Data protection: ensuring data availability
"This book arms readers with information for making decisions on how to protect data from loss in the cloud, on-site, or both. It explains the changing face of data recovery and techniques for dealing with big data. The second edition has new chapters on ethical and legal issues, convergent dat...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
[2020]
|
Ausgabe: | Second edition |
Schriftenreihe: | An Auerbach book
|
Schlagworte: | |
Zusammenfassung: | "This book arms readers with information for making decisions on how to protect data from loss in the cloud, on-site, or both. It explains the changing face of data recovery and techniques for dealing with big data. The second edition has new chapters on ethical and legal issues, convergent data protection, architecture, smart data protection, and protection at the edge. It also includes expanded chapters on data protection in the cloud and protecting infrastructure. Key Features: Protect data and systems from ransomware and other cyberthreats Become compliant with legal requirements for protecting data Protect data in the cloud, on-premises, or in mixed environments Tackle deduplication to ensure data integrity Author Bio: Preston de Guise has been working with data recovery products for his entire career - designing, implementing and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too"-- |
Beschreibung: | xxi, 400 Seiten Illustrationen, Diagramme |
ISBN: | 9780367256777 9780367474102 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047234218 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 210412s2020 xxua||| |||| 00||| eng d | ||
020 | |a 9780367256777 |c paperback |9 978-0-367-25677-7 | ||
020 | |a 9780367474102 |c hardback |9 978-0-367-47410-2 | ||
035 | |a (OCoLC)1249659871 | ||
035 | |a (DE-599)KXP1693554348 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US |a xxk |c XA-GB | ||
049 | |a DE-573 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a De Guise, Preston |e Verfasser |0 (DE-588)119212880X |4 aut | |
245 | 1 | 0 | |a Data protection |b ensuring data availability |c by Preston De Guise |
250 | |a Second edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c [2020] | |
300 | |a xxi, 400 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a An Auerbach book | |
520 | 3 | |a "This book arms readers with information for making decisions on how to protect data from loss in the cloud, on-site, or both. It explains the changing face of data recovery and techniques for dealing with big data. The second edition has new chapters on ethical and legal issues, convergent data protection, architecture, smart data protection, and protection at the edge. It also includes expanded chapters on data protection in the cloud and protecting infrastructure. Key Features: Protect data and systems from ransomware and other cyberthreats Become compliant with legal requirements for protecting data Protect data in the cloud, on-premises, or in mixed environments Tackle deduplication to ensure data integrity Author Bio: Preston de Guise has been working with data recovery products for his entire career - designing, implementing and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too"-- | |
650 | 0 | 7 | |a Architektur |g Informatik |0 (DE-588)4139374-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationsmanagement |0 (DE-588)4114012-6 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Data protection | |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Informationsmanagement |0 (DE-588)4114012-6 |D s |
689 | 0 | 3 | |a Architektur |g Informatik |0 (DE-588)4139374-0 |D s |
689 | 0 | |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032638623 |
Datensatz im Suchindex
_version_ | 1804182367331418112 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | De Guise, Preston |
author_GND | (DE-588)119212880X |
author_facet | De Guise, Preston |
author_role | aut |
author_sort | De Guise, Preston |
author_variant | g p d gp gpd |
building | Verbundindex |
bvnumber | BV047234218 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1249659871 (DE-599)KXP1693554348 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | Second edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02845nam a2200481 c 4500</leader><controlfield tag="001">BV047234218</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">210412s2020 xxua||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780367256777</subfield><subfield code="c">paperback</subfield><subfield code="9">978-0-367-25677-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780367474102</subfield><subfield code="c">hardback</subfield><subfield code="9">978-0-367-47410-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1249659871</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1693554348</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield><subfield code="a">xxk</subfield><subfield code="c">XA-GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">De Guise, Preston</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)119212880X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data