top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali
Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali
Autore Little David B.
Pubbl/distr/stampa Chichester, England ; , : John Wiley & Sons, , c2007
Descrizione fisica 1 online resource (258 p.)
Disciplina 005.8
005.86
Altri autori (Persone) FarmerSkip
El-HilaliOussama
Soggetto topico Data protection
Database management
Data recovery (Computer science)
Electronic data processing - Backup processing alternatives
ISBN 1-280-83896-5
9786610838967
0-470-03518-8
0-470-03519-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Acknowledgements -- Introduction -- 1. An Introduction to Data Protection Today -- 1.1 Introduction -- 1.2 Traditional Backup and Recovery -- 1.3 Hierarchical Storage Migration (HSM) -- 1.4 Disaster Recovery -- 1.5 Vaulting -- 1.6 Encryption -- 1.7 Management and Reporting -- 1.8 Summary -- 2. The Evolution -- 2.1 Introduction -- 2.2 Storage Virtualization -- 2.3 RAID -- 2.4 RAID Levels -- 2.5 What Mirroring and RAID Do Not Do -- 2.6 Replication -- 2.6.1 Host-Based Replication -- 2.6.2 RAID System Replication -- 2.7 Standby or DR Site -- 2.8 Summary -- 3. Backup Integration -- 3.1 Introduction -- 3.2 Snapshots -- 4. Bare Metal Restore -- 4.1 Introduction -- 4.2 Background -- 4.3 The Evolution of BMR Capabilities -- 4.4 Filling the Gap / Integrated BMR -- 4.5 The Problem of Dissimilar Disk Recovery -- 4.6 The Problem of Automating Disk Mapping -- 4.7 The Problem of Dissimilar System Recovery -- 4.8 The Current State of Integrated BMR -- 4.9 The Future of BMR -- 4.10 New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery -- 4.11 Large-Scale Automated Bare Metal Recovery -- 4.12 Summary -- 5. Management -- 5.1 Introduction 67 -- 5.2 Protecting Data Throughout Its Life Cycle -- 5.3 Architecting for Efficient Management -- 5.4 Reporting -- 5.5 Business Unit Chargeback -- 5.6 Conclusion -- 6. Security -- 6.1 Introduction -- 6.2 Encryption and Data Protection -- 6.3 Data Protection Application Security -- 6.4 Security Vulnerabilities in Data Protection Applications -- 6.5 Conclusion -- 7. New Features in Data Protection -- 7.1 Introduction -- 7.2 Synthetic Backups -- 7.3 Evolution of Synthetic Backups -- 7.4 Benefits of Synthetic Backups -- 7.5 Building a Synthetic Backup -- 7.6 Technical Considerations and Limitations -- 7.7 Disk-Based Solutions -- 7.8 Disk to Disk -- 7.9 Disk Staging -- 7.10 Virtual Tape -- 7.11 Disk-Based Data Protection Implementation Issues -- 7.12 Conclusion -- 8. Disk-Based Protection Technologies -- 8.1 Introduction.
8.2 Disk Synthetic Backup -- 8.3 Online Protection: CDP -- 8.4 Data Reduction: SIS -- 8.5 New Pricing Paradigms for Disk-Based Protection -- 8.6 Conclusion -- 9. Managing Data Life Cycle and Storage -- 9.1 Introduction -- 9.2 Issues Surrounding Data Life Cycle -- 9.3 Data Life Cycle Management -- 9.4 Application Considerations -- 9.5 Additional Considerations -- 9.6 Security -- 9.7 Compliance -- 9.8 Conclusion -- 10. Quality Control -- 10.1 Introduction -- 10.2 Quality Control as a Framework -- 10.3 Managing the Service Level Agreements (SLAs) -- 10.4 Protection by Business Unit -- 10.5 Application Considerations -- 10.6 Policy and Compliance -- 10.7 Cost Modelling -- 10.8 Security -- 10.9 Conclusion -- 11. Tools for the System -- 11.1 Introduction -- 11.2 HA -- 11.3 Provisioning -- 11.4 Virtualization -- 11.5 Summary -- Conclusion -- Glossary -- Appendix A -- Appendix B -- Index.
Record Nr. UNINA-9910143733403321
Little David B.  
Chichester, England ; , : John Wiley & Sons, , c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali
Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali
Autore Little David B.
Pubbl/distr/stampa Chichester, England ; , : John Wiley & Sons, , c2007
Descrizione fisica 1 online resource (258 p.)
Disciplina 005.8
005.86
Altri autori (Persone) FarmerSkip
El-HilaliOussama
Soggetto topico Data protection
Database management
Data recovery (Computer science)
Electronic data processing - Backup processing alternatives
ISBN 1-280-83896-5
9786610838967
0-470-03518-8
0-470-03519-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Acknowledgements -- Introduction -- 1. An Introduction to Data Protection Today -- 1.1 Introduction -- 1.2 Traditional Backup and Recovery -- 1.3 Hierarchical Storage Migration (HSM) -- 1.4 Disaster Recovery -- 1.5 Vaulting -- 1.6 Encryption -- 1.7 Management and Reporting -- 1.8 Summary -- 2. The Evolution -- 2.1 Introduction -- 2.2 Storage Virtualization -- 2.3 RAID -- 2.4 RAID Levels -- 2.5 What Mirroring and RAID Do Not Do -- 2.6 Replication -- 2.6.1 Host-Based Replication -- 2.6.2 RAID System Replication -- 2.7 Standby or DR Site -- 2.8 Summary -- 3. Backup Integration -- 3.1 Introduction -- 3.2 Snapshots -- 4. Bare Metal Restore -- 4.1 Introduction -- 4.2 Background -- 4.3 The Evolution of BMR Capabilities -- 4.4 Filling the Gap / Integrated BMR -- 4.5 The Problem of Dissimilar Disk Recovery -- 4.6 The Problem of Automating Disk Mapping -- 4.7 The Problem of Dissimilar System Recovery -- 4.8 The Current State of Integrated BMR -- 4.9 The Future of BMR -- 4.10 New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery -- 4.11 Large-Scale Automated Bare Metal Recovery -- 4.12 Summary -- 5. Management -- 5.1 Introduction 67 -- 5.2 Protecting Data Throughout Its Life Cycle -- 5.3 Architecting for Efficient Management -- 5.4 Reporting -- 5.5 Business Unit Chargeback -- 5.6 Conclusion -- 6. Security -- 6.1 Introduction -- 6.2 Encryption and Data Protection -- 6.3 Data Protection Application Security -- 6.4 Security Vulnerabilities in Data Protection Applications -- 6.5 Conclusion -- 7. New Features in Data Protection -- 7.1 Introduction -- 7.2 Synthetic Backups -- 7.3 Evolution of Synthetic Backups -- 7.4 Benefits of Synthetic Backups -- 7.5 Building a Synthetic Backup -- 7.6 Technical Considerations and Limitations -- 7.7 Disk-Based Solutions -- 7.8 Disk to Disk -- 7.9 Disk Staging -- 7.10 Virtual Tape -- 7.11 Disk-Based Data Protection Implementation Issues -- 7.12 Conclusion -- 8. Disk-Based Protection Technologies -- 8.1 Introduction.
8.2 Disk Synthetic Backup -- 8.3 Online Protection: CDP -- 8.4 Data Reduction: SIS -- 8.5 New Pricing Paradigms for Disk-Based Protection -- 8.6 Conclusion -- 9. Managing Data Life Cycle and Storage -- 9.1 Introduction -- 9.2 Issues Surrounding Data Life Cycle -- 9.3 Data Life Cycle Management -- 9.4 Application Considerations -- 9.5 Additional Considerations -- 9.6 Security -- 9.7 Compliance -- 9.8 Conclusion -- 10. Quality Control -- 10.1 Introduction -- 10.2 Quality Control as a Framework -- 10.3 Managing the Service Level Agreements (SLAs) -- 10.4 Protection by Business Unit -- 10.5 Application Considerations -- 10.6 Policy and Compliance -- 10.7 Cost Modelling -- 10.8 Security -- 10.9 Conclusion -- 11. Tools for the System -- 11.1 Introduction -- 11.2 HA -- 11.3 Provisioning -- 11.4 Virtualization -- 11.5 Summary -- Conclusion -- Glossary -- Appendix A -- Appendix B -- Index.
Record Nr. UNINA-9910830957303321
Little David B.  
Chichester, England ; , : John Wiley & Sons, , c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali
Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali
Autore Little David B
Pubbl/distr/stampa Chichester, : John Wiley, 2007
Descrizione fisica 1 online resource (258 p.)
