LEADER 05255nam 2200649Ia 450 001 9910816015303321 005 20200520144314.0 010 $a1-282-70821-X 010 $a9786612708213 010 $a1-118-25576-3 010 $a0-470-90823-8 035 $a(CKB)2670000000032888 035 $a(EBL)555004 035 $a(SSID)ssj0000404226 035 $a(PQKBManifestationID)11264365 035 $a(PQKBTitleCode)TC0000404226 035 $a(PQKBWorkID)10340637 035 $a(PQKB)10892237 035 $a(Au-PeEL)EBL555004 035 $a(CaPaEBR)ebr10411475 035 $a(CaONFJC)MIL270821 035 $a(CaSebORM)9780470572146 035 $a(MiAaPQ)EBC555004 035 $a(OCoLC)768243515 035 $a(EXLCZ)992670000000032888 100 $a20100413d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aData protection for virtual data centers /$fJason Buffington 205 $a1st ed. 210 $aHoboken, N.J. $cWiley Technology Pub.$dc2010 215 $a1 online resource (530 p.) 300 $aIncludes index. 311 $a0-470-57214-0 327 $aData Protection for Virtual Data Centers; Acknowledgments; About the Author; Contents; Introduction; Chapter 1: What Kind of Protection Do You Need?; In the Beginning, There Were Disk and Tape; Overview of Availability Mechanisms; Overview of Protection Mechanisms; Summary; Chapter 2: Data Protection by the Numbers; The Technical Metrics: RPO and RTO; Business Metrics: RA and BIA; Risk Mitigation: Fixing It in Advance; Total Cost of Ownership; Return on Investment; Turning IT Needs into Corporate Initiatives; Summary; Chapter 3: The Layers of Data Protection 327 $aWhat Data Looks Like from the Server's PerspectiveHardware-centric Protection; File-centric Protection; Application-centric Protection; Where to Store Your Protected Data; Summary; Chapter 4: Better Backups; Solving the Problem from the Inside Out; Volume Shadow Copy Service (VSS); The Windows Server Backup Utility; System Center Data Protection Manager; Summary; Chapter 5: File Services; File System Availability and Protection in Windows Server; What Is the Distributed File System?; Enabling DFS on Your Windows File Servers; Getting Started with DFS-N; Getting Started with DFS-R 327 $aMixing DFS-R and DFS-N for Real-World SolutionsDFS Enhancements in Windows Server 2008 R2; Summary; Chapter 6: Windows Clustering; Overview of Clustering in Windows Server 2008 and 2008 R2; Building Your First Cluster; How Failover Clustering Works; Quorum Models; Windows Server 2008 R2 Failover Clustering; Summary; Chapter 7: Microsoft Exchange; Exchange within Microsoft Cluster Services; Exchange 2007 Continuous Replication; Exchange 2010 Database Availability; Summary; Chapter 8: Microsoft SQL Server; SQL Server Built-in Resiliency; SQL Failover Clustering; SQL Database Mirroring 327 $aSQL Database FailoverSQL Log Shipping and Replication; Which SQL Server HA Solution Should You Choose?; Backing Up SQL Server; Summary; Chapter 9: Virtualization; Virtualization Changes Everything; Protecting Virtual Machines; Availability of Virtual Machines; How Virtualization Makes Data Protection and Availability Better; Disaster Recovery Staging; Bare Metal Recovery; Server Rollback; Summary; Chapter 10: Management and Deployment; Well-Managed Systems for Higher Uptime; Large Enterprise Deployment and Manageability; Virtualization Management; Midsized Management: Physical and Virtual 327 $aSummaryChapter 11: Monitoring Systems; The Need for Monitoring; Challenges in Monitoring; Enterprise End-to-End Monitoring; Monitoring the Health and Performance of Key Workloads; Monitoring in Midsized Organizations Using System Center Essentials; Summary; Chapter 12: Business Continuity and Disaster Recovery; What Makes BC and DR So Special?; Get Your Data Out of the Building; BC = DR + HA; BC/DR Solution Alternatives; Using Virtualization to Achieve Business Continuity; Planning for BC/DR to Get Better Backups and Availability; Summary; Appendix: Links and Resources; Microsoft Software 327 $aTopical Resources 330 $aEssential information on how to protect data in virtual environments! Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach, protect, and manage data in a virtualized environment. You'll get up to speed on data protection problems, explore the data protection technologies available today, see how to adapt to virtualization, and more. The book uses a ""good, better, best"" approach, explo 606 $aVirtual computer systems 606 $aData protection$xManagement 615 0$aVirtual computer systems. 615 0$aData protection$xManagement. 676 $a005.8 700 $aBuffington$b Jason$f1970-$01639737 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910816015303321 996 $aData protection for virtual data centers$93982888 997 $aUNINA