Modern data protection : ensuring recoverability of all modern workloads /

Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile d...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Preston, W. Curtis (VerfasserIn)
Format: E-Book
Sprache:Englisch
Veröffentlicht: Sebastopol, CA : O'Reilly Media, [2021]
Schlagworte:
ISBN:9781492094029, 1492094021
Online-Zugang: Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a2200000M 4500
001 on1249500610
003 SK-BrCVT
005 20251021140424.0
006 m d
007 cr |n|||||||||
008 210504s2021 xx o 0|| 0 eng d
020 |a 9781492094029 
020 |a 1492094021 
040 |a EBSCO  |b eng  |c CVTI SR  |e AACR2  |d CVT 
041 |a eng 
072 |a 00  |2 CVT 
080 |a 001.103-049.65  |2 2011 
080 |a 334.72  |2 2011 
100 1 |a Preston, W. Curtis,  |e author. 
245 1 0 |a Modern data protection :  |b ensuring recoverability of all modern workloads /  |c W. Curtis Preston. 
260 |a Sebastopol, CA :  |b O'Reilly Media,  |c [2021] 
300 |a 1 online resource 
504 |a Includes bibliographical references. 
505 0 |a Risks to your data: why we back up -- Gathering and determining service levels -- Backup and archive are very different -- Backup and recovery basics -- Using disk and deduplication for data protection -- Traditional data sources -- Protecting databases -- Modern data sources -- Backup and recovery software methods -- Archive software methods -- Disaster recovery methods -- Data protection targets -- Commercial data protection challenges -- Traditional data protection solutions -- Modern data protection solutions -- Replacing or upgrading your backup system. 
520 |a Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365, Google Workspace, and Salesforce; and persistent data created by Kubernetes and container workloads. To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine which is right for your company. You'll learn the unique requirements that each workload presents, then explore various categories of commercial backup hardware, software, and services available to protect these data sources, including the advantages and disadvantages of each approach. -- Provided by publisher. 
650 0 |a Data protection. 
650 0 |a Business enterprises  |x Data processing  |x Security measures. 
650 7 |a Data protection.  |2 fast 
653 |a ochrana údajov 
653 |a podniky 
655 4 |a Electronic books.  |9 49669 
776 0 8 |w (OCoLC)1237807624 
856 4 1 |u https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2919914  |y Vzdialený prístup pre registrovaných používateľov. 
910 |b ZE13300 
959 |a 02 
974 |a cvti cvti  |b cvti cvti 
992 |a SUD 
999 |c 295692  |d 295692