4 Virtualization................................... 8
1.5.5 The Law........................................ 8
1.5.6 Crime.......................................... 9
1.6 A Brief History of Data Protection........................9
1.7 The Miserly Hoarder......................................14
Chapter 2 Contextualizing Data Protection............................ 17
2.1 Introduction.............................................17
2.2 Data Classification......................................18
2.2.1 What Is the Data?............................... 19
2.2.2 Where Is the Data?.............................. 21
2.2.3 Who Uses the Data?................................22
2.2.4 When Is the Data Used?.......................... 22
2.2.5 How Is the Data Used?.............................23
2.3 Protection Methodology...................................24
2.4 Protection versus Regeneration......................... 24
2.5 Organizational Change.................................. 25
2.6 Summary..................................................26
Chapter 3 Data Life Cycle......................................27
3.1 Introduction.............................................27
3.2 Archiving and Deleting............................... 29
3.3 Summary............................................. 37
VII
Contents
viii
Chapter 4 Elements of a Protection System..................................39
4.1 Introduction............................................39
4.2 People...................................................39
4.2.1 Designers........................................40
4.2.2 Operators.........................................40
4.2.3 End Users....................................... 41
4.2.4 Data Protection Team............................ 42
4.3 Training................................................42
4.4 Documentation and Processes.......................... 43
4.4.1 Design...........................................44
4.4.2 Implementation................................ 45
4.4.2.1 System Configuration Guide...............45
4.4.2.2 System Map............................. 46
4.5 Testing............................................. 50
4.5.1 Type Testing................................ 50
4.5.2 Informal versus Formal.......................... 52
4.5.2.1 Test Procedure......................... 53
4.5.2.2 Test Register............................53
4.5.2.3 Test Schedule........................... 53
4.5.3 Performance Testing............................. 54
4.5.4 Test Risks .....................................57
4.5.5 What Is a Test?............................... 58
4.6 Service Level Agreements.................................58
4.7 Technology............................................. 59
4.8 Summary................................................ 60
Chapter 5 IT Governance and Data Protection................................61
5.1 Introduction........................................... 61
5.2 Architecture............................................ 61
5.2.1 Integrity..................................... 62
5.2.2 Reliability.................................... 63
5.2.3 Recoverability.................................. 64
5.2.4 Data Protection Advocate...................... 64
5.3 Service Transition..................................... 66
5.4 Change Management...................................... 69
5.5 Summary..................................................70
Chapter 6 Monitoring and Reporting.........................................71
6.1 Overview.................................................71
6.2 Monitoring............................................. 73
6.2.1 Health............................................74
6.2.1.1 Drive Failures and Recovery Time.........74
6.2.1.2 Broader Uses of MTBF and MTTR............75
Contents ix
6.2.2 Capacity.........................................75
6.2.2.1 RAID/Data Storage......................75
6.2.2.2 Snapshots............................ 77
6.2.2.3 Replication............................77
6.2.2.4 Backup and Recovery....................78
6.2.3 Performance.................................... 80
6.3 Reporting...............................................80
6.3.1 Reporting as Monitoring Aggregation..............80
6.3.2 Reporting for Trending and Predictive Planning...81
6.3.3 Automated Reporting............................ 85
6.4 Monitoring and Reporting SLA Compliance............... 85
6.5 Summary........................................... 86
Chapter 7 Business Continuity.......................................... 87
7.1 Introduction...................................... 87
7.2 Business versus IT Functions............... ............87
7.3 Risk versus Cost........................................88
7.4 Planning Data Protection Strategies and Service Level
Objectives..............................................90
7.5 Summary.................................................94
Chapter 8 Data Discovery............................................... 95
8.1 Introduction .......................................... 95
8.2 What Will Be Protected?.................................96
8.3 Shades of Data..........................................98
8.4 Indexing................................................99
8.5 Closing Remarks...................................... 100
Chapter 9 Continuous Availability and Replication.......................101
9.1 Introduction...........................................101
9.1.1 What’s a Few Nines between Friends?.............101
9.1.2 Data Protection and Availability................103
9.2 Continuous Availability................................104
9.2.1 Clustering......................................104
9.2.2 Continuous Availability as a Virtualization
Function...................................... 105
9.2.3 Continuous Availability as a Storage Function...107
9.2.4 A Combined Approach to Continuous Availability.... 108
9.3 Replication...................................... 109
9.3.1 Synchronous Replication....................... 112
9.3.2 Asynchronous Replication........................113
9.4 Summary.............................................. 116
X
Contents
Chapter 10 Snapshots........................................................117
10.1 Introduction........................................... 117
10.2 Snapshot Techniques...................................... 117
10.2.1 Copy on First Write............................... 117
10.2.2 Copy on First Access..............................120
10.2.3 Redirect on Write.................................122
10.3 Crash-Consistent versus Application-Consistent Snapshots.... 124
10.4 Read-Only versus Read/Write Snapshots.....................126
10.5 Integration Points in Data Protection.....................127
10.6 Summary............................................. 131
Chapter 11 Backup and Recovery...............................................133
11.1 Introduction........................................ 133
11.2 Backup and Recovery Concepts............................. 134
11.2.1 Host Nomenclature.................................134
11.2.2 Backup Topology....................................135
11.2.2.1 Decentralized Topology...................135
11.2.2.2 Centralized Topology.....................136
11.2.2.3 Hybrid Topology......................... 137
11.2.3 Backup Levels......................................139
11.2.3.1 Full Backups.............................139
11.2.3.2 Incremental-Level Backups.............. 140
11.2.3.3 Differential-Level Backups...............142
11.2.3.4 Synthetic Full Backups...................147
11.2.3.5 Virtual Synthetic Fulls..................148
11.2.3.6 Manual Backups...........................149
11.2.3.7 Skipping Backups.........................149
11.2.3.8 Full Once, Incrementáis Forever..........150
11.2.4 Data Availability..................................152
11.2.4.1 Offline Backups........................ 152
11.2.4.2 Online Backups...........................153
11.2.4.3 Snapshot Backups.........................154
11.2.5 Data Selection Types...............................155
11.2.5.1 Inclusive Backups...................... 155
11.2.5.2 Exclusive Backups........................158
11.2.6 Backup Retention Strategies........................159
11.2.6.1 Dependency-Based Retention...............159
11.2.6.2 Simple Retention Model...................161
11.2.7 Manual Backups Revisited...........................163
11.3 Recovery Strategies................................. 163
11.3.1 Recovery Types................................ 163
11.3.1.1 Aggregated Filesystem View...............163
11.3.1.2 Last Filesystem View................... 164
11.3.1.3 Point-in-Time Recoveries.................165
Contents
XI
113 A A Destructive Recoveries.................166
11.3.1.5 Nonindexed Recovery....................167
11.3.1.6 Incremental Recovery..................,. 168
11.3.2 Recovery Locality.............................. 169
11.3.2.1 Local Recovery.........................169
11.3.2.2 Server-Initiated Recovery..............169
11.3.2.3 Directed Recovery......................169
11.4 Client Impact........................................... 170
11.4.1 Server-Based Backups............................170
11.4.2 Serverless Backups...............................171
11.5 Database Backups.........................................173
11.5.1 Cold Database Backups............................173
11.5.2 Hot Database Backups............................174
11.5.3 Export Database Backup..........................175
11.6 Backup Initiation Methods................................176
11.7 Job Concurrency........................................ 178
11.7.1 Server Concurrency...............................178
11.7.2 Client Concurrency...............................180
11.7.3 Device Concurrency...............................181
11.8 Network Data Management Protocol.........................182
11.9 Miscellaneous Enterprise Features........................185
11.9.1 Pre- and Postprocessing.........................185
11.9.2 Arbitrary Backup Command Execution.............. 186
11.9.3 Cluster Recognition.............................. 186
11.9.4 Client Collections..............................186
11.9.5 Backup Segregation............................. 187
11.9.6 Granular Backup Control......./.................188
11.9.7 Backup Schedule Overrides........................188
11.9.8 Security ........................................ 189
11.9.9 Duplication and Migration........................189
11.9.10 Alerts......................................... 190
11.9.11 Command Line Interface.........................190
11.9.12 Backup Catalogs............................. 191
11.10 The Future of Backup and Recovery..................... 192
Chapter 12 The Cloud.......................................................195
12.1 Introduction.............................................195
12.2 The Rise of Shadow IT................................ 197
12.3 Public Clouds and Availability...........................197
12.3.1 What’s a Few Nines between Friends (Redux)?....... 197
12.3.2 Data Loss versus Accessibility Loss..............199
12.3.3 Objectives and Agreements........................200
12.3.4 Cascaded Providers...............................201
12.4 Data Protection for Born-in-Cloud Data................. 202
12.5 Data Protection for In-Cloud Infrastructure..............204
Contents
• •
XII
12.5.1 Service Catalog Approach.........................205
12.5.2 Self-Service Approach ...........................206
12.6 Private and Hybrid Clouds ...............................209
12.6.1 Private Clouds...................................209
12.6.2 Hybrid Cloud.................................. 213
12.7 Extending Data Protection into the Cloud...................215
12.8 Backup as a Service............... .......................218
12.9 Architectural Considerations for Cloud Service Providers... 219
12.10 Summary..................................................223
Chapter 13 Deduplication.....................................................225
13.1 Introduction to Deduplication.............................225
13.1.1 Inline versus Postprocessing......................225
13.1.2 Variable versus Fixed Block Size Deduplication...227
13.1.3 Source versus Target Deduplication...............229
13.1.4 Deduplication Pool Size...........................229
13.2 What Does and Doesn’t Deduplicate?.......;................230
13.3 Cost Considerations..................................... 231
13.4 Deduplication Considerations for Data Protection
in Primary Storage ..................................... 232
13.5 Deduplication Considerations for Data Protection
in Backup and Recovery Systems...........................234
13.5.1 The Case for Deduplication........................234
13.5.2 Revisiting Source versus Target Deduplication....238
13.5.3 Advanced Deduplication Features...................241
13.6 Summary............................................... 243
Chapter 14 Protecting Virtual Infrastructure.................................245
14.1 Introduction......................................... 245
14.2 Snapshots......................................... 245
14.3 Replication........................................... 248
14.4 Backup and Recovery................................... 250
14.4.1 Image-Level versus In-Guest Backup...............250
14.4.2 Virtualized Database Backups......................256
14.4.3 Recovery Options..................................256
14.4.4 Virtualizing the Backup Infrastructure............258
14.5 Summary...................................................260
Chapter 15 Big Data.......................................................... 261
15.1 Introduction ........................................... 261
15.2 Protecting withi n the Big Data Environment...............264
15.3 Big Data That Isn’t Big Data............................. 268
15.4 Using Data Protection Storage for a Big Data Environment.... 269
15.5 Summary................................................. 273
Contents xiii
Chapter 16 Data Storage Protection....................................... 275
16.1 Introduction.......................................... 275
16.2 Traditional RAID........................................275
16.2.1 RAID-1..........................................276
16.2.2 RAID-5..........................................277
16.2.3 RAID-4..........................................279
16.2.4 RAID-6..........................................280
16.3 Nested RAID............................................ 281
16.4 Subdrive RAID......................................... 282
16.4.1 Capacity-Optimized Subdrive RAID................282
16.4.2 Scattered RAID..................................284
16.5 Object-Level Protection............................. 286
16.5.1 Geo-Distribution................................287
16.5.2 Erasure Coding..................................288
16.6 Summary.................................................289
Chapter 17 Tape..........................................................291
17.1 Introduction: The Historical Primacy of Tape............291
17.2 Hierarchical Storage Management and Archive.............291
17.3 Backup and Recovery.....................................293
17.3.1 Media Spanning..................................293
17.3.2 Rapid Data Access...............................294
17.3.3 Media Multiplexing..............................295
17.3.4 Twinning/Automated Replication..................297
17.3.5 Library/SAN Sharing.............................298
17.3.6 Dynamic Drive Sharing...........................299
17.3.7 Library Partitioning............................300
17.3.8 Physical Media Management.......................301
17.4 Decline of Tape.........................................302
17.4.1 HSM and Archive......................... ......302
17.4.2 Backup and Recovery.............................303
17.4.2.1 Disk-to-Disk-to-Tape...................303
17.4.2.2 Disk-to-Disk-to-Disk................. 304
17.4.2.3 Disk-to-Disk-to-Cloud..................304
17.5 Do Unmanaged Tapes Provide Protection?..................305
17.6 Future of Tape..........................................306
Chapter 18 Converged Infrastructure......................................307
18.1 Introduction........................................ 307
18.2 Protecting Converged Infrastructure Systems.............308
18.3 What Will Be Protected? (Redux)...................... 309
18.4 Converged Staff....................................... 310
18.5 Summary........................................... 311
xiv Contents
Chapter 19 Data Protection Service Catalogs....................................313
19.1 Introduction.............................................. 313
19.2 Key Requirements for a Service Catalog......................314
19.2.1 Utility......................................... 314
19.2.2 Measurable......................................... 314
19.2.3 Achievable........................................ 315
19.2.4 Distinct.........................,.i...............315
19.2.5 Costed.......................................... 315
19.2.6 Priced........................................ 316
19.3 Service Catalog Tiers and Options...........................316
19.3.1 Service Catalog Based on Application Type...........316
19.3.2 Service Catalog Independent of
Application Type....................................318
19.3.3 Service Catalog Options per Data Protection
Activity........................................ 319
19.4 Retention Multiplier..................................... 320
19.5 Including Service Level Agreements in Service Catalogs.... 321
19.6 Building a Data Protection Service Catalog................ 323
19.7 Summary............................................... 325
Chapter 20 Holistic Data Protection Strategies ................................327
20.1 Introduction............................................ 327
20.2 Examples of Holistic Data Protection Strategies.............327
20.2.1 Large NAS Protection................................327
20.2.2 Virtual Machine Protection..........................335
20.2.3 Mission Critical Database Protection................338
20.3 Planning Holistic Data Protection Strategies................342
20.4 Summary............................................. 343
Chapter 21 Data Recovery.......................................................345
21.1 Introduction............................................... 345
21.2 Recovery versus Service Restoration.........................345
21.3 Context-Aware Recoveries....................................346
21.4 Designing for Recovery................................ 347
21.5 Recovery Facilitation.................................. 348
21.5.1 Automated versus Manual Recoveries..................348
21.5.2 Who Performs the Recovery?......................... 349
21.5.3 Frequency of Recovery............................. 350
21.5.4 Recentness of Data Protection..................... 351
21.6 Recovery Procedures and Recommendations.....................353
21.6.1 Read the Documentation Before Starting
a Recovery........................................ 353
21.6.2 Choosing the Correct Recovery Location..............353
Contents
xv
21.6.3 Provide an Estimate of How Long the Recovery
Will Take.....................................355
21.6.4 Provide Updates during Recoveries.............355
21.6.5 Don’t Assume a Recovery Can Be Done
If It Hasn’t Been Tested......................356
21.6.6 Run Recoveries from Sessions That Can Be
Disconnected from/Reconnected To..............356
21.6.7 Know the Post-Recovery Configuration Changes.... 357
21.6.8 Remember Quantum Physics.......................357
21.6.9 Be Patient................................. 357
21.6.10 Document the Current Status of the Recovery..... 358
21.6.11 Note Errors, and What Led to Them............358
21.6.12 Don’t Assume the Recovery Is an Exam.........358
21.6.13 Ensure the Recovery Is Performed
by Those Trained to Do It......................359
21.6.14 Write a Post-Recovery Report..................359
21.6.15 Update Incorrect Instructions.................359
21.6.16 Considerations Specific to Tape...............360
21.7 Disaster Recovery Considerations.......................361
21.7.1 Maintenance Backups............................361
21.7.2 Avoid Upgrades.................................361
21.7.3 Read the Documentation Before Backups
Are Performed................................ 361
21.7.4 Disaster Recoveries Must Be Run
by Administrators..............................362
21.7.5 Use Compatible Infrastructure..................362
21.7.6 Know the System Dependencies................. 362
21.7.7 Keep Accurate System Documentation.............363
21.7.8 Do You Know Where Your Licenses
Are at 1 am?................................. 363
21.7.9 Disaster Recovery Exercises....................363
21.8 Protecting the Protection Environment..................364
21.9 Historical Considerations and Data Migration...........366
21.10 Isolated Recovery Sites...............................367
21.11 Summary...............................................369
Chapter 22 Choosing Protection Infrastructure...........................371
22.1 Introduction...........................................371
22.2 It’s Never About the Technology.... ..................371
22.3 It’s Always About the Technology.......................372
22.4 Coverage...............................................372
22.4.1 Value Products That Value Protection...........372
22.4.2 Value Frameworks Over Monoliths................373
22.4.3 Don’t Assume...................................374
22.4.4 Functionality Checklist...................... 375
xvi Contents
22.4.5 Data Protection is an Internal Function Too...375
22.4.6 Minimize Vendors, Not Products................377
22.4.7 Understand the Costs..........................378
22.5 Summary............................................. 378
Chapter 23 The Impact of Flash on Data Protection .....................381
Chapter 24 In Closing...................................................385
Appendix A......................................................... 387
Index...................................................................391
|
any_adam_object | 1 |
author | De Guise, Preston |
author_facet | De Guise, Preston |
author_role | aut |
author_sort | De Guise, Preston |
author_variant | g p d gp gpd |
building | Verbundindex |
bvnumber | BV044509157 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)989168779 (DE-599)BVBBV044509157 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01335nam a2200337 c 4500</leader><controlfield tag="001">BV044509157</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180612 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170921s2017 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781482244151</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-4822-4415-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)989168779</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044509157</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-M382</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">De Guise, Preston</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data protection</subfield><subfield code="b">ensuring data availability</subfield><subfield code="c">Preston de Guise</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxi, 400 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-351-68951-9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029908989&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029908989</subfield></datafield></record></collection> |
id | DE-604.BV044509157 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:54:32Z |
institution | BVB |
isbn | 9781482244151 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029908989 |
oclc_num | 989168779 |
open_access_boolean | |
owner | DE-11 DE-M382 DE-739 |
owner_facet | DE-11 DE-M382 DE-739 |
physical | xxi, 400 Seiten Illustrationen, Diagramme |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | CRC Press |
record_format | marc |
spelling | De Guise, Preston Verfasser aut Data protection ensuring data availability Preston de Guise Boca Raton ; London ; New York CRC Press [2017] © 2017 xxi, 400 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Datenschutz (DE-588)4011134-9 gnd rswk-swf Datenschutz (DE-588)4011134-9 s DE-604 Erscheint auch als Online-Ausgabe 978-1-351-68951-9 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029908989&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | De Guise, Preston Data protection ensuring data availability Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4011134-9 |
title | Data protection ensuring data availability |
title_auth | Data protection ensuring data availability |
title_exact_search | Data protection ensuring data availability |
title_full | Data protection ensuring data availability Preston de Guise |
title_fullStr | Data protection ensuring data availability Preston de Guise |
title_full_unstemmed | Data protection ensuring data availability Preston de Guise |
title_short | Data protection |
title_sort | data protection ensuring data availability |
title_sub | ensuring data availability |
topic | Datenschutz (DE-588)4011134-9 gnd |
topic_facet | Datenschutz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029908989&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT deguisepreston dataprotectionensuringdataavailability |