top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali
Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali
Autore Little David B.
Pubbl/distr/stampa Chichester, England ; , : John Wiley & Sons, , c2007
Descrizione fisica 1 online resource (258 p.)
Disciplina 005.8
005.86
Altri autori (Persone) FarmerSkip
El-HilaliOussama
Soggetto topico Data protection
Database management
Data recovery (Computer science)
Electronic data processing - Backup processing alternatives
ISBN 1-280-83896-5
9786610838967
0-470-03518-8
0-470-03519-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Acknowledgements -- Introduction -- 1. An Introduction to Data Protection Today -- 1.1 Introduction -- 1.2 Traditional Backup and Recovery -- 1.3 Hierarchical Storage Migration (HSM) -- 1.4 Disaster Recovery -- 1.5 Vaulting -- 1.6 Encryption -- 1.7 Management and Reporting -- 1.8 Summary -- 2. The Evolution -- 2.1 Introduction -- 2.2 Storage Virtualization -- 2.3 RAID -- 2.4 RAID Levels -- 2.5 What Mirroring and RAID Do Not Do -- 2.6 Replication -- 2.6.1 Host-Based Replication -- 2.6.2 RAID System Replication -- 2.7 Standby or DR Site -- 2.8 Summary -- 3. Backup Integration -- 3.1 Introduction -- 3.2 Snapshots -- 4. Bare Metal Restore -- 4.1 Introduction -- 4.2 Background -- 4.3 The Evolution of BMR Capabilities -- 4.4 Filling the Gap / Integrated BMR -- 4.5 The Problem of Dissimilar Disk Recovery -- 4.6 The Problem of Automating Disk Mapping -- 4.7 The Problem of Dissimilar System Recovery -- 4.8 The Current State of Integrated BMR -- 4.9 The Future of BMR -- 4.10 New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery -- 4.11 Large-Scale Automated Bare Metal Recovery -- 4.12 Summary -- 5. Management -- 5.1 Introduction 67 -- 5.2 Protecting Data Throughout Its Life Cycle -- 5.3 Architecting for Efficient Management -- 5.4 Reporting -- 5.5 Business Unit Chargeback -- 5.6 Conclusion -- 6. Security -- 6.1 Introduction -- 6.2 Encryption and Data Protection -- 6.3 Data Protection Application Security -- 6.4 Security Vulnerabilities in Data Protection Applications -- 6.5 Conclusion -- 7. New Features in Data Protection -- 7.1 Introduction -- 7.2 Synthetic Backups -- 7.3 Evolution of Synthetic Backups -- 7.4 Benefits of Synthetic Backups -- 7.5 Building a Synthetic Backup -- 7.6 Technical Considerations and Limitations -- 7.7 Disk-Based Solutions -- 7.8 Disk to Disk -- 7.9 Disk Staging -- 7.10 Virtual Tape -- 7.11 Disk-Based Data Protection Implementation Issues -- 7.12 Conclusion -- 8. Disk-Based Protection Technologies -- 8.1 Introduction.
8.2 Disk Synthetic Backup -- 8.3 Online Protection: CDP -- 8.4 Data Reduction: SIS -- 8.5 New Pricing Paradigms for Disk-Based Protection -- 8.6 Conclusion -- 9. Managing Data Life Cycle and Storage -- 9.1 Introduction -- 9.2 Issues Surrounding Data Life Cycle -- 9.3 Data Life Cycle Management -- 9.4 Application Considerations -- 9.5 Additional Considerations -- 9.6 Security -- 9.7 Compliance -- 9.8 Conclusion -- 10. Quality Control -- 10.1 Introduction -- 10.2 Quality Control as a Framework -- 10.3 Managing the Service Level Agreements (SLAs) -- 10.4 Protection by Business Unit -- 10.5 Application Considerations -- 10.6 Policy and Compliance -- 10.7 Cost Modelling -- 10.8 Security -- 10.9 Conclusion -- 11. Tools for the System -- 11.1 Introduction -- 11.2 HA -- 11.3 Provisioning -- 11.4 Virtualization -- 11.5 Summary -- Conclusion -- Glossary -- Appendix A -- Appendix B -- Index.
Record Nr. UNINA-9910143733403321
Little David B.  
Chichester, England ; , : John Wiley & Sons, , c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali
Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali
Autore Little David B.
Pubbl/distr/stampa Chichester, England ; , : John Wiley & Sons, , c2007
Descrizione fisica 1 online resource (258 p.)
Disciplina 005.8
005.86
Altri autori (Persone) FarmerSkip
El-HilaliOussama
Soggetto topico Data protection
Database management
Data recovery (Computer science)
Electronic data processing - Backup processing alternatives
ISBN 1-280-83896-5
9786610838967
0-470-03518-8
0-470-03519-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Acknowledgements -- Introduction -- 1. An Introduction to Data Protection Today -- 1.1 Introduction -- 1.2 Traditional Backup and Recovery -- 1.3 Hierarchical Storage Migration (HSM) -- 1.4 Disaster Recovery -- 1.5 Vaulting -- 1.6 Encryption -- 1.7 Management and Reporting -- 1.8 Summary -- 2. The Evolution -- 2.1 Introduction -- 2.2 Storage Virtualization -- 2.3 RAID -- 2.4 RAID Levels -- 2.5 What Mirroring and RAID Do Not Do -- 2.6 Replication -- 2.6.1 Host-Based Replication -- 2.6.2 RAID System Replication -- 2.7 Standby or DR Site -- 2.8 Summary -- 3. Backup Integration -- 3.1 Introduction -- 3.2 Snapshots -- 4. Bare Metal Restore -- 4.1 Introduction -- 4.2 Background -- 4.3 The Evolution of BMR Capabilities -- 4.4 Filling the Gap / Integrated BMR -- 4.5 The Problem of Dissimilar Disk Recovery -- 4.6 The Problem of Automating Disk Mapping -- 4.7 The Problem of Dissimilar System Recovery -- 4.8 The Current State of Integrated BMR -- 4.9 The Future of BMR -- 4.10 New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery -- 4.11 Large-Scale Automated Bare Metal Recovery -- 4.12 Summary -- 5. Management -- 5.1 Introduction 67 -- 5.2 Protecting Data Throughout Its Life Cycle -- 5.3 Architecting for Efficient Management -- 5.4 Reporting -- 5.5 Business Unit Chargeback -- 5.6 Conclusion -- 6. Security -- 6.1 Introduction -- 6.2 Encryption and Data Protection -- 6.3 Data Protection Application Security -- 6.4 Security Vulnerabilities in Data Protection Applications -- 6.5 Conclusion -- 7. New Features in Data Protection -- 7.1 Introduction -- 7.2 Synthetic Backups -- 7.3 Evolution of Synthetic Backups -- 7.4 Benefits of Synthetic Backups -- 7.5 Building a Synthetic Backup -- 7.6 Technical Considerations and Limitations -- 7.7 Disk-Based Solutions -- 7.8 Disk to Disk -- 7.9 Disk Staging -- 7.10 Virtual Tape -- 7.11 Disk-Based Data Protection Implementation Issues -- 7.12 Conclusion -- 8. Disk-Based Protection Technologies -- 8.1 Introduction.
8.2 Disk Synthetic Backup -- 8.3 Online Protection: CDP -- 8.4 Data Reduction: SIS -- 8.5 New Pricing Paradigms for Disk-Based Protection -- 8.6 Conclusion -- 9. Managing Data Life Cycle and Storage -- 9.1 Introduction -- 9.2 Issues Surrounding Data Life Cycle -- 9.3 Data Life Cycle Management -- 9.4 Application Considerations -- 9.5 Additional Considerations -- 9.6 Security -- 9.7 Compliance -- 9.8 Conclusion -- 10. Quality Control -- 10.1 Introduction -- 10.2 Quality Control as a Framework -- 10.3 Managing the Service Level Agreements (SLAs) -- 10.4 Protection by Business Unit -- 10.5 Application Considerations -- 10.6 Policy and Compliance -- 10.7 Cost Modelling -- 10.8 Security -- 10.9 Conclusion -- 11. Tools for the System -- 11.1 Introduction -- 11.2 HA -- 11.3 Provisioning -- 11.4 Virtualization -- 11.5 Summary -- Conclusion -- Glossary -- Appendix A -- Appendix B -- Index.
Record Nr. UNINA-9910830957303321
Little David B.  
Chichester, England ; , : John Wiley & Sons, , c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Investigating windows systems / / Harlan Carvey
Investigating windows systems / / Harlan Carvey
Autore Carvey Harlan
Edizione [1st edition]
Pubbl/distr/stampa London, England : , : Academic Press, , 2018
Descrizione fisica 1 online resource (137 pages)
Disciplina 005.86
Soggetto topico Electronic data processing - Backup processing alternatives
Data recovery (Computer science)
Proceso electrónico de datos
ISBN 0-12-811416-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910583352003321
Carvey Harlan  
London, England : , : Academic Press, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
A manager's guide to ISO22301 : practical guide to developing and implementing a business continuity management system / / Tony Drewitt
A manager's guide to ISO22301 : practical guide to developing and implementing a business continuity management system / / Tony Drewitt
Autore Drewitt Tony
Edizione [1st edition]
Pubbl/distr/stampa Ely, Cambridgeshire : , : IT Governance Publishing, , 2013
Descrizione fisica 1 online resource (224 p.)
Disciplina 005.86
Soggetto topico Database management
Information technology - Management
Risk management
Soggetto genere / forma Electronic books.
ISBN 1-84928-468-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto About the Author; Contents; Introduction; Chapter 1: Introducing Business Continuity Management; What is business continuity management?; Evolution; The business continuity management system (BCMS); The relationship between business continuity and disaster recovery; Cause and effect; BCM policy; What is policy?; The policy statement; Use of the policy; Chapter 2: Overview of the BCM Process; Context of the organisation; Understanding of the organisation and its context; Understanding the needs and expectations of interested parties
Determining the scope of the business continuity management systemBusiness continuity management system; Leadership; Policy; Roles, responsibilities and authorities; Planning; Support; Provision of resources; Competency of BCM personnel; Awareness and communication; Documentation; Operation; Business impact analysis; Risk assessment; BCM strategy; BCM response; Exercising and testing; Performance evaluation and improvement; The PDCA cycle; Practical programme management; Set-up phase; Ongoing/maintenance phase; End products; Resources; Governance and assurance processes
Chapter 3: Business Impact Analysis and Risk AssessmentBusiness impact analysis; What is BIA?; Non-financial impacts; Impact treatment; Identifying the activities; Suppliers; Collecting the data; Impact data analysis; Recovery time objectives; Partial and full recovery; Tools; The role of insurance; Disaster recovery resources; Mapping and analysis; Identifying resources; Conflicts; Tools; Risk identification, assessment and management; What is risk?; Practical operational risk management; Risk identification; Scope; Custom and practice; Threats; Multiple threats; Risk assessment
The risk matrixRisk appetite; Risk analysis; Risk control and treatment; Preventative and curative measures; The risk management process; Chapter 4: Business Continuity Strategy; IT disaster recovery; Availability; Failover; The ITDR marketplace; Reciprocal and co-operative arrangements; Go out and buy it; People; The rest of the resource spectrum; BCM objectives; Deliverables; Chapter 5: Business Continuity Procedures; The incident response structure; Command structure - teams and roles; Teams and structure; Roles; Collecting information; Communicating with stakeholders
Team resilience - deputiesTriggering the BCM response - activation; Business continuity planning; Master plan; Summary; Activation; Command location; Command structure; Priorities and objectives; Scenario plans; Recovery plans; Other plan components; Procedures; Incident log; Internal communication; Contact data; How the plan works; Multilevel (organisational) plans; Ending the business continuity phase; Recovery; Chapter 6: Exercising and Testing; Exercises; Planning the exercise; Execution; Reporting; Chapter 7: Performance Evaluation; Monitoring and measurement; Criteria; The BCMS
Internal audit
Record Nr. UNINA-9910462847903321
Drewitt Tony  
Ely, Cambridgeshire : , : IT Governance Publishing, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others]
Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others]
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (XVII, 867 p.)
