Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali
| Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali |
| Autore | Little David B. |
| Pubbl/distr/stampa | Chichester, England ; , : John Wiley & Sons, , c2007 |
| Descrizione fisica | 1 online resource (258 p.) |
| Disciplina |
005.8
005.86 |
| Altri autori (Persone) |
FarmerSkip
El-HilaliOussama |
| Soggetto topico |
Data protection
Database management Data recovery (Computer science) Electronic data processing - Backup processing alternatives |
| ISBN |
1-280-83896-5
9786610838967 0-470-03518-8 0-470-03519-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Acknowledgements -- Introduction -- 1. An Introduction to Data Protection Today -- 1.1 Introduction -- 1.2 Traditional Backup and Recovery -- 1.3 Hierarchical Storage Migration (HSM) -- 1.4 Disaster Recovery -- 1.5 Vaulting -- 1.6 Encryption -- 1.7 Management and Reporting -- 1.8 Summary -- 2. The Evolution -- 2.1 Introduction -- 2.2 Storage Virtualization -- 2.3 RAID -- 2.4 RAID Levels -- 2.5 What Mirroring and RAID Do Not Do -- 2.6 Replication -- 2.6.1 Host-Based Replication -- 2.6.2 RAID System Replication -- 2.7 Standby or DR Site -- 2.8 Summary -- 3. Backup Integration -- 3.1 Introduction -- 3.2 Snapshots -- 4. Bare Metal Restore -- 4.1 Introduction -- 4.2 Background -- 4.3 The Evolution of BMR Capabilities -- 4.4 Filling the Gap / Integrated BMR -- 4.5 The Problem of Dissimilar Disk Recovery -- 4.6 The Problem of Automating Disk Mapping -- 4.7 The Problem of Dissimilar System Recovery -- 4.8 The Current State of Integrated BMR -- 4.9 The Future of BMR -- 4.10 New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery -- 4.11 Large-Scale Automated Bare Metal Recovery -- 4.12 Summary -- 5. Management -- 5.1 Introduction 67 -- 5.2 Protecting Data Throughout Its Life Cycle -- 5.3 Architecting for Efficient Management -- 5.4 Reporting -- 5.5 Business Unit Chargeback -- 5.6 Conclusion -- 6. Security -- 6.1 Introduction -- 6.2 Encryption and Data Protection -- 6.3 Data Protection Application Security -- 6.4 Security Vulnerabilities in Data Protection Applications -- 6.5 Conclusion -- 7. New Features in Data Protection -- 7.1 Introduction -- 7.2 Synthetic Backups -- 7.3 Evolution of Synthetic Backups -- 7.4 Benefits of Synthetic Backups -- 7.5 Building a Synthetic Backup -- 7.6 Technical Considerations and Limitations -- 7.7 Disk-Based Solutions -- 7.8 Disk to Disk -- 7.9 Disk Staging -- 7.10 Virtual Tape -- 7.11 Disk-Based Data Protection Implementation Issues -- 7.12 Conclusion -- 8. Disk-Based Protection Technologies -- 8.1 Introduction.
8.2 Disk Synthetic Backup -- 8.3 Online Protection: CDP -- 8.4 Data Reduction: SIS -- 8.5 New Pricing Paradigms for Disk-Based Protection -- 8.6 Conclusion -- 9. Managing Data Life Cycle and Storage -- 9.1 Introduction -- 9.2 Issues Surrounding Data Life Cycle -- 9.3 Data Life Cycle Management -- 9.4 Application Considerations -- 9.5 Additional Considerations -- 9.6 Security -- 9.7 Compliance -- 9.8 Conclusion -- 10. Quality Control -- 10.1 Introduction -- 10.2 Quality Control as a Framework -- 10.3 Managing the Service Level Agreements (SLAs) -- 10.4 Protection by Business Unit -- 10.5 Application Considerations -- 10.6 Policy and Compliance -- 10.7 Cost Modelling -- 10.8 Security -- 10.9 Conclusion -- 11. Tools for the System -- 11.1 Introduction -- 11.2 HA -- 11.3 Provisioning -- 11.4 Virtualization -- 11.5 Summary -- Conclusion -- Glossary -- Appendix A -- Appendix B -- Index. |
| Record Nr. | UNINA-9910143733403321 |
Little David B.