Disciplina 005.8
005.86
Altri autori (Persone) FarmerSkip
El-HilaliOussama
Soggetto topico Data protection
Database management
Data recovery (Computer science)
Electronic data processing - Backup processing alternatives
ISBN 9786610838967
9781280838965
1280838965
9780470035184
0470035188
9780470035191
0470035196
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Acknowledgements -- Introduction -- 1. An Introduction to Data Protection Today -- 1.1 Introduction -- 1.2 Traditional Backup and Recovery -- 1.3 Hierarchical Storage Migration (HSM) -- 1.4 Disaster Recovery -- 1.5 Vaulting -- 1.6 Encryption -- 1.7 Management and Reporting -- 1.8 Summary -- 2. The Evolution -- 2.1 Introduction -- 2.2 Storage Virtualization -- 2.3 RAID -- 2.4 RAID Levels -- 2.5 What Mirroring and RAID Do Not Do -- 2.6 Replication -- 2.6.1 Host-Based Replication -- 2.6.2 RAID System Replication -- 2.7 Standby or DR Site -- 2.8 Summary -- 3. Backup Integration -- 3.1 Introduction -- 3.2 Snapshots -- 4. Bare Metal Restore -- 4.1 Introduction -- 4.2 Background -- 4.3 The Evolution of BMR Capabilities -- 4.4 Filling the Gap / Integrated BMR -- 4.5 The Problem of Dissimilar Disk Recovery -- 4.6 The Problem of Automating Disk Mapping -- 4.7 The Problem of Dissimilar System Recovery -- 4.8 The Current State of Integrated BMR -- 4.9 The Future of BMR -- 4.10 New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery -- 4.11 Large-Scale Automated Bare Metal Recovery -- 4.12 Summary -- 5. Management -- 5.1 Introduction 67 -- 5.2 Protecting Data Throughout Its Life Cycle -- 5.3 Architecting for Efficient Management -- 5.4 Reporting -- 5.5 Business Unit Chargeback -- 5.6 Conclusion -- 6. Security -- 6.1 Introduction -- 6.2 Encryption and Data Protection -- 6.3 Data Protection Application Security -- 6.4 Security Vulnerabilities in Data Protection Applications -- 6.5 Conclusion -- 7. New Features in Data Protection -- 7.1 Introduction -- 7.2 Synthetic Backups -- 7.3 Evolution of Synthetic Backups -- 7.4 Benefits of Synthetic Backups -- 7.5 Building a Synthetic Backup -- 7.6 Technical Considerations and Limitations -- 7.7 Disk-Based Solutions -- 7.8 Disk to Disk -- 7.9 Disk Staging -- 7.10 Virtual Tape -- 7.11 Disk-Based Data Protection Implementation Issues -- 7.12 Conclusion -- 8. Disk-Based Protection Technologies -- 8.1 Introduction.
8.2 Disk Synthetic Backup -- 8.3 Online Protection: CDP -- 8.4 Data Reduction: SIS -- 8.5 New Pricing Paradigms for Disk-Based Protection -- 8.6 Conclusion -- 9. Managing Data Life Cycle and Storage -- 9.1 Introduction -- 9.2 Issues Surrounding Data Life Cycle -- 9.3 Data Life Cycle Management -- 9.4 Application Considerations -- 9.5 Additional Considerations -- 9.6 Security -- 9.7 Compliance -- 9.8 Conclusion -- 10. Quality Control -- 10.1 Introduction -- 10.2 Quality Control as a Framework -- 10.3 Managing the Service Level Agreements (SLAs) -- 10.4 Protection by Business Unit -- 10.5 Application Considerations -- 10.6 Policy and Compliance -- 10.7 Cost Modelling -- 10.8 Security -- 10.9 Conclusion -- 11. Tools for the System -- 11.1 Introduction -- 11.2 HA -- 11.3 Provisioning -- 11.4 Virtualization -- 11.5 Summary -- Conclusion -- Glossary -- Appendix A -- Appendix B -- Index.
Record Nr. UNINA-9911020117103321
Little David B  
Chichester, : John Wiley, 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Investigating windows systems / / Harlan Carvey
Investigating windows systems / / Harlan Carvey
Autore Carvey Harlan
Edizione [1st edition]
Pubbl/distr/stampa London, England : , : Academic Press, , 2018
Descrizione fisica 1 online resource (137 pages)
Disciplina 005.86
Soggetto topico Electronic data processing - Backup processing alternatives
Data recovery (Computer science)
Proceso electrónico de datos
ISBN 0-12-811416-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910583352003321
Carvey Harlan  
London, England : , : Academic Press, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
A manager's guide to ISO22301 : practical guide to developing and implementing a business continuity management system / / Tony Drewitt
A manager's guide to ISO22301 : practical guide to developing and implementing a business continuity management system / / Tony Drewitt
Autore Drewitt Tony
Edizione [1st edition]
Pubbl/distr/stampa Ely, Cambridgeshire : , : IT Governance Publishing, , 2013
Descrizione fisica 1 online resource (224 p.)