Disciplina 005.86
Collana Computer Communication Networks and Telecommunications
Soggetto topico Electronic data processing - Backup processing alternatives
ISBN 3-540-77024-0
Classificazione DAT 461f
ELT 745f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Routing -- Protocol -- Energy Efficiency -- Data Processing -- Self-organization and Synchronization -- Deployment and Application -- Security.
Record Nr. UNISA-996465863603316
Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others]
Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others]
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (XVII, 867 p.)
Disciplina 005.86
Collana Computer Communication Networks and Telecommunications
Soggetto topico Electronic data processing - Backup processing alternatives
ISBN 3-540-77024-0
Classificazione DAT 461f
ELT 745f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Speech -- Routing -- Protocol -- Energy Efficiency -- Data Processing -- Self-organization and Synchronization -- Deployment and Application -- Security.
Record Nr. UNINA-9910484448203321
Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Replication [[electronic resource] ] : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper
Replication [[electronic resource] ] : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (297 p.)
Disciplina 005.86
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer programming
Cryptography
Data encryption (Computer science)
Computer networks
Computer science
Database management
Programming Techniques
Cryptology
Computer Communication Networks
Computer Science
Models of Computation
Database Management
ISBN 1-280-38539-1
9786613563316
3-642-11294-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Consistency Models for Replicated Data -- Replication Techniques for Availability -- Modular Approach to Replication for Availability -- Stumbling over Consensus Research: Misunderstandings and Issues -- Replicating for Performance: Case Studies -- A History of the Virtual Synchrony Replication Model -- From Viewstamped Replication to Byzantine Fault Tolerance -- Implementing Trustworthy Services Using Replicated State Machines -- State Machine Replication with Byzantine Faults -- Selected Results from the Latest Decade of Quorum Systems Research -- From Object Replication to Database Replication -- Database Replication: A Tutorial -- Practical Database Replication.
Record Nr. UNISA-996465322203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Replication [[electronic resource] ] : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper
Replication [[electronic resource] ] : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (297 p.)
Disciplina 005.86
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer programming
Cryptography
Data encryption (Computer science)
Computer networks
Computer science
Database management
Programming Techniques
Cryptology
Computer Communication Networks
Computer Science
Models of Computation
Database Management
ISBN 1-280-38539-1
9786613563316
3-642-11294-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Consistency Models for Replicated Data -- Replication Techniques for Availability -- Modular Approach to Replication for Availability -- Stumbling over Consensus Research: Misunderstandings and Issues -- Replicating for Performance: Case Studies -- A History of the Virtual Synchrony Replication Model -- From Viewstamped Replication to Byzantine Fault Tolerance -- Implementing Trustworthy Services Using Replicated State Machines -- State Machine Replication with Byzantine Faults -- Selected Results from the Latest Decade of Quorum Systems Research -- From Object Replication to Database Replication -- Database Replication: A Tutorial -- Practical Database Replication.
Record Nr. UNINA-9910482974603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
RMAN recipes for Oracle database 12c : a problem-solution approach / / Darl Kuhn, Sam Alapati, Arup Nanda ; foreword by Tim Gorman
RMAN recipes for Oracle database 12c : a problem-solution approach / / Darl Kuhn, Sam Alapati, Arup Nanda ; foreword by Tim Gorman
Autore Kuhn Darl
Edizione [2nd ed. 2013.]
Pubbl/distr/stampa New York : , : Apress, , 2013
Descrizione fisica 1 online resource (lxvi, 730 pages) : illustrations (some color)
Disciplina 004
005.74
005.86
Collana The expert's voice in Oracle
Soggetto topico Electronic data processing - Backup processing alternatives
Data recovery (Computer science)
Relational databases
ISBN 1-4302-4837-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Contents at a Glance""; ""Contents""; ""Foreword""; ""About the Authors""; ""About the Technical Reviewers""; ""Acknowledgments""; ""Introduction""; ""Chapter 1: Backup and Recovery 101""; ""Types of Database Failures""; ""Statement Failure""; ""User Process Failure""; ""Network Failure""; ""Instance Failure""; ""User Error""; ""Media Failure""; ""Oracle Backup and Recovery Concepts""; ""Backup and Recovery Instance Architecture""; ""The Checkpoint Process""; ""The Log Writer Process""; ""The Archiver Process""; ""Physical Database Structures Used in Recovering Data""
""Archivelog and Noarchivelog Mode of Operation""""Flashback Technology""; ""Backup Types""; ""Physical and Logical Backups""; ""Whole and Partial Backups""; ""Online and Offline Backups""; ""Full and Incremental Backups""; ""Consistent and Inconsistent Backups""; ""Recovery Types""; ""Database Recovery and Consistent vs. Inconsistent Backups""; ""Crash Recovery and Media Recovery""; ""Crash Recovery""; ""Media Recovery""; ""Complete and Point-in-Time Recovery""; ""Deciding on the Appropriate Recovery Technique""; ""RMAN Architecture""; ""Benefits of Using RMAN""
""Backup and Recovery Best Practices""""Configure a Fast Recovery Area""; ""Make and Protect a Database Redundancy Set""; ""Create Powerful Backup Strategies""; ""Schedule Regular Backups""; ""Create Regular Backups of the Control File""; ""Run the Database in Archivelog Mode""; ""Multiplex the Control File""; ""Multiplex the Redo Log Groups""; ""Adopt the Right Backup Storage Strategy""; ""Plan Your Backup-Retention Duration""; ""Plan Your Backup Schedules""; ""Validate Your Recovery Strategy""; ""Conduct Regular Trial Recoveries""; ""Record Accurate Software and Hardware Configuration""
""Chapter 2: Jump-Starting RMAN""""2-1. Connecting to Your Database""; ""Problem""; ""Solution""; ""Establishing OS Variables""; ""Using OS Authentication""; ""Using a Password File""; ""How It Works""; ""Explaining OS Authentication""; ""Explaining Password File Authentication""; ""2-2. Starting and Stopping Your Database""; ""Problem""; ""Solution""; ""How It Works""; ""2-3. Toggling Archivelog Mode""; ""Problem""; ""Solution""; ""Enabling Archivelog Mode""; ""Disabling Archivelog Mode""; ""How It Works""; ""2-4. Connecting to RMAN""; ""Problem""; ""Solution""; ""How It Works""
""2-5. Backing Up Your Database""""Problem""; ""Solution""; ""How It Works""; ""2-6. Simulating a Failure""; ""Problem""; ""Solution""; ""How It Works""; ""2-7. Restoring and Recovering Your Database""; ""Problem""; ""Solution""; ""How It Works""; ""Chapter 3: Using the Fast Recovery Area""; ""3-1. Creating the Fast Recovery Area""; ""Problem""; ""Solution""; ""How It Works""; ""3-2. Writing Regular RMAN Backups to the FRA""; ""Problem""; ""Solution""; ""How It Works""; ""3-3. Freeing FRA Space in an Emergency""; ""Problem""; ""Solution 1: Delete Unneeded Files""
""Solution 2: Increase Space""
Record Nr. UNINA-9910438097603321
Kuhn Darl  
New York : , : Apress, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui