Data protection : ensuring data availability

Bibliographische Detailangaben

Titel
Data protection ensuring data availability
verantwortlich
De Guise, Preston (VerfasserIn)
Ausgabe
Second edition.
veröffentlicht
Boca Raton: Auerbach, 2020
Erscheinungsjahr
2020
Medientyp
E-Book
Datenquelle
British Library Catalogue
Tags
Tag hinzufügen

Zugang

Für diesen Titel können wir derzeit leider keine weiteren Informationen zur Verfügbarkeit bereitstellen.

LEADER 02722pam a22004691i 4500
001 181-019738676
003 Uk
005 20200629020835.0
006 m || d |
007 cr |||||||||||
008 200127s2020 flua ob 001|0|eng|d
015 |a GBC037009  |2 bnb 
020 |a 9781000062571 (ePub ebook) :  |c £59.99 
020 |z 9780367474102 (hbk.) :  |c £115.00 
020 |z 9780367256777 (pbk.) :  |c £59.99 
020 |a 9781000062458 (PDF ebook) :  |c £59.99 
020 |a 9781000062519 (Mobipocket ebook) :  |c £59.99 
020 |a 9780367463496 (ebook) :  |c £59.99 
024 7 |a 10.1201/9780367463496  |2 doi 
037 |a 9781000062571  |b Ingram Content Group 
040 |a StDuBDS  |b eng  |c StDuBDS  |d Uk  |e rda  |e pn 
042 |a ukblsr 
082 0 4 |a 005.8  |2 23 
100 1 |a De Guise, Preston  |e author. 
245 1 0 |a Data protection  |b ensuring data availability  |c Preston de Guise 
250 |a Second edition. 
264 1 |a Boca Raton  |b Auerbach  |c 2020 
300 |a 1 online resource :  |b illustrations (black and white) 
336 |a text  |2 rdacontent 
336 |a still image  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
500 |a Previous edition: Boca Raton: CRC Press, 2017. 
504 |a Includes bibliographical references and index. 
588 |a Description based on CIP data; resource not viewed. 
505 0 |a <P>Chapter 1. Introduction<BR>Chapter 2. Contextualizing Data Protection<BR>Chapter 3. Data Lifecycle<BR>Chapter 4. Elements of a Protection System<BR>Chapter 5. IT Governance and Data Protection<BR>Chapter 6. Monitoring and Reporting<BR>Chapter 7. Business Continuity<BR>Chapter 8. Data Discovery<BR>Chapter 9. Security Privacy Ethical and Legal Considerations<BR>Chapter 10. Continuous Availability Replication and CDP<BR>Chapter 11. Snapshots<BR>Chapter 12. Backup and Recovery<BR>Chapter 13. Deduplication<BR>Chapter 14. The Cloud<BR>Chapter 15. Protecting Virtual Infrastructure<BR>Chapter 16. Big Data<BR>Chapter 17. Protecting the Edge<BR>Chapter 18. Data Storage Redundancy<BR>Chapter 19. Tape<BR>Chapter 20. Converged Infrastructure<BR>Chapter 21. Data Protection Service Catalogs<BR>Chapter 22. Holistic Data Protection Strategies<BR>Chapter 23. Making Data Protection Smarter<BR>Chapter 24. Data Recovery<BR>Chapter 25. Long-Term Retention Considerations<BR>Chapter 26. Choosing Protection Infrastructure<BR>Chapter 27. The Impact of Flash on Data Protection<BR>Chapter 28. In Closing</P> 
650 0 |a Data protection. 
776 0 8 |i Print version :  |z 9780367474102 
859 |a ELD  |b ebook 
852 |a British Library  |b HMNTS  |c DRT  |j ELD.DS.511614 
903 |a ELD.DS.511614 
980 |a 019738676  |b 181  |c sid-181-col-blfidbbi 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fkatalog.fid-bbi.de%3Agenerator&rft.title=Data+protection%3A+ensuring+data+availability&rft.date=2020&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Data+protection%3A+ensuring+data+availability&rft.au=De+Guise%2C+Preston&rft.pub=Auerbach&rft.edition=Second+edition.&rft.isbn=1000062570
SOLR
_version_ 1778756025516556288
access_facet Electronic Resources
author De Guise, Preston
author_facet De Guise, Preston
author_role aut
author_sort De Guise, Preston
author_variant g p d gp gpd
building Library A
callnumber-sort
collection sid-181-col-blfidbbi
contents <P>Chapter 1. Introduction<BR>Chapter 2. Contextualizing Data Protection<BR>Chapter 3. Data Lifecycle<BR>Chapter 4. Elements of a Protection System<BR>Chapter 5. IT Governance and Data Protection<BR>Chapter 6. Monitoring and Reporting<BR>Chapter 7. Business Continuity<BR>Chapter 8. Data Discovery<BR>Chapter 9. Security Privacy Ethical and Legal Considerations<BR>Chapter 10. Continuous Availability Replication and CDP<BR>Chapter 11. Snapshots<BR>Chapter 12. Backup and Recovery<BR>Chapter 13. Deduplication<BR>Chapter 14. The Cloud<BR>Chapter 15. Protecting Virtual Infrastructure<BR>Chapter 16. Big Data<BR>Chapter 17. Protecting the Edge<BR>Chapter 18. Data Storage Redundancy<BR>Chapter 19. Tape<BR>Chapter 20. Converged Infrastructure<BR>Chapter 21. Data Protection Service Catalogs<BR>Chapter 22. Holistic Data Protection Strategies<BR>Chapter 23. Making Data Protection Smarter<BR>Chapter 24. Data Recovery<BR>Chapter 25. Long-Term Retention Considerations<BR>Chapter 26. Choosing Protection Infrastructure<BR>Chapter 27. The Impact of Flash on Data Protection<BR>Chapter 28. In Closing</P>
dewey-full 005.8
dewey-hundreds 000 - Computer science, information & general works
dewey-ones 005 - Computer programming, programs & data
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, knowledge & systems
doi_str_mv 10.1201/9780367463496
edition Second edition.
facet_avail Online
finc_class_facet Informatik
fincclass_txtF_mv science-computerscience
footnote Previous edition: Boca Raton: CRC Press, 2017.
format eBook
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
geogr_code not assigned
geogr_code_person not assigned
id 181-019738676
illustrated Illustrated
imprint Boca Raton, Auerbach, 2020
imprint_str_mv Boca Raton Auerbach 2020
institution FID-BBI-DE-23
is_hierarchy_id
is_hierarchy_title
isbn 9781000062571 (ePub ebook) :, 9781000062458 (PDF ebook) :, 9781000062519 (Mobipocket ebook) :, 9780367463496 (ebook) :
isbn_isn_mv 9780367474102 (hbk.) :, 9780367256777 (pbk.) :, 9780367474102
isil_str_mv FID-BBI-DE-23
language English
last_indexed 2023-10-03T17:25:35.526Z
marc024a_ct_mv 10.1201/9780367463496
match_str deguise2020dataprotectionensuringdataavailability
mega_collection British Library Catalogue
physical 1 online resource; illustrations (black and white)
publishDate 2020
publishDateSort 2020
publishPlace Boca Raton
publisher Auerbach
record_format marcfinc
record_id 019738676
recordtype marcfinc
rvk_facet No subject assigned
source_id 181
spelling De Guise, Preston author., Data protection ensuring data availability Preston de Guise, Second edition., Boca Raton Auerbach 2020, 1 online resource : illustrations (black and white), text rdacontent, still image rdacontent, computer rdamedia, online resource rdacarrier, Previous edition: Boca Raton: CRC Press, 2017., Includes bibliographical references and index., Description based on CIP data; resource not viewed., <P>Chapter 1. Introduction<BR>Chapter 2. Contextualizing Data Protection<BR>Chapter 3. Data Lifecycle<BR>Chapter 4. Elements of a Protection System<BR>Chapter 5. IT Governance and Data Protection<BR>Chapter 6. Monitoring and Reporting<BR>Chapter 7. Business Continuity<BR>Chapter 8. Data Discovery<BR>Chapter 9. Security Privacy Ethical and Legal Considerations<BR>Chapter 10. Continuous Availability Replication and CDP<BR>Chapter 11. Snapshots<BR>Chapter 12. Backup and Recovery<BR>Chapter 13. Deduplication<BR>Chapter 14. The Cloud<BR>Chapter 15. Protecting Virtual Infrastructure<BR>Chapter 16. Big Data<BR>Chapter 17. Protecting the Edge<BR>Chapter 18. Data Storage Redundancy<BR>Chapter 19. Tape<BR>Chapter 20. Converged Infrastructure<BR>Chapter 21. Data Protection Service Catalogs<BR>Chapter 22. Holistic Data Protection Strategies<BR>Chapter 23. Making Data Protection Smarter<BR>Chapter 24. Data Recovery<BR>Chapter 25. Long-Term Retention Considerations<BR>Chapter 26. Choosing Protection Infrastructure<BR>Chapter 27. The Impact of Flash on Data Protection<BR>Chapter 28. In Closing</P>, Data protection., Print version : 9780367474102, ELD ebook, British Library HMNTS DRT ELD.DS.511614
spellingShingle De Guise, Preston, Data protection: ensuring data availability, <P>Chapter 1. Introduction<BR>Chapter 2. Contextualizing Data Protection<BR>Chapter 3. Data Lifecycle<BR>Chapter 4. Elements of a Protection System<BR>Chapter 5. IT Governance and Data Protection<BR>Chapter 6. Monitoring and Reporting<BR>Chapter 7. Business Continuity<BR>Chapter 8. Data Discovery<BR>Chapter 9. Security Privacy Ethical and Legal Considerations<BR>Chapter 10. Continuous Availability Replication and CDP<BR>Chapter 11. Snapshots<BR>Chapter 12. Backup and Recovery<BR>Chapter 13. Deduplication<BR>Chapter 14. The Cloud<BR>Chapter 15. Protecting Virtual Infrastructure<BR>Chapter 16. Big Data<BR>Chapter 17. Protecting the Edge<BR>Chapter 18. Data Storage Redundancy<BR>Chapter 19. Tape<BR>Chapter 20. Converged Infrastructure<BR>Chapter 21. Data Protection Service Catalogs<BR>Chapter 22. Holistic Data Protection Strategies<BR>Chapter 23. Making Data Protection Smarter<BR>Chapter 24. Data Recovery<BR>Chapter 25. Long-Term Retention Considerations<BR>Chapter 26. Choosing Protection Infrastructure<BR>Chapter 27. The Impact of Flash on Data Protection<BR>Chapter 28. In Closing</P>, Data protection.
title Data protection: ensuring data availability
title_auth Data protection ensuring data availability
title_full Data protection ensuring data availability Preston de Guise
title_fullStr Data protection ensuring data availability Preston de Guise
title_full_unstemmed Data protection ensuring data availability Preston de Guise
title_short Data protection
title_sort data protection ensuring data availability
title_sub ensuring data availability
topic Data protection.
topic_facet Data protection.