LEADER 05281nam 2200649Ia 450 001 9910140740503321 005 20200520144314.0 010 $a1-282-70821-X 010 $a9786612708213 010 $a1-118-25576-3 010 $a0-470-90823-8 035 $a(CKB)2670000000032888 035 $a(EBL)555004 035 $a(SSID)ssj0000404226 035 $a(PQKBManifestationID)11264365 035 $a(PQKBTitleCode)TC0000404226 035 $a(PQKBWorkID)10340637 035 $a(PQKB)10892237 035 $a(Au-PeEL)EBL555004 035 $a(CaPaEBR)ebr10411475 035 $a(CaONFJC)MIL270821 035 $a(CaSebORM)9780470572146 035 $a(MiAaPQ)EBC555004 035 $a(OCoLC)768243515 035 $a(EXLCZ)992670000000032888 100 $a20100413d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aData protection for virtual data centers$b[electronic resource] /$fJason Buffington 205 $a1st ed. 210 $aHoboken, N.J. $cWiley Technology Pub.$dc2010 215 $a1 online resource (530 p.) 300 $aIncludes index. 311 $a0-470-57214-0 327 $aData Protection for Virtual Data Centers; Acknowledgments; About the Author; Contents; Introduction; Chapter 1: What Kind of Protection Do You Need?; In the Beginning, There Were Disk and Tape; Overview of Availability Mechanisms; Overview of Protection Mechanisms; Summary; Chapter 2: Data Protection by the Numbers; The Technical Metrics: RPO and RTO; Business Metrics: RA and BIA; Risk Mitigation: Fixing It in Advance; Total Cost of Ownership; Return on Investment; Turning IT Needs into Corporate Initiatives; Summary; Chapter 3: The Layers of Data Protection 327 $aWhat Data Looks Like from the Server's PerspectiveHardware-centric Protection; File-centric Protection; Application-centric Protection; Where to Store Your Protected Data; Summary; Chapter 4: Better Backups; Solving the Problem from the Inside Out; Volume Shadow Copy Service (VSS); The Windows Server Backup Utility; System Center Data Protection Manager; Summary; Chapter 5: File Services; File System Availability and Protection in Windows Server; What Is the Distributed File System?; Enabling DFS on Your Windows File Servers; Getting Started with DFS-N; Getting Started with DFS-R 327 $aMixing DFS-R and DFS-N for Real-World SolutionsDFS Enhancements in Windows Server 2008 R2; Summary; Chapter 6: Windows Clustering; Overview of Clustering in Windows Server 2008 and 2008 R2; Building Your First Cluster; How Failover Clustering Works; Quorum Models; Windows Server 2008 R2 Failover Clustering; Summary; Chapter 7: Microsoft Exchange; Exchange within Microsoft Cluster Services; Exchange 2007 Continuous Replication; Exchange 2010 Database Availability; Summary; Chapter 8: Microsoft SQL Server; SQL Server Built-in Resiliency; SQL Failover Clustering; SQL Database Mirroring 327 $aSQL Database FailoverSQL Log Shipping and Replication; Which SQL Server HA Solution Should You Choose?; Backing Up SQL Server; Summary; Chapter 9: Virtualization; Virtualization Changes Everything; Protecting Virtual Machines; Availability of Virtual Machines; How Virtualization Makes Data Protection and Availability Better; Disaster Recovery Staging; Bare Metal Recovery; Server Rollback; Summary; Chapter 10: Management and Deployment; Well-Managed Systems for Higher Uptime; Large Enterprise Deployment and Manageability; Virtualization Management; Midsized Management: Physical and Virtual 327 $aSummaryChapter 11: Monitoring Systems; The Need for Monitoring; Challenges in Monitoring; Enterprise End-to-End Monitoring; Monitoring the Health and Performance of Key Workloads; Monitoring in Midsized Organizations Using System Center Essentials; Summary; Chapter 12: Business Continuity and Disaster Recovery; What Makes BC and DR So Special?; Get Your Data Out of the Building; BC = DR + HA; BC/DR Solution Alternatives; Using Virtualization to Achieve Business Continuity; Planning for BC/DR to Get Better Backups and Availability; Summary; Appendix: Links and Resources; Microsoft Software 327 $aTopical Resources 330 $aEssential information on how to protect data in virtual environments! Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach, protect, and manage data in a virtualized environment. You'll get up to speed on data protection problems, explore the data protection technologies available today, see how to adapt to virtualization, and more. The book uses a ""good, better, best"" approach, explo 606 $aVirtual computer systems 606 $aData protection$xManagement 615 0$aVirtual computer systems. 615 0$aData protection$xManagement. 676 $a005.8 700 $aBuffington$b Jason$f1970-$0914343 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910140740503321 996 $aData protection for virtual data centers$92048498 997 $aUNINA LEADER 01539nam2 22003011i 450 001 UON00443424 005 20231205105000.416 100 $a20140828d1889 |0itac50 ba 101 $aita 102 $aIT 105 $a||||Y ||||| 200 1 $aMassaua, D. 2$fIstituto geografico militare 205 $aScala nel rapporto di 1 a 50.000 210 $a[Firenze]$cIstituto geografico militare$d1889 215 $a1 c.$d43 x 43 su foglio 58 x 52 cm. 461 1$1001UON00443368$12001 $aCarta dei possedimenti italiani in Africa$fIstituto geografico militare$1205 $aScala nel rapporto di 1 a 50.000$1210 $a[Firenze]$cIstituto geografico militare$d1888-1891$1215 $a1 c. su [25] fogli$d43 x 43 su foglio 58 x 52 cm$1300 $aIl titolo varia in: Carta della colonia Eritrea, per le carte E3-E4;F1-F4;G1-G4;H1-H4;I1-I2;J1.$vD. 2 606 $aERITREA$xCarte geografiche$3UONC025521$2FI 620 $aIT$dFirenze$3UONL000052 686 $aCARTE AFRICA$cAFRICA - CARTE GEOGRAFICHE$2A 710 02$aIstituto Geografico Militare$cFirenze$3UONV060704$05005 712 $aIstituto Geografico Militare$3UONV247708$4650 791 02$aIGM$zIstituto Geografico Militare $3UONV222488 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00443424 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI CARTE AFRICA 056 (04) $eSI G 6246/3 7 056 (04) $sBuono 996 $aMassaua, D. 2$91187105 997 $aUNIOR