|
|
|
|
LEADER |
02722pam a22004691i 4500 |
001 |
181-019738676 |
003 |
Uk |
005 |
20200629020835.0 |
006 |
m || d | |
007 |
cr ||||||||||| |
008 |
200127s2020 flua ob 001|0|eng|d |
015 |
|
|
|a GBC037009
|2 bnb
|
020 |
|
|
|a 9781000062571 (ePub ebook) :
|c £59.99
|
020 |
|
|
|z 9780367474102 (hbk.) :
|c £115.00
|
020 |
|
|
|z 9780367256777 (pbk.) :
|c £59.99
|
020 |
|
|
|a 9781000062458 (PDF ebook) :
|c £59.99
|
020 |
|
|
|a 9781000062519 (Mobipocket ebook) :
|c £59.99
|
020 |
|
|
|a 9780367463496 (ebook) :
|c £59.99
|
024 |
7 |
|
|a 10.1201/9780367463496
|2 doi
|
037 |
|
|
|a 9781000062571
|b Ingram Content Group
|
040 |
|
|
|a StDuBDS
|b eng
|c StDuBDS
|d Uk
|e rda
|e pn
|
042 |
|
|
|a ukblsr
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a De Guise, Preston
|e author.
|
245 |
1 |
0 |
|a Data protection
|b ensuring data availability
|c Preston de Guise
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a Boca Raton
|b Auerbach
|c 2020
|
300 |
|
|
|a 1 online resource :
|b illustrations (black and white)
|
336 |
|
|
|a text
|2 rdacontent
|
336 |
|
|
|a still image
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
500 |
|
|
|a Previous edition: Boca Raton: CRC Press, 2017.
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
|
|
|a Description based on CIP data; resource not viewed.
|
505 |
0 |
|
|a <P>Chapter 1. Introduction<BR>Chapter 2. Contextualizing Data Protection<BR>Chapter 3. Data Lifecycle<BR>Chapter 4. Elements of a Protection System<BR>Chapter 5. IT Governance and Data Protection<BR>Chapter 6. Monitoring and Reporting<BR>Chapter 7. Business Continuity<BR>Chapter 8. Data Discovery<BR>Chapter 9. Security Privacy Ethical and Legal Considerations<BR>Chapter 10. Continuous Availability Replication and CDP<BR>Chapter 11. Snapshots<BR>Chapter 12. Backup and Recovery<BR>Chapter 13. Deduplication<BR>Chapter 14. The Cloud<BR>Chapter 15. Protecting Virtual Infrastructure<BR>Chapter 16. Big Data<BR>Chapter 17. Protecting the Edge<BR>Chapter 18. Data Storage Redundancy<BR>Chapter 19. Tape<BR>Chapter 20. Converged Infrastructure<BR>Chapter 21. Data Protection Service Catalogs<BR>Chapter 22. Holistic Data Protection Strategies<BR>Chapter 23. Making Data Protection Smarter<BR>Chapter 24. Data Recovery<BR>Chapter 25. Long-Term Retention Considerations<BR>Chapter 26. Choosing Protection Infrastructure<BR>Chapter 27. The Impact of Flash on Data Protection<BR>Chapter 28. In Closing</P>
|
650 |
|
0 |
|a Data protection.
|
776 |
0 |
8 |
|i Print version :
|z 9780367474102
|
859 |
|
|
|a ELD
|b ebook
|
852 |
|
|
|a British Library
|b HMNTS
|c DRT
|j ELD.DS.511614
|
903 |
|
|
|a ELD.DS.511614
|
980 |
|
|
|a 019738676
|b 181
|c sid-181-col-blfidbbi
|
SOLR
_version_ |
1778756025516556288 |
access_facet |
Electronic Resources |
author |
De Guise, Preston |
author_facet |
De Guise, Preston |
author_role |
aut |
author_sort |
De Guise, Preston |
author_variant |
g p d gp gpd |
building |
Library A |
callnumber-sort |
|
collection |
sid-181-col-blfidbbi |
contents |
<P>Chapter 1. Introduction<BR>Chapter 2. Contextualizing Data Protection<BR>Chapter 3. Data Lifecycle<BR>Chapter 4. Elements of a Protection System<BR>Chapter 5. IT Governance and Data Protection<BR>Chapter 6. Monitoring and Reporting<BR>Chapter 7. Business Continuity<BR>Chapter 8. Data Discovery<BR>Chapter 9. Security Privacy Ethical and Legal Considerations<BR>Chapter 10. Continuous Availability Replication and CDP<BR>Chapter 11. Snapshots<BR>Chapter 12. Backup and Recovery<BR>Chapter 13. Deduplication<BR>Chapter 14. The Cloud<BR>Chapter 15. Protecting Virtual Infrastructure<BR>Chapter 16. Big Data<BR>Chapter 17. Protecting the Edge<BR>Chapter 18. Data Storage Redundancy<BR>Chapter 19. Tape<BR>Chapter 20. Converged Infrastructure<BR>Chapter 21. Data Protection Service Catalogs<BR>Chapter 22. Holistic Data Protection Strategies<BR>Chapter 23. Making Data Protection Smarter<BR>Chapter 24. Data Recovery<BR>Chapter 25. Long-Term Retention Considerations<BR>Chapter 26. Choosing Protection Infrastructure<BR>Chapter 27. The Impact of Flash on Data Protection<BR>Chapter 28. In Closing</P> |
dewey-full |
005.8 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
005 - Computer programming, programs & data |
dewey-raw |
005.8 |
dewey-search |
005.8 |
dewey-sort |
15.8 |
dewey-tens |
000 - Computer science, knowledge & systems |
doi_str_mv |
10.1201/9780367463496 |
edition |
Second edition. |
facet_avail |
Online |
finc_class_facet |
Informatik |
fincclass_txtF_mv |
science-computerscience |
footnote |
Previous edition: Boca Raton: CRC Press, 2017. |
format |
eBook |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
181-019738676 |
illustrated |
Illustrated |
imprint |
Boca Raton, Auerbach, 2020 |
imprint_str_mv |
Boca Raton Auerbach 2020 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
9781000062571 (ePub ebook) :, 9781000062458 (PDF ebook) :, 9781000062519 (Mobipocket ebook) :, 9780367463496 (ebook) : |
isbn_isn_mv |
9780367474102 (hbk.) :, 9780367256777 (pbk.) :, 9780367474102 |
isil_str_mv |
FID-BBI-DE-23 |
language |
English |
last_indexed |
2023-10-03T17:25:35.526Z |
marc024a_ct_mv |
10.1201/9780367463496 |
match_str |
deguise2020dataprotectionensuringdataavailability |
mega_collection |
British Library Catalogue |
physical |
1 online resource; illustrations (black and white) |
publishDate |
2020 |
publishDateSort |
2020 |
publishPlace |
Boca Raton |
publisher |
Auerbach |
record_format |
marcfinc |
record_id |
019738676 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
source_id |
181 |
spelling |
De Guise, Preston author., Data protection ensuring data availability Preston de Guise, Second edition., Boca Raton Auerbach 2020, 1 online resource : illustrations (black and white), text rdacontent, still image rdacontent, computer rdamedia, online resource rdacarrier, Previous edition: Boca Raton: CRC Press, 2017., Includes bibliographical references and index., Description based on CIP data; resource not viewed., <P>Chapter 1. Introduction<BR>Chapter 2. Contextualizing Data Protection<BR>Chapter 3. Data Lifecycle<BR>Chapter 4. Elements of a Protection System<BR>Chapter 5. IT Governance and Data Protection<BR>Chapter 6. Monitoring and Reporting<BR>Chapter 7. Business Continuity<BR>Chapter 8. Data Discovery<BR>Chapter 9. Security Privacy Ethical and Legal Considerations<BR>Chapter 10. Continuous Availability Replication and CDP<BR>Chapter 11. Snapshots<BR>Chapter 12. Backup and Recovery<BR>Chapter 13. Deduplication<BR>Chapter 14. The Cloud<BR>Chapter 15. Protecting Virtual Infrastructure<BR>Chapter 16. Big Data<BR>Chapter 17. Protecting the Edge<BR>Chapter 18. Data Storage Redundancy<BR>Chapter 19. Tape<BR>Chapter 20. Converged Infrastructure<BR>Chapter 21. Data Protection Service Catalogs<BR>Chapter 22. Holistic Data Protection Strategies<BR>Chapter 23. Making Data Protection Smarter<BR>Chapter 24. Data Recovery<BR>Chapter 25. Long-Term Retention Considerations<BR>Chapter 26. Choosing Protection Infrastructure<BR>Chapter 27. The Impact of Flash on Data Protection<BR>Chapter 28. In Closing</P>, Data protection., Print version : 9780367474102, ELD ebook, British Library HMNTS DRT ELD.DS.511614 |
spellingShingle |
De Guise, Preston, Data protection: ensuring data availability, <P>Chapter 1. Introduction<BR>Chapter 2. Contextualizing Data Protection<BR>Chapter 3. Data Lifecycle<BR>Chapter 4. Elements of a Protection System<BR>Chapter 5. IT Governance and Data Protection<BR>Chapter 6. Monitoring and Reporting<BR>Chapter 7. Business Continuity<BR>Chapter 8. Data Discovery<BR>Chapter 9. Security Privacy Ethical and Legal Considerations<BR>Chapter 10. Continuous Availability Replication and CDP<BR>Chapter 11. Snapshots<BR>Chapter 12. Backup and Recovery<BR>Chapter 13. Deduplication<BR>Chapter 14. The Cloud<BR>Chapter 15. Protecting Virtual Infrastructure<BR>Chapter 16. Big Data<BR>Chapter 17. Protecting the Edge<BR>Chapter 18. Data Storage Redundancy<BR>Chapter 19. Tape<BR>Chapter 20. Converged Infrastructure<BR>Chapter 21. Data Protection Service Catalogs<BR>Chapter 22. Holistic Data Protection Strategies<BR>Chapter 23. Making Data Protection Smarter<BR>Chapter 24. Data Recovery<BR>Chapter 25. Long-Term Retention Considerations<BR>Chapter 26. Choosing Protection Infrastructure<BR>Chapter 27. The Impact of Flash on Data Protection<BR>Chapter 28. In Closing</P>, Data protection. |
title |
Data protection: ensuring data availability |
title_auth |
Data protection ensuring data availability |
title_full |
Data protection ensuring data availability Preston de Guise |
title_fullStr |
Data protection ensuring data availability Preston de Guise |
title_full_unstemmed |
Data protection ensuring data availability Preston de Guise |
title_short |
Data protection |
title_sort |
data protection ensuring data availability |
title_sub |
ensuring data availability |
topic |
Data protection. |
topic_facet |
Data protection. |