logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Data Protection Ensuring Data Availability 2nd Edition Preston De Guise

  • SKU: BELL-10997538
Data Protection Ensuring Data Availability 2nd Edition Preston De Guise
$ 31.00 $ 45.00 (-31%)

5.0

80 reviews

Data Protection Ensuring Data Availability 2nd Edition Preston De Guise instant download after payment.

Publisher: CRC Press/Taylor & Francis Group
File Extension: PDF
File size: 102.99 MB
Pages: 423
Author: Preston de Guise
ISBN: 9780367256777, 9780367463496, 9780367474102, 9781000062571, 9781351689496, 0367256770, 0367463490, 0367474107, 1000062570
Language: English
Year: 2020
Edition: 2

Product desciption

Data Protection Ensuring Data Availability 2nd Edition Preston De Guise by Preston De Guise 9780367256777, 9780367463496, 9780367474102, 9781000062571, 9781351689496, 0367256770, 0367463490, 0367474107, 1000062570 instant download after payment.

The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the Cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload what the best mix of traditional, and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology and activities that allow for data continuity. There are three essential activities that refer to themselves as data protection; while they all overlap in terms of scope and function, each operate as reasonably self-contained fields with their own specialists and domain nomenclature. These three activities are: Data protection as a storage and recovery activity Data protection as a security activity Data protection as a privacy activity These activities are covered in detail, with a focus on how organizations can use them to leverage their IT investments and optimize costs. The book also explains how data protection is becoming an enabler for new processes around data movement and data processing. This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on-premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized data center and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business.

Related Products