|
||
| Chichester, England ; , : John Wiley & Sons, , c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali
| Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali |
| Autore | Little David B. |
| Pubbl/distr/stampa | Chichester, England ; , : John Wiley & Sons, , c2007 |
| Descrizione fisica | 1 online resource (258 p.) |
| Disciplina |
005.8
005.86 |
| Altri autori (Persone) |
FarmerSkip
El-HilaliOussama |
| Soggetto topico |
Data protection
Database management Data recovery (Computer science) Electronic data processing - Backup processing alternatives |
| ISBN |
1-280-83896-5
9786610838967 0-470-03518-8 0-470-03519-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Acknowledgements -- Introduction -- 1. An Introduction to Data Protection Today -- 1.1 Introduction -- 1.2 Traditional Backup and Recovery -- 1.3 Hierarchical Storage Migration (HSM) -- 1.4 Disaster Recovery -- 1.5 Vaulting -- 1.6 Encryption -- 1.7 Management and Reporting -- 1.8 Summary -- 2. The Evolution -- 2.1 Introduction -- 2.2 Storage Virtualization -- 2.3 RAID -- 2.4 RAID Levels -- 2.5 What Mirroring and RAID Do Not Do -- 2.6 Replication -- 2.6.1 Host-Based Replication -- 2.6.2 RAID System Replication -- 2.7 Standby or DR Site -- 2.8 Summary -- 3. Backup Integration -- 3.1 Introduction -- 3.2 Snapshots -- 4. Bare Metal Restore -- 4.1 Introduction -- 4.2 Background -- 4.3 The Evolution of BMR Capabilities -- 4.4 Filling the Gap / Integrated BMR -- 4.5 The Problem of Dissimilar Disk Recovery -- 4.6 The Problem of Automating Disk Mapping -- 4.7 The Problem of Dissimilar System Recovery -- 4.8 The Current State of Integrated BMR -- 4.9 The Future of BMR -- 4.10 New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery -- 4.11 Large-Scale Automated Bare Metal Recovery -- 4.12 Summary -- 5. Management -- 5.1 Introduction 67 -- 5.2 Protecting Data Throughout Its Life Cycle -- 5.3 Architecting for Efficient Management -- 5.4 Reporting -- 5.5 Business Unit Chargeback -- 5.6 Conclusion -- 6. Security -- 6.1 Introduction -- 6.2 Encryption and Data Protection -- 6.3 Data Protection Application Security -- 6.4 Security Vulnerabilities in Data Protection Applications -- 6.5 Conclusion -- 7. New Features in Data Protection -- 7.1 Introduction -- 7.2 Synthetic Backups -- 7.3 Evolution of Synthetic Backups -- 7.4 Benefits of Synthetic Backups -- 7.5 Building a Synthetic Backup -- 7.6 Technical Considerations and Limitations -- 7.7 Disk-Based Solutions -- 7.8 Disk to Disk -- 7.9 Disk Staging -- 7.10 Virtual Tape -- 7.11 Disk-Based Data Protection Implementation Issues -- 7.12 Conclusion -- 8. Disk-Based Protection Technologies -- 8.1 Introduction.
8.2 Disk Synthetic Backup -- 8.3 Online Protection: CDP -- 8.4 Data Reduction: SIS -- 8.5 New Pricing Paradigms for Disk-Based Protection -- 8.6 Conclusion -- 9. Managing Data Life Cycle and Storage -- 9.1 Introduction -- 9.2 Issