Modern data protection : ensuring recoverability of all modern workloads /
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile d...
Gespeichert in:
| 1. Verfasser: | |
|---|---|
| Format: | E-Book |
| Sprache: | Englisch |
| Veröffentlicht: |
Sebastopol, CA :
O'Reilly Media,
[2021]
|
| Schlagworte: | |
| ISBN: | 9781492094029, 1492094021 |
| Online-Zugang: |
|
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
| LEADER | 00000cam a2200000M 4500 | ||
|---|---|---|---|
| 001 | on1249500610 | ||
| 003 | SK-BrCVT | ||
| 005 | 20251021140424.0 | ||
| 006 | m d | ||
| 007 | cr |n||||||||| | ||
| 008 | 210504s2021 xx o 0|| 0 eng d | ||
| 020 | |a 9781492094029 | ||
| 020 | |a 1492094021 | ||
| 040 | |a EBSCO |b eng |c CVTI SR |e AACR2 |d CVT | ||
| 041 | |a eng | ||
| 072 | |a 00 |2 CVT | ||
| 080 | |a 001.103-049.65 |2 2011 | ||
| 080 | |a 334.72 |2 2011 | ||
| 100 | 1 | |a Preston, W. Curtis, |e author. | |
| 245 | 1 | 0 | |a Modern data protection : |b ensuring recoverability of all modern workloads / |c W. Curtis Preston. |
| 260 | |a Sebastopol, CA : |b O'Reilly Media, |c [2021] | ||
| 300 | |a 1 online resource | ||
| 504 | |a Includes bibliographical references. | ||
| 505 | 0 | |a Risks to your data: why we back up -- Gathering and determining service levels -- Backup and archive are very different -- Backup and recovery basics -- Using disk and deduplication for data protection -- Traditional data sources -- Protecting databases -- Modern data sources -- Backup and recovery software methods -- Archive software methods -- Disaster recovery methods -- Data protection targets -- Commercial data protection challenges -- Traditional data protection solutions -- Modern data protection solutions -- Replacing or upgrading your backup system. | |
| 520 | |a Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365, Google Workspace, and Salesforce; and persistent data created by Kubernetes and container workloads. To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine which is right for your company. You'll learn the unique requirements that each workload presents, then explore various categories of commercial backup hardware, software, and services available to protect these data sources, including the advantages and disadvantages of each approach. -- Provided by publisher. | ||
| 650 | 0 | |a Data protection. | |
| 650 | 0 | |a Business enterprises |x Data processing |x Security measures. | |
| 650 | 7 | |a Data protection. |2 fast | |
| 653 | |a ochrana údajov | ||
| 653 | |a podniky | ||
| 655 | 4 | |a Electronic books. |9 49669 | |
| 776 | 0 | 8 | |w (OCoLC)1237807624 |
| 856 | 4 | 1 | |u https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2919914 |y Vzdialený prístup pre registrovaných používateľov. |
| 910 | |b ZE13300 | ||
| 959 | |a 02 | ||
| 974 | |a cvti cvti |b cvti cvti | ||
| 992 | |a SUD | ||
| 999 | |c 295692 |d 295692 | ||