protection</subfield><subfield code="b">ensuring data availability</subfield><subfield code="c">by Preston De Guise</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxi, 400 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">An Auerbach book</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book arms readers with information for making decisions on how to protect data from loss in the cloud, on-site, or both. It explains the changing face of data recovery and techniques for dealing with big data. The second edition has new chapters on ethical and legal issues, convergent data protection, architecture, smart data protection, and protection at the edge. It also includes expanded chapters on data protection in the cloud and protecting infrastructure. Key Features: Protect data and systems from ransomware and other cyberthreats Become compliant with legal requirements for protecting data Protect data in the cloud, on-premises, or in mixed environments Tackle deduplication to ensure data integrity Author Bio: Preston de Guise has been working with data recovery products for his entire career - designing, implementing and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too"--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Architektur</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4139374-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationsmanagement</subfield><subfield code="0">(DE-588)4114012-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Informationsmanagement</subfield><subfield code="0">(DE-588)4114012-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Architektur</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4139374-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032638623</subfield></datafield></record></collection> |
id | DE-604.BV047234218 |
illustrated | Illustrated |
index_date | 2024-07-03T17:01:58Z |
indexdate | 2024-07-10T09:06:25Z |
institution | BVB |
isbn | 9780367256777 9780367474102 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032638623 |
oclc_num | 1249659871 |
open_access_boolean | |
owner | DE-573 |
owner_facet | DE-573 |
physical | xxi, 400 Seiten Illustrationen, Diagramme |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | CRC Press |
record_format | marc |
series2 | An Auerbach book |
spelling | De Guise, Preston Verfasser (DE-588)119212880X aut Data protection ensuring data availability by Preston De Guise Second edition Boca Raton ; London ; New York CRC Press [2020] xxi, 400 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier An Auerbach book "This book arms readers with information for making decisions on how to protect data from loss in the cloud, on-site, or both. It explains the changing face of data recovery and techniques for dealing with big data. The second edition has new chapters on ethical and legal issues, convergent data protection, architecture, smart data protection, and protection at the edge. It also includes expanded chapters on data protection in the cloud and protecting infrastructure. Key Features: Protect data and systems from ransomware and other cyberthreats Become compliant with legal requirements for protecting data Protect data in the cloud, on-premises, or in mixed environments Tackle deduplication to ensure data integrity Author Bio: Preston de Guise has been working with data recovery products for his entire career - designing, implementing and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too"-- Architektur Informatik (DE-588)4139374-0 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Informationsmanagement (DE-588)4114012-6 gnd rswk-swf Computer networks / Security measures Data protection Datenschutz (DE-588)4011134-9 s Datensicherung (DE-588)4011144-1 s Informationsmanagement (DE-588)4114012-6 s Architektur Informatik (DE-588)4139374-0 s DE-604 |
spellingShingle | De Guise, Preston Data protection ensuring data availability Architektur Informatik (DE-588)4139374-0 gnd Datensicherung (DE-588)4011144-1 gnd Datenschutz (DE-588)4011134-9 gnd Informationsmanagement (DE-588)4114012-6 gnd |
subject_GND | (DE-588)4139374-0 (DE-588)4011144-1 (DE-588)4011134-9 (DE-588)4114012-6 |
title | Data protection ensuring data availability |
title_auth | Data protection ensuring data availability |
title_exact_search | Data protection ensuring data availability |
title_exact_search_txtP | Data protection ensuring data availability |
title_full | Data protection ensuring data availability by Preston De Guise |
title_fullStr | Data protection ensuring data availability by Preston De Guise |
title_full_unstemmed | Data protection ensuring data availability by Preston De Guise |
title_short | Data protection |
title_sort | data protection ensuring data availability |
title_sub | ensuring data availability |
topic | Architektur Informatik (DE-588)4139374-0 gnd Datensicherung (DE-588)4011144-1 gnd Datenschutz (DE-588)4011134-9 gnd Informationsmanagement (DE-588)4114012-6 gnd |
topic_facet | Architektur Informatik Datensicherung Datenschutz Informationsmanagement |
work_keys_str_mv | AT deguisepreston dataprotectionensuringdataavailability |