Data protection: ensuring data availability
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and p...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
2020
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | BTU01 BTW01 FHD01 FHM01 TUM01 Volltext |
Zusammenfassung: | The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. |
Beschreibung: | 1 Online-Ressource (xxi, 400 Seiten) Illustrationen, Diagramme |
ISBN: | 9780367463496 |
DOI: | 10.1201/9780367463496 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046729582 | ||
003 | DE-604 | ||
005 | 20240321 | ||
007 | cr|uuu---uuuuu | ||
008 | 200520s2020 |||| o||u| ||||||eng d | ||
020 | |a 9780367463496 |c Online |9 978-0-367-46349-6 | ||
024 | 7 | |a 10.1201/9780367463496 |2 doi | |
035 | |a (ZDB-7-TFC)9780367463496 | ||
035 | |a (OCoLC)1164644837 | ||
035 | |a (DE-599)BVBBV046729582 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-91G |a DE-526 |a DE-M347 |a DE-634 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a De Guise, Preston |e Verfasser |0 (DE-588)119212880X |4 aut | |
245 | 1 | 0 | |a Data protection |b ensuring data availability |c Preston de Guise |
250 | |a Second edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c 2020 | |
300 | |a 1 Online-Ressource (xxi, 400 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. | ||
650 | 0 | 7 | |a Architektur |g Informatik |0 (DE-588)4139374-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationsmanagement |0 (DE-588)4114012-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Informationsmanagement |0 (DE-588)4114012-6 |D s |
689 | 0 | 3 | |a Architektur |g Informatik |0 (DE-588)4139374-0 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hbk |z 978-0-367-47410-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, pbk |z 978-0-367-25677-7 |
856 | 4 | 0 | |u https://doi.org/10.1201/9780367463496 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-30-PQE |a ZDB-7-TFC |a ebook | ||
940 | 1 | |q BTW_TF_KAUF | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032139656 | ||
966 | e | |u https://doi.org/10.1201/9780367463496 |l BTU01 |p ZDB-7-TFC |q BTU_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9780367463496 |l BTW01 |p ebook |q BTW_TF_KAUF |x Verlag |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=6187250 |l FHD01 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9780367463496 |l FHM01 |p ZDB-7-TFC |q FHM Einzelkauf |x Verlag |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6187250 |l TUM01 |p ZDB-30-PQE |q TUM_Einzelkauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804181475780722688 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | De Guise, Preston |
author_GND | (DE-588)119212880X |
author_facet | De Guise, Preston |
author_role | aut |
author_sort | De Guise, Preston |
author_variant | g p d gp gpd |
building | Verbundindex |
bvnumber | BV046729582 |
classification_rvk | ST 276 |
collection | ZDB-30-PQE ZDB-7-TFC ebook |
ctrlnum | (ZDB-7-TFC)9780367463496 (OCoLC)1164644837 (DE-599)BVBBV046729582 |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1201/9780367463496 |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03473nmm a2200541 c 4500</leader><controlfield tag="001">BV046729582</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240321 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200520s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780367463496</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-367-46349-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9780367463496</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-7-TFC)9780367463496</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1164644837</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046729582</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-526</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">De Guise, Preston</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)119212880X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data protection</subfield><subfield code="b">ensuring data availability</subfield><subfield code="c">Preston de Guise</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 400 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. </subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Architektur</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4139374-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsmanagement</subfield><subfield code="0">(DE-588)4114012-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Informationsmanagement</subfield><subfield code="0">(DE-588)4114012-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Architektur</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4139374-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hbk</subfield><subfield code="z">978-0-367-47410-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, pbk</subfield><subfield code="z">978-0-367-25677-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1201/9780367463496</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-7-TFC</subfield><subfield code="a">ebook</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">BTW_TF_KAUF</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032139656</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9780367463496</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="q">BTU_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9780367463496</subfield><subfield code="l">BTW01</subfield><subfield code="p">ebook</subfield><subfield code="q">BTW_TF_KAUF</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=6187250</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9780367463496</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="q">FHM Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6187250</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">TUM_Einzelkauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046729582 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:36:16Z |
indexdate | 2024-07-10T08:52:15Z |
institution | BVB |
isbn | 9780367463496 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032139656 |
oclc_num | 1164644837 |
open_access_boolean | |
owner | DE-1050 DE-91G DE-BY-TUM DE-526 DE-M347 DE-634 |
owner_facet | DE-1050 DE-91G DE-BY-TUM DE-526 DE-M347 DE-634 |
physical | 1 Online-Ressource (xxi, 400 Seiten) Illustrationen, Diagramme |
psigel | ZDB-30-PQE ZDB-7-TFC ebook BTW_TF_KAUF ZDB-7-TFC BTU_Kauf ebook BTW_TF_KAUF ZDB-30-PQE FHD01_PQE_Kauf ZDB-7-TFC FHM Einzelkauf ZDB-30-PQE TUM_Einzelkauf |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | CRC Press |
record_format | marc |
spelling | De Guise, Preston Verfasser (DE-588)119212880X aut Data protection ensuring data availability Preston de Guise Second edition Boca Raton ; London ; New York CRC Press 2020 1 Online-Ressource (xxi, 400 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. Architektur Informatik (DE-588)4139374-0 gnd rswk-swf Informationsmanagement (DE-588)4114012-6 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Datenschutz (DE-588)4011134-9 s Datensicherung (DE-588)4011144-1 s Informationsmanagement (DE-588)4114012-6 s Architektur Informatik (DE-588)4139374-0 s DE-604 Erscheint auch als Druck-Ausgabe, hbk 978-0-367-47410-2 Erscheint auch als Druck-Ausgabe, pbk 978-0-367-25677-7 https://doi.org/10.1201/9780367463496 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | De Guise, Preston Data protection ensuring data availability Architektur Informatik (DE-588)4139374-0 gnd Informationsmanagement (DE-588)4114012-6 gnd Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4139374-0 (DE-588)4114012-6 (DE-588)4011134-9 (DE-588)4011144-1 |
title | Data protection ensuring data availability |
title_auth | Data protection ensuring data availability |
title_exact_search | Data protection ensuring data availability |
title_exact_search_txtP | Data protection ensuring data availability |
title_full | Data protection ensuring data availability Preston de Guise |
title_fullStr | Data protection ensuring data availability Preston de Guise |
title_full_unstemmed | Data protection ensuring data availability Preston de Guise |
title_short | Data protection |
title_sort | data protection ensuring data availability |
title_sub | ensuring data availability |
topic | Architektur Informatik (DE-588)4139374-0 gnd Informationsmanagement (DE-588)4114012-6 gnd Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Architektur Informatik Informationsmanagement Datenschutz Datensicherung |
url | https://doi.org/10.1201/9780367463496 |
work_keys_str_mv | AT deguisepreston dataprotectionensuringdataavailability |