Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali |
Autore | Little David B. |
Pubbl/distr/stampa | Chichester, England ; , : John Wiley & Sons, , c2007 |
Descrizione fisica | 1 online resource (258 p.) |
Disciplina |
005.8
005.86 |
Altri autori (Persone) |
FarmerSkip
El-HilaliOussama |
Soggetto topico |
Data protection
Database management Data recovery (Computer science) Electronic data processing - Backup processing alternatives |
ISBN |
1-280-83896-5
9786610838967 0-470-03518-8 0-470-03519-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Acknowledgements -- Introduction -- 1. An Introduction to Data Protection Today -- 1.1 Introduction -- 1.2 Traditional Backup and Recovery -- 1.3 Hierarchical Storage Migration (HSM) -- 1.4 Disaster Recovery -- 1.5 Vaulting -- 1.6 Encryption -- 1.7 Management and Reporting -- 1.8 Summary -- 2. The Evolution -- 2.1 Introduction -- 2.2 Storage Virtualization -- 2.3 RAID -- 2.4 RAID Levels -- 2.5 What Mirroring and RAID Do Not Do -- 2.6 Replication -- 2.6.1 Host-Based Replication -- 2.6.2 RAID System Replication -- 2.7 Standby or DR Site -- 2.8 Summary -- 3. Backup Integration -- 3.1 Introduction -- 3.2 Snapshots -- 4. Bare Metal Restore -- 4.1 Introduction -- 4.2 Background -- 4.3 The Evolution of BMR Capabilities -- 4.4 Filling the Gap / Integrated BMR -- 4.5 The Problem of Dissimilar Disk Recovery -- 4.6 The Problem of Automating Disk Mapping -- 4.7 The Problem of Dissimilar System Recovery -- 4.8 The Current State of Integrated BMR -- 4.9 The Future of BMR -- 4.10 New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery -- 4.11 Large-Scale Automated Bare Metal Recovery -- 4.12 Summary -- 5. Management -- 5.1 Introduction 67 -- 5.2 Protecting Data Throughout Its Life Cycle -- 5.3 Architecting for Efficient Management -- 5.4 Reporting -- 5.5 Business Unit Chargeback -- 5.6 Conclusion -- 6. Security -- 6.1 Introduction -- 6.2 Encryption and Data Protection -- 6.3 Data Protection Application Security -- 6.4 Security Vulnerabilities in Data Protection Applications -- 6.5 Conclusion -- 7. New Features in Data Protection -- 7.1 Introduction -- 7.2 Synthetic Backups -- 7.3 Evolution of Synthetic Backups -- 7.4 Benefits of Synthetic Backups -- 7.5 Building a Synthetic Backup -- 7.6 Technical Considerations and Limitations -- 7.7 Disk-Based Solutions -- 7.8 Disk to Disk -- 7.9 Disk Staging -- 7.10 Virtual Tape -- 7.11 Disk-Based Data Protection Implementation Issues -- 7.12 Conclusion -- 8. Disk-Based Protection Technologies -- 8.1 Introduction.
8.2 Disk Synthetic Backup -- 8.3 Online Protection: CDP -- 8.4 Data Reduction: SIS -- 8.5 New Pricing Paradigms for Disk-Based Protection -- 8.6 Conclusion -- 9. Managing Data Life Cycle and Storage -- 9.1 Introduction -- 9.2 Issues Surrounding Data Life Cycle -- 9.3 Data Life Cycle Management -- 9.4 Application Considerations -- 9.5 Additional Considerations -- 9.6 Security -- 9.7 Compliance -- 9.8 Conclusion -- 10. Quality Control -- 10.1 Introduction -- 10.2 Quality Control as a Framework -- 10.3 Managing the Service Level Agreements (SLAs) -- 10.4 Protection by Business Unit -- 10.5 Application Considerations -- 10.6 Policy and Compliance -- 10.7 Cost Modelling -- 10.8 Security -- 10.9 Conclusion -- 11. Tools for the System -- 11.1 Introduction -- 11.2 HA -- 11.3 Provisioning -- 11.4 Virtualization -- 11.5 Summary -- Conclusion -- Glossary -- Appendix A -- Appendix B -- Index. |
Record Nr. | UNINA-9910143733403321 |
Little David B.
![]() |
||
Chichester, England ; , : John Wiley & Sons, , c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali |
Autore | Little David B. |
Pubbl/distr/stampa | Chichester, England ; , : John Wiley & Sons, , c2007 |
Descrizione fisica | 1 online resource (258 p.) |
Disciplina |
005.8
005.86 |
Altri autori (Persone) |
FarmerSkip
El-HilaliOussama |
Soggetto topico |
Data protection
Database management Data recovery (Computer science) Electronic data processing - Backup processing alternatives |
ISBN |
1-280-83896-5
9786610838967 0-470-03518-8 0-470-03519-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Acknowledgements -- Introduction -- 1. An Introduction to Data Protection Today -- 1.1 Introduction -- 1.2 Traditional Backup and Recovery -- 1.3 Hierarchical Storage Migration (HSM) -- 1.4 Disaster Recovery -- 1.5 Vaulting -- 1.6 Encryption -- 1.7 Management and Reporting -- 1.8 Summary -- 2. The Evolution -- 2.1 Introduction -- 2.2 Storage Virtualization -- 2.3 RAID -- 2.4 RAID Levels -- 2.5 What Mirroring and RAID Do Not Do -- 2.6 Replication -- 2.6.1 Host-Based Replication -- 2.6.2 RAID System Replication -- 2.7 Standby or DR Site -- 2.8 Summary -- 3. Backup Integration -- 3.1 Introduction -- 3.2 Snapshots -- 4. Bare Metal Restore -- 4.1 Introduction -- 4.2 Background -- 4.3 The Evolution of BMR Capabilities -- 4.4 Filling the Gap / Integrated BMR -- 4.5 The Problem of Dissimilar Disk Recovery -- 4.6 The Problem of Automating Disk Mapping -- 4.7 The Problem of Dissimilar System Recovery -- 4.8 The Current State of Integrated BMR -- 4.9 The Future of BMR -- 4.10 New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery -- 4.11 Large-Scale Automated Bare Metal Recovery -- 4.12 Summary -- 5. Management -- 5.1 Introduction 67 -- 5.2 Protecting Data Throughout Its Life Cycle -- 5.3 Architecting for Efficient Management -- 5.4 Reporting -- 5.5 Business Unit Chargeback -- 5.6 Conclusion -- 6. Security -- 6.1 Introduction -- 6.2 Encryption and Data Protection -- 6.3 Data Protection Application Security -- 6.4 Security Vulnerabilities in Data Protection Applications -- 6.5 Conclusion -- 7. New Features in Data Protection -- 7.1 Introduction -- 7.2 Synthetic Backups -- 7.3 Evolution of Synthetic Backups -- 7.4 Benefits of Synthetic Backups -- 7.5 Building a Synthetic Backup -- 7.6 Technical Considerations and Limitations -- 7.7 Disk-Based Solutions -- 7.8 Disk to Disk -- 7.9 Disk Staging -- 7.10 Virtual Tape -- 7.11 Disk-Based Data Protection Implementation Issues -- 7.12 Conclusion -- 8. Disk-Based Protection Technologies -- 8.1 Introduction.
8.2 Disk Synthetic Backup -- 8.3 Online Protection: CDP -- 8.4 Data Reduction: SIS -- 8.5 New Pricing Paradigms for Disk-Based Protection -- 8.6 Conclusion -- 9. Managing Data Life Cycle and Storage -- 9.1 Introduction -- 9.2 Issues Surrounding Data Life Cycle -- 9.3 Data Life Cycle Management -- 9.4 Application Considerations -- 9.5 Additional Considerations -- 9.6 Security -- 9.7 Compliance -- 9.8 Conclusion -- 10. Quality Control -- 10.1 Introduction -- 10.2 Quality Control as a Framework -- 10.3 Managing the Service Level Agreements (SLAs) -- 10.4 Protection by Business Unit -- 10.5 Application Considerations -- 10.6 Policy and Compliance -- 10.7 Cost Modelling -- 10.8 Security -- 10.9 Conclusion -- 11. Tools for the System -- 11.1 Introduction -- 11.2 HA -- 11.3 Provisioning -- 11.4 Virtualization -- 11.5 Summary -- Conclusion -- Glossary -- Appendix A -- Appendix B -- Index. |
Record Nr. | UNINA-9910830957303321 |
Little David B.
![]() |
||
Chichester, England ; , : John Wiley & Sons, , c2007 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Investigating windows systems / / Harlan Carvey |
Autore | Carvey Harlan |
Edizione | [1st edition] |
Pubbl/distr/stampa | London, England : , : Academic Press, , 2018 |
Descrizione fisica | 1 online resource (137 pages) |
Disciplina | 005.86 |
Soggetto topico |
Electronic data processing - Backup processing alternatives
Data recovery (Computer science) Proceso electrónico de datos |
ISBN | 0-12-811416-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910583352003321 |
Carvey Harlan
![]() |
||
London, England : , : Academic Press, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
A manager's guide to ISO22301 : practical guide to developing and implementing a business continuity management system / / Tony Drewitt |
Autore | Drewitt Tony |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, Cambridgeshire : , : IT Governance Publishing, , 2013 |
Descrizione fisica | 1 online resource (224 p.) |
Disciplina | 005.86 |
Soggetto topico |
Database management
Information technology - Management Risk management |
Soggetto genere / forma | Electronic books. |
ISBN | 1-84928-468-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
About the Author; Contents; Introduction; Chapter 1: Introducing Business Continuity Management; What is business continuity management?; Evolution; The business continuity management system (BCMS); The relationship between business continuity and disaster recovery; Cause and effect; BCM policy; What is policy?; The policy statement; Use of the policy; Chapter 2: Overview of the BCM Process; Context of the organisation; Understanding of the organisation and its context; Understanding the needs and expectations of interested parties
Determining the scope of the business continuity management systemBusiness continuity management system; Leadership; Policy; Roles, responsibilities and authorities; Planning; Support; Provision of resources; Competency of BCM personnel; Awareness and communication; Documentation; Operation; Business impact analysis; Risk assessment; BCM strategy; BCM response; Exercising and testing; Performance evaluation and improvement; The PDCA cycle; Practical programme management; Set-up phase; Ongoing/maintenance phase; End products; Resources; Governance and assurance processes Chapter 3: Business Impact Analysis and Risk AssessmentBusiness impact analysis; What is BIA?; Non-financial impacts; Impact treatment; Identifying the activities; Suppliers; Collecting the data; Impact data analysis; Recovery time objectives; Partial and full recovery; Tools; The role of insurance; Disaster recovery resources; Mapping and analysis; Identifying resources; Conflicts; Tools; Risk identification, assessment and management; What is risk?; Practical operational risk management; Risk identification; Scope; Custom and practice; Threats; Multiple threats; Risk assessment The risk matrixRisk appetite; Risk analysis; Risk control and treatment; Preventative and curative measures; The risk management process; Chapter 4: Business Continuity Strategy; IT disaster recovery; Availability; Failover; The ITDR marketplace; Reciprocal and co-operative arrangements; Go out and buy it; People; The rest of the resource spectrum; BCM objectives; Deliverables; Chapter 5: Business Continuity Procedures; The incident response structure; Command structure - teams and roles; Teams and structure; Roles; Collecting information; Communicating with stakeholders Team resilience - deputiesTriggering the BCM response - activation; Business continuity planning; Master plan; Summary; Activation; Command location; Command structure; Priorities and objectives; Scenario plans; Recovery plans; Other plan components; Procedures; Incident log; Internal communication; Contact data; How the plan works; Multilevel (organisational) plans; Ending the business continuity phase; Recovery; Chapter 6: Exercising and Testing; Exercises; Planning the exercise; Execution; Reporting; Chapter 7: Performance Evaluation; Monitoring and measurement; Criteria; The BCMS Internal audit |
Record Nr. | UNINA-9910462847903321 |
Drewitt Tony
![]() |
||
Ely, Cambridgeshire : , : IT Governance Publishing, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others] |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (XVII, 867 p.) |
Disciplina | 005.86 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico | Electronic data processing - Backup processing alternatives |
ISBN | 3-540-77024-0 |
Classificazione |
DAT 461f
ELT 745f SS 4800 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Speech -- Routing -- Protocol -- Energy Efficiency -- Data Processing -- Self-organization and Synchronization -- Deployment and Application -- Security. |
Record Nr. | UNISA-996465863603316 |
Berlin, Heidelberg : , : Springer-Verlag, , [2007] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others] |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (XVII, 867 p.) |
Disciplina | 005.86 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico | Electronic data processing - Backup processing alternatives |
ISBN | 3-540-77024-0 |
Classificazione |
DAT 461f
ELT 745f SS 4800 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Speech -- Routing -- Protocol -- Energy Efficiency -- Data Processing -- Self-organization and Synchronization -- Deployment and Application -- Security. |
Record Nr. | UNINA-9910484448203321 |
Berlin, Heidelberg : , : Springer-Verlag, , [2007] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Replication [[electronic resource] ] : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (297 p.) |
Disciplina | 005.86 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer programming
Cryptography Data encryption (Computer science) Computer networks Computer science Database management Programming Techniques Cryptology Computer Communication Networks Computer Science Models of Computation Database Management |
ISBN |
1-280-38539-1
9786613563316 3-642-11294-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Consistency Models for Replicated Data -- Replication Techniques for Availability -- Modular Approach to Replication for Availability -- Stumbling over Consensus Research: Misunderstandings and Issues -- Replicating for Performance: Case Studies -- A History of the Virtual Synchrony Replication Model -- From Viewstamped Replication to Byzantine Fault Tolerance -- Implementing Trustworthy Services Using Replicated State Machines -- State Machine Replication with Byzantine Faults -- Selected Results from the Latest Decade of Quorum Systems Research -- From Object Replication to Database Replication -- Database Replication: A Tutorial -- Practical Database Replication. |
Record Nr. | UNISA-996465322203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Replication [[electronic resource] ] : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (297 p.) |
Disciplina | 005.86 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer programming
Cryptography Data encryption (Computer science) Computer networks Computer science Database management Programming Techniques Cryptology Computer Communication Networks Computer Science Models of Computation Database Management |
ISBN |
1-280-38539-1
9786613563316 3-642-11294-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Consistency Models for Replicated Data -- Replication Techniques for Availability -- Modular Approach to Replication for Availability -- Stumbling over Consensus Research: Misunderstandings and Issues -- Replicating for Performance: Case Studies -- A History of the Virtual Synchrony Replication Model -- From Viewstamped Replication to Byzantine Fault Tolerance -- Implementing Trustworthy Services Using Replicated State Machines -- State Machine Replication with Byzantine Faults -- Selected Results from the Latest Decade of Quorum Systems Research -- From Object Replication to Database Replication -- Database Replication: A Tutorial -- Practical Database Replication. |
Record Nr. | UNINA-9910482974603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
RMAN recipes for Oracle database 12c : a problem-solution approach / / Darl Kuhn, Sam Alapati, Arup Nanda ; foreword by Tim Gorman |
Autore | Kuhn Darl |
Edizione | [2nd ed. 2013.] |
Pubbl/distr/stampa | New York : , : Apress, , 2013 |
Descrizione fisica | 1 online resource (lxvi, 730 pages) : illustrations (some color) |
Disciplina |
004
005.74 005.86 |
Collana | The expert's voice in Oracle |
Soggetto topico |
Electronic data processing - Backup processing alternatives
Data recovery (Computer science) Relational databases |
ISBN | 1-4302-4837-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Contents at a Glance""; ""Contents""; ""Foreword""; ""About the Authors""; ""About the Technical Reviewers""; ""Acknowledgments""; ""Introduction""; ""Chapter 1: Backup and Recovery 101""; ""Types of Database Failures""; ""Statement Failure""; ""User Process Failure""; ""Network Failure""; ""Instance Failure""; ""User Error""; ""Media Failure""; ""Oracle Backup and Recovery Concepts""; ""Backup and Recovery Instance Architecture""; ""The Checkpoint Process""; ""The Log Writer Process""; ""The Archiver Process""; ""Physical Database Structures Used in Recovering Data""
""Archivelog and Noarchivelog Mode of Operation""""Flashback Technology""; ""Backup Types""; ""Physical and Logical Backups""; ""Whole and Partial Backups""; ""Online and Offline Backups""; ""Full and Incremental Backups""; ""Consistent and Inconsistent Backups""; ""Recovery Types""; ""Database Recovery and Consistent vs. Inconsistent Backups""; ""Crash Recovery and Media Recovery""; ""Crash Recovery""; ""Media Recovery""; ""Complete and Point-in-Time Recovery""; ""Deciding on the Appropriate Recovery Technique""; ""RMAN Architecture""; ""Benefits of Using RMAN"" ""Backup and Recovery Best Practices""""Configure a Fast Recovery Area""; ""Make and Protect a Database Redundancy Set""; ""Create Powerful Backup Strategies""; ""Schedule Regular Backups""; ""Create Regular Backups of the Control File""; ""Run the Database in Archivelog Mode""; ""Multiplex the Control File""; ""Multiplex the Redo Log Groups""; ""Adopt the Right Backup Storage Strategy""; ""Plan Your Backup-Retention Duration""; ""Plan Your Backup Schedules""; ""Validate Your Recovery Strategy""; ""Conduct Regular Trial Recoveries""; ""Record Accurate Software and Hardware Configuration"" ""Chapter 2: Jump-Starting RMAN""""2-1. Connecting to Your Database""; ""Problem""; ""Solution""; ""Establishing OS Variables""; ""Using OS Authentication""; ""Using a Password File""; ""How It Works""; ""Explaining OS Authentication""; ""Explaining Password File Authentication""; ""2-2. Starting and Stopping Your Database""; ""Problem""; ""Solution""; ""How It Works""; ""2-3. Toggling Archivelog Mode""; ""Problem""; ""Solution""; ""Enabling Archivelog Mode""; ""Disabling Archivelog Mode""; ""How It Works""; ""2-4. Connecting to RMAN""; ""Problem""; ""Solution""; ""How It Works"" ""2-5. Backing Up Your Database""""Problem""; ""Solution""; ""How It Works""; ""2-6. Simulating a Failure""; ""Problem""; ""Solution""; ""How It Works""; ""2-7. Restoring and Recovering Your Database""; ""Problem""; ""Solution""; ""How It Works""; ""Chapter 3: Using the Fast Recovery Area""; ""3-1. Creating the Fast Recovery Area""; ""Problem""; ""Solution""; ""How It Works""; ""3-2. Writing Regular RMAN Backups to the FRA""; ""Problem""; ""Solution""; ""How It Works""; ""3-3. Freeing FRA Space in an Emergency""; ""Problem""; ""Solution 1: Delete Unneeded Files"" ""Solution 2: Increase Space"" |
Record Nr. | UNINA-9910438097603321 |
Kuhn Darl
![]() |
||
New York : , : Apress, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|