Data center storage [[electronic resource] ] : cost-effective strategies, implementation, and management / / Hubbert Smith |
Autore | Smith Hubbert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla., : Auerbach Publications, c2011 |
Descrizione fisica | 1 online resource (363 p.) |
Disciplina | 004.5 |
Soggetto topico |
Computer storage devices
Electronic data processing departments - Management |
Soggetto genere / forma | Electronic books. |
ISBN |
1-4665-0781-0
0-429-15223-X 1-4398-3488-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Dedication; Contents; About the author; What, Exactly, Will We Accomplish?; Part I: Building Blocks, Power, and Consolidation; Chapter 1: The Disk Drive: The Fundamental Building Block of Enterprise Storage; Chapter 2: Power and AC; Chapter 3: Storage Consolidation; Chapter 4: Service Level Overview; Chapter 5: Uptime, Reliability, and SLAs; Chapter 6: Storage Tiering and SLAs; Chapter 7: Service Level Agreements and IT Bill-Back; Chapter 8: Demonstrating Delivery on SLA Service Levels; Chapter 9: Planning for Growth and Storage Tiering; Chapter 10: Wrap-Up: Projects Within Reach
Part II: Managing Aging Data and E-Mail ExpensesChapter 11: Migration and Retiring Aging Systems; Chapter 12: Shared Folders and Content Management; Chapter 13: Storage Strategies for E-Mail; Chapter 14: Spending Wisely on Performance; Chapter 15: Performance and Backup; Chapter 16: The Right Tools for Reliability, Uptime, Disaster Recovery, and Archiving; Chapter 17: Reliability and Server Failover; Chapter 18: Reliability and Continuous Data Protection, Synchronous Replication; Chapter 19: Reliability and Near-Continuous Data Protection, Asynchronous Replication Chapter 20: Reliability and Data Integrity (T10-DIF or T10-PI)Chapter 21: Virtualization Overview: Focus on the Business Benefits; Chapter 22: Storage Virtualization; Chapter 23: Virtualization, Storage Tiers, and Manual Data Movement; Chapter 24: Virtual Desktop Infrastructure (VDI); Chapter 25: Converged NAS and SAN; Chapter 26: Storage for Nontraditional IT Applications; Chapter 27: Part II Wrap-Up: Projects Within Reach; Part II: Conclusions; Part III: Managed Hosting and Cloud; Chapter 28: Managed Hosting and Cloud Computing Chapter 29: The Business Driving Managed Hosting: What It Means to YouChapter 30: Managed Hosting Vetting Process; Chapter 31: Why Cloud is Relevant; Chapter 32: Implementing Cloud Storage in Your Operation; Chapter 33: Hybrid Cloud; Chapter 34: Cloud Spectrum of Options; Chapter 35: End Game and Hardware Roadmap to Leverage the Cloud; Chapter 36: Strategy and Execution; Chapter 37: Constructing a Roadmap; Chapter 38: Risk Management; Chapter 39: Part III Wrap-Up: Projects Within Reach; Part III: Conclusion; Appendix A: Storage Protocol Basics; Appendix B: Project Management Appendix C: People, Process, TechnologyAppendix D: Root Cause, Corrective Action Process; Appendix E: Iometer: Performance Testing in the Lab; Glossary; A; B; C; D; F; G; H; I; L; M; N; O; P; R; S; T; W; Z |
Record Nr. | UNINA-9910457661403321 |
Smith Hubbert
![]() |
||
Boca Raton, Fla., : Auerbach Publications, c2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data center storage [[electronic resource] ] : cost-effective strategies, implementation, and management / / Hubbert Smith |
Autore | Smith Hubbert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla., : Auerbach Publications, c2011 |
Descrizione fisica | 1 online resource (363 p.) |
Disciplina | 004.5 |
Soggetto topico |
Computer storage devices
Electronic data processing departments - Management |
ISBN |
1-4665-0781-0
0-429-15223-X 1-4398-3488-1 |
Classificazione | BUS087000COM032000COM043000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Dedication; Contents; About the author; What, Exactly, Will We Accomplish?; Part I: Building Blocks, Power, and Consolidation; Chapter 1: The Disk Drive: The Fundamental Building Block of Enterprise Storage; Chapter 2: Power and AC; Chapter 3: Storage Consolidation; Chapter 4: Service Level Overview; Chapter 5: Uptime, Reliability, and SLAs; Chapter 6: Storage Tiering and SLAs; Chapter 7: Service Level Agreements and IT Bill-Back; Chapter 8: Demonstrating Delivery on SLA Service Levels; Chapter 9: Planning for Growth and Storage Tiering; Chapter 10: Wrap-Up: Projects Within Reach
Part II: Managing Aging Data and E-Mail ExpensesChapter 11: Migration and Retiring Aging Systems; Chapter 12: Shared Folders and Content Management; Chapter 13: Storage Strategies for E-Mail; Chapter 14: Spending Wisely on Performance; Chapter 15: Performance and Backup; Chapter 16: The Right Tools for Reliability, Uptime, Disaster Recovery, and Archiving; Chapter 17: Reliability and Server Failover; Chapter 18: Reliability and Continuous Data Protection, Synchronous Replication; Chapter 19: Reliability and Near-Continuous Data Protection, Asynchronous Replication Chapter 20: Reliability and Data Integrity (T10-DIF or T10-PI)Chapter 21: Virtualization Overview: Focus on the Business Benefits; Chapter 22: Storage Virtualization; Chapter 23: Virtualization, Storage Tiers, and Manual Data Movement; Chapter 24: Virtual Desktop Infrastructure (VDI); Chapter 25: Converged NAS and SAN; Chapter 26: Storage for Nontraditional IT Applications; Chapter 27: Part II Wrap-Up: Projects Within Reach; Part II: Conclusions; Part III: Managed Hosting and Cloud; Chapter 28: Managed Hosting and Cloud Computing Chapter 29: The Business Driving Managed Hosting: What It Means to YouChapter 30: Managed Hosting Vetting Process; Chapter 31: Why Cloud is Relevant; Chapter 32: Implementing Cloud Storage in Your Operation; Chapter 33: Hybrid Cloud; Chapter 34: Cloud Spectrum of Options; Chapter 35: End Game and Hardware Roadmap to Leverage the Cloud; Chapter 36: Strategy and Execution; Chapter 37: Constructing a Roadmap; Chapter 38: Risk Management; Chapter 39: Part III Wrap-Up: Projects Within Reach; Part III: Conclusion; Appendix A: Storage Protocol Basics; Appendix B: Project Management Appendix C: People, Process, TechnologyAppendix D: Root Cause, Corrective Action Process; Appendix E: Iometer: Performance Testing in the Lab; Glossary; A; B; C; D; F; G; H; I; L; M; N; O; P; R; S; T; W; Z |
Record Nr. | UNINA-9910781585503321 |
Smith Hubbert
![]() |
||
Boca Raton, Fla., : Auerbach Publications, c2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data center storage [[electronic resource] ] : cost-effective strategies, implementation, and management / / Hubbert Smith |
Autore | Smith Hubbert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla., : Auerbach Publications, c2011 |
Descrizione fisica | 1 online resource (363 p.) |
Disciplina | 004.5 |
Soggetto topico |
Computer storage devices
Electronic data processing departments - Management |
ISBN |
1-4665-0781-0
0-429-15223-X 1-4398-3488-1 |
Classificazione | BUS087000COM032000COM043000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Dedication; Contents; About the author; What, Exactly, Will We Accomplish?; Part I: Building Blocks, Power, and Consolidation; Chapter 1: The Disk Drive: The Fundamental Building Block of Enterprise Storage; Chapter 2: Power and AC; Chapter 3: Storage Consolidation; Chapter 4: Service Level Overview; Chapter 5: Uptime, Reliability, and SLAs; Chapter 6: Storage Tiering and SLAs; Chapter 7: Service Level Agreements and IT Bill-Back; Chapter 8: Demonstrating Delivery on SLA Service Levels; Chapter 9: Planning for Growth and Storage Tiering; Chapter 10: Wrap-Up: Projects Within Reach
Part II: Managing Aging Data and E-Mail ExpensesChapter 11: Migration and Retiring Aging Systems; Chapter 12: Shared Folders and Content Management; Chapter 13: Storage Strategies for E-Mail; Chapter 14: Spending Wisely on Performance; Chapter 15: Performance and Backup; Chapter 16: The Right Tools for Reliability, Uptime, Disaster Recovery, and Archiving; Chapter 17: Reliability and Server Failover; Chapter 18: Reliability and Continuous Data Protection, Synchronous Replication; Chapter 19: Reliability and Near-Continuous Data Protection, Asynchronous Replication Chapter 20: Reliability and Data Integrity (T10-DIF or T10-PI)Chapter 21: Virtualization Overview: Focus on the Business Benefits; Chapter 22: Storage Virtualization; Chapter 23: Virtualization, Storage Tiers, and Manual Data Movement; Chapter 24: Virtual Desktop Infrastructure (VDI); Chapter 25: Converged NAS and SAN; Chapter 26: Storage for Nontraditional IT Applications; Chapter 27: Part II Wrap-Up: Projects Within Reach; Part II: Conclusions; Part III: Managed Hosting and Cloud; Chapter 28: Managed Hosting and Cloud Computing Chapter 29: The Business Driving Managed Hosting: What It Means to YouChapter 30: Managed Hosting Vetting Process; Chapter 31: Why Cloud is Relevant; Chapter 32: Implementing Cloud Storage in Your Operation; Chapter 33: Hybrid Cloud; Chapter 34: Cloud Spectrum of Options; Chapter 35: End Game and Hardware Roadmap to Leverage the Cloud; Chapter 36: Strategy and Execution; Chapter 37: Constructing a Roadmap; Chapter 38: Risk Management; Chapter 39: Part III Wrap-Up: Projects Within Reach; Part III: Conclusion; Appendix A: Storage Protocol Basics; Appendix B: Project Management Appendix C: People, Process, TechnologyAppendix D: Root Cause, Corrective Action Process; Appendix E: Iometer: Performance Testing in the Lab; Glossary; A; B; C; D; F; G; H; I; L; M; N; O; P; R; S; T; W; Z |
Record Nr. | UNINA-9910826154003321 |
Smith Hubbert
![]() |
||
Boca Raton, Fla., : Auerbach Publications, c2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Defense against the black arts : how hackers do what they do and how to protect against it / / Jesse Varsalone, Matthew McFadden |
Autore | Varsalone Jesse |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Boca Raton, FL : , : Auerbach Publications, , [2017] |
Descrizione fisica | 1 online resource (408 p.) |
Disciplina | 005.8 |
Soggetto topico |
Hackers
Computer networks - Security measures Computer security |
ISBN |
0-429-10376-X
1-283-35007-6 9786613350077 1-4398-2122-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Front Cover; Contents; Foreword; Authors; Chapter 1: Hacking Windows OS; Chapter 2: Obtaining Windows Passwords; Chapter 3: Imaging and Extraction; Chapter 4: Bypassing Web Filters; Chapter 5: Manipulating the Web; Chapter 6: Finding It All on the Net; Chapter 7: Research Time; Chapter 8: Capturing Network Traffic; Chapter 9: Research Time: Finding the Vulnerabilities; Chapter 10: Metasploit; Chapter 11: Other Attack Tools; Chapter 12: Social Engineering with Web 2.0; Chapter 13: Hack the Macs; Chapter 14: Wireless Hacking; Back Cover |
Altri titoli varianti | Defense against the Black Arts |
Record Nr. | UNINA-9910410652903321 |
Varsalone Jesse
![]() |
||
Boca Raton, FL : , : Auerbach Publications, , [2017] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Design and implementation of data mining tools / / M. Awad. [et al.] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : Auerbach Publications, , 2009 |
Descrizione fisica | 1 online resource (276 p.) |
Disciplina | 005.74 |
Altri autori (Persone) | AwadM (Mamoun) |
Soggetto topico | Data mining |
Soggetto genere / forma | Electronic books. |
ISBN |
0-429-11670-5
1-282-11123-X 9786612111235 1-4200-4591-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Dedication; Contents; Preface; About the Authors; Acknowledgments; Chapter 1. Introduction; Chapter 2. Data Mining Techniques; Chapter 3. Data Mining Applications; Chapter 4. Data Mining for Security Applications; Chapter 5. Dynamic Growing Self-Organizing Tree Algorithm; Chapter 6. Data Reduction Using Hierarchical Clustering and Rocchio Bundling; Chapter 7. Intrusion Detection Results; Chapter 8. Web Data Management and Mining; Chapter 9. Effective Web Page Prediction Using Hybrid Model; Chapter 10. Multiple Evidence Combination for WWW Prediction
Chapter 11. WWW Prediction ResultsChapter 12. Multimedia Data Management and Mining; Chapter 13. Image Classification Models; Chapter 14. Subspace Clustering and Automatic Image Annotation; Chapter 15. Enhanced Weighted Feature Selection; Chapter 16. Image Classification and Performance Analysis; Chapter 17. Summary and Directions; APPENDIX A; Data Management Systems: Developments and Trends; Index; Back cover |
Record Nr. | UNINA-9910454566903321 |
Boca Raton, Fla. : , : Auerbach Publications, , 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Design and implementation of data mining tools / / M. Awad. [et al.] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : Auerbach Publications, , 2009 |
Descrizione fisica | 1 online resource (276 p.) |
Disciplina | 005.74 |
Altri autori (Persone) | AwadM (Mamoun) |
Soggetto topico | Data mining |
ISBN |
0-367-38555-4
0-429-11670-5 1-282-11123-X 9786612111235 1-4200-4591-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Dedication; Contents; Preface; About the Authors; Acknowledgments; Chapter 1. Introduction; Chapter 2. Data Mining Techniques; Chapter 3. Data Mining Applications; Chapter 4. Data Mining for Security Applications; Chapter 5. Dynamic Growing Self-Organizing Tree Algorithm; Chapter 6. Data Reduction Using Hierarchical Clustering and Rocchio Bundling; Chapter 7. Intrusion Detection Results; Chapter 8. Web Data Management and Mining; Chapter 9. Effective Web Page Prediction Using Hybrid Model; Chapter 10. Multiple Evidence Combination for WWW Prediction
Chapter 11. WWW Prediction ResultsChapter 12. Multimedia Data Management and Mining; Chapter 13. Image Classification Models; Chapter 14. Subspace Clustering and Automatic Image Annotation; Chapter 15. Enhanced Weighted Feature Selection; Chapter 16. Image Classification and Performance Analysis; Chapter 17. Summary and Directions; APPENDIX A; Data Management Systems: Developments and Trends; Index; Back cover |
Record Nr. | UNINA-9910778198303321 |
Boca Raton, Fla. : , : Auerbach Publications, , 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Design and implementation of data mining tools / / M. Awad. [et al.] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : Auerbach Publications, , 2009 |
Descrizione fisica | 1 online resource (276 p.) |
Disciplina | 005.74 |
Altri autori (Persone) | AwadM (Mamoun) |
Soggetto topico | Data mining |
ISBN |
0-367-38555-4
0-429-11670-5 1-282-11123-X 9786612111235 1-4200-4591-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; Dedication; Contents; Preface; About the Authors; Acknowledgments; Chapter 1. Introduction; Chapter 2. Data Mining Techniques; Chapter 3. Data Mining Applications; Chapter 4. Data Mining for Security Applications; Chapter 5. Dynamic Growing Self-Organizing Tree Algorithm; Chapter 6. Data Reduction Using Hierarchical Clustering and Rocchio Bundling; Chapter 7. Intrusion Detection Results; Chapter 8. Web Data Management and Mining; Chapter 9. Effective Web Page Prediction Using Hybrid Model; Chapter 10. Multiple Evidence Combination for WWW Prediction
Chapter 11. WWW Prediction ResultsChapter 12. Multimedia Data Management and Mining; Chapter 13. Image Classification Models; Chapter 14. Subspace Clustering and Automatic Image Annotation; Chapter 15. Enhanced Weighted Feature Selection; Chapter 16. Image Classification and Performance Analysis; Chapter 17. Summary and Directions; APPENDIX A; Data Management Systems: Developments and Trends; Index; Back cover |
Record Nr. | UNINA-9910809843503321 |
Boca Raton, Fla. : , : Auerbach Publications, , 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Design and safety assessment of critical systems / / Marco Bozzano, Adolfo Villafiorita |
Autore | Bozzano Marco |
Pubbl/distr/stampa | Boca Raton : , : Auerbach Publications, , 2011 |
Descrizione fisica | 1 online resource (288 p.) |
Disciplina | 620.8/6 |
Altri autori (Persone) | VillafioritaAdolfo |
Soggetto topico |
Industrial safety
System safety |
Soggetto genere / forma | Electronic books. |
ISBN |
0-429-07004-7
1-4398-0332-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Front cover; Contents; Preface; Acknowledgments; About the Authors; Chapter 1: Introduction; Chapter 2: Dependability, Reliability,and Safety Assessment; Chapter 3: Techniques for Safety Assessment; Chapter 4: Development ofSafety-Critical Applications; Chapter 5: Formal Methods for Safety Assessment; Chapter 6: Formal Methods for Certification; Appendix A: The NuSMV Model Checker; Appendix B: The FSAP Safety Analysis Platform; Appendix C: Some Regulatory Bodies and Regulations; Back cover |
Record Nr. | UNINA-9910459459803321 |
Bozzano Marco
![]() |
||
Boca Raton : , : Auerbach Publications, , 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Design and safety assessment of critical systems / / Marco Bozzano, Adolfo Villafiorita |
Autore | Bozzano Marco |
Pubbl/distr/stampa | Boca Raton : , : Auerbach Publications, , 2011 |
Descrizione fisica | 1 online resource (288 p.) |
Disciplina | 620.8/6 |
Altri autori (Persone) | VillafioritaAdolfo |
Soggetto topico |
Industrial safety
System safety |
ISBN |
0-429-07004-7
1-4398-0332-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Front cover; Contents; Preface; Acknowledgments; About the Authors; Chapter 1: Introduction; Chapter 2: Dependability, Reliability,and Safety Assessment; Chapter 3: Techniques for Safety Assessment; Chapter 4: Development ofSafety-Critical Applications; Chapter 5: Formal Methods for Safety Assessment; Chapter 6: Formal Methods for Certification; Appendix A: The NuSMV Model Checker; Appendix B: The FSAP Safety Analysis Platform; Appendix C: Some Regulatory Bodies and Regulations; Back cover |
Record Nr. | UNINA-9910785448003321 |
Bozzano Marco
![]() |
||
Boca Raton : , : Auerbach Publications, , 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Design and safety assessment of critical systems / / Marco Bozzano, Adolfo Villafiorita |
Autore | Bozzano Marco |
Pubbl/distr/stampa | Boca Raton : , : Auerbach Publications, , 2011 |
Descrizione fisica | 1 online resource (288 p.) |
Disciplina | 620.8/6 |
Altri autori (Persone) | VillafioritaAdolfo |
Soggetto topico |
Industrial safety
System safety |
ISBN |
0-429-07004-7
1-4398-0332-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Front cover; Contents; Preface; Acknowledgments; About the Authors; Chapter 1: Introduction; Chapter 2: Dependability, Reliability,and Safety Assessment; Chapter 3: Techniques for Safety Assessment; Chapter 4: Development ofSafety-Critical Applications; Chapter 5: Formal Methods for Safety Assessment; Chapter 6: Formal Methods for Certification; Appendix A: The NuSMV Model Checker; Appendix B: The FSAP Safety Analysis Platform; Appendix C: Some Regulatory Bodies and Regulations; Back cover |
Record Nr. | UNINA-9910819781503321 |
Bozzano Marco
![]() |
||
Boca Raton : , : Auerbach Publications, , 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|