Disciplina 005.86
Soggetto topico Database management
Information technology - Management
Risk management
Soggetto genere / forma Electronic books.
ISBN 1-84928-468-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto About the Author; Contents; Introduction; Chapter 1: Introducing Business Continuity Management; What is business continuity management?; Evolution; The business continuity management system (BCMS); The relationship between business continuity and disaster recovery; Cause and effect; BCM policy; What is policy?; The policy statement; Use of the policy; Chapter 2: Overview of the BCM Process; Context of the organisation; Understanding of the organisation and its context; Understanding the needs and expectations of interested parties
Determining the scope of the business continuity management systemBusiness continuity management system; Leadership; Policy; Roles, responsibilities and authorities; Planning; Support; Provision of resources; Competency of BCM personnel; Awareness and communication; Documentation; Operation; Business impact analysis; Risk assessment; BCM strategy; BCM response; Exercising and testing; Performance evaluation and improvement; The PDCA cycle; Practical programme management; Set-up phase; Ongoing/maintenance phase; End products; Resources; Governance and assurance processes
Chapter 3: Business Impact Analysis and Risk AssessmentBusiness impact analysis; What is BIA?; Non-financial impacts; Impact treatment; Identifying the activities; Suppliers; Collecting the data; Impact data analysis; Recovery time objectives; Partial and full recovery; Tools; The role of insurance; Disaster recovery resources; Mapping and analysis; Identifying resources; Conflicts; Tools; Risk identification, assessment and management; What is risk?; Practical operational risk management; Risk identification; Scope; Custom and practice; Threats; Multiple threats; Risk assessment
The risk matrixRisk appetite; Risk analysis; Risk control and treatment; Preventative and curative measures; The risk management process; Chapter 4: Business Continuity Strategy; IT disaster recovery; Availability; Failover; The ITDR marketplace; Reciprocal and co-operative arrangements; Go out and buy it; People; The rest of the resource spectrum; BCM objectives; Deliverables; Chapter 5: Business Continuity Procedures; The incident response structure; Command structure - teams and roles; Teams and structure; Roles; Collecting information; Communicating with stakeholders
Team resilience - deputiesTriggering the BCM response - activation; Business continuity planning; Master plan; Summary; Activation; Command location; Command structure; Priorities and objectives; Scenario plans; Recovery plans; Other plan components; Procedures; Incident log; Internal communication; Contact data; How the plan works; Multilevel (organisational) plans; Ending the business continuity phase; Recovery; Chapter 6: Exercising and Testing; Exercises; Planning the exercise; Execution; Reporting; Chapter 7: Performance Evaluation; Monitoring and measurement; Criteria; The BCMS
Internal audit
Record Nr. UNINA-9910462847903321
Drewitt Tony  
Ely, Cambridgeshire : , : IT Governance Publishing, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
A manager's guide to ISO22301 : practical guide to developing and implementing a business continuity management system / / Tony Drewitt
A manager's guide to ISO22301 : practical guide to developing and implementing a business continuity management system / / Tony Drewitt
Autore Drewitt Tony
Edizione [1st edition]
Pubbl/distr/stampa IT Governance Publishing
Descrizione fisica 1 online resource (224 p.)
Disciplina 005.86
Soggetto topico Database management
Information technology - Management
Risk management
ISBN 9781628700060
1628700068
9781849284684
1849284687
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto About the Author; Contents; Introduction; Chapter 1: Introducing Business Continuity Management; What is business continuity management?; Evolution; The business continuity management system (BCMS); The relationship between business continuity and disaster recovery; Cause and effect; BCM policy; What is policy?; The policy statement; Use of the policy; Chapter 2: Overview of the BCM Process; Context of the organisation; Understanding of the organisation and its context; Understanding the needs and expectations of interested parties
Determining the scope of the business continuity management systemBusiness continuity management system; Leadership; Policy; Roles, responsibilities and authorities; Planning; Support; Provision of resources; Competency of BCM personnel; Awareness and communication; Documentation; Operation; Business impact analysis; Risk assessment; BCM strategy; BCM response; Exercising and testing; Performance evaluation and improvement; The PDCA cycle; Practical programme management; Set-up phase; Ongoing/maintenance phase; End products; Resources; Governance and assurance processes
Chapter 3: Business Impact Analysis and Risk AssessmentBusiness impact analysis; What is BIA?; Non-financial impacts; Impact treatment; Identifying the activities; Suppliers; Collecting the data; Impact data analysis; Recovery time objectives; Partial and full recovery; Tools; The role of insurance; Disaster recovery resources; Mapping and analysis; Identifying resources; Conflicts; Tools; Risk identification, assessment and management; What is risk?; Practical operational risk management; Risk identification; Scope; Custom and practice; Threats; Multiple threats; Risk assessment
The risk matrixRisk appetite; Risk analysis; Risk control and treatment; Preventative and curative measures; The risk management process; Chapter 4: Business Continuity Strategy; IT disaster recovery; Availability; Failover; The ITDR marketplace; Reciprocal and co-operative arrangements; Go out and buy it; People; The rest of the resource spectrum; BCM objectives; Deliverables; Chapter 5: Business Continuity Procedures; The incident response structure; Command structure - teams and roles; Teams and structure; Roles; Collecting information; Communicating with stakeholders
Team resilience - deputiesTriggering the BCM response - activation; Business continuity planning; Master plan; Summary; Activation; Command location; Command structure; Priorities and objectives; Scenario plans; Recovery plans; Other plan components; Procedures; Incident log; Internal communication; Contact data; How the plan works; Multilevel (organisational) plans; Ending the business continuity phase; Recovery; Chapter 6: Exercising and Testing; Exercises; Planning the exercise; Execution; Reporting; Chapter 7: Performance Evaluation; Monitoring and measurement; Criteria; The BCMS
Internal audit
Record Nr. UNINA-9911006553403321
Drewitt Tony  
IT Governance Publishing
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others]
Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others]
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (XVII, 867 p.)
Disciplina 005.86
Collana Computer Communication Networks and Telecommunications
Soggetto topico Electronic data processing - Backup processing alternatives
ISBN 3-540-77024-0
Classificazione DAT 461f
ELT 745f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Routing -- Protocol -- Energy Efficiency -- Data Processing -- Self-organization and Synchronization -- Deployment and Application -- Security.
Record Nr. UNISA-996465863603316
Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others]
Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others]
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (XVII, 867 p.)
Disciplina 005.86
Collana Computer Communication Networks and Telecommunications
Soggetto topico Electronic data processing - Backup processing alternatives
ISBN 3-540-77024-0
Classificazione DAT 461f
ELT 745f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Routing -- Protocol -- Energy Efficiency -- Data Processing -- Self-organization and Synchronization -- Deployment and Application -- Security.
Record Nr. UNINA-9910484448203321
Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Replication [[electronic resource] ] : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper
Replication [[electronic resource] ] : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (297 p.)
Disciplina 005.86
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer programming
Cryptography
Data encryption (Computer science)
Computer networks
Computer science
Database management
Programming Techniques
Cryptology
Computer Communication Networks
Computer Science
Models of Computation
Database Management
ISBN 1-280-38539-1
9786613563316
3-642-11294-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Consistency Models for Replicated Data -- Replication Techniques for Availability -- Modular Approach to Replication for Availability -- Stumbling over Consensus Research: Misunderstandings and Issues -- Replicating for Performance: Case Studies -- A History of the Virtual Synchrony Replication Model -- From Viewstamped Replication to Byzantine Fault Tolerance -- Implementing Trustworthy Services Using Replicated State Machines -- State Machine Replication with Byzantine Faults -- Selected Results from the Latest Decade of Quorum Systems Research -- From Object Replication to Database Replication -- Database Replication: A Tutorial -- Practical Database Replication.
Record Nr. UNISA-996465322203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Replication : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper
Replication : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (297 p.)
Disciplina 005.86
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer programming
Cryptography
Data encryption (Computer science)
Computer networks
Computer science
Database management
Programming Techniques
Cryptology
Computer Communication Networks
Computer Science
Models of Computation
Database Management
ISBN 1-280-38539-1
9786613563316
3-642-11294-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Consistency Models for Replicated Data -- Replication Techniques for Availability -- Modular Approach to Replication for Availability -- Stumbling over Consensus Research: Misunderstandings and Issues -- Replicating for Performance: Case Studies -- A History of the Virtual Synchrony Replication Model -- From Viewstamped Replication to Byzantine Fault Tolerance -- Implementing Trustworthy Services Using Replicated State Machines -- State Machine Replication with Byzantine Faults -- Selected Results from the Latest Decade of Quorum Systems Research -- From Object Replication to Database Replication -- Database Replication: A Tutorial -- Practical Database Replication.
Record Nr. UNINA-9910482974603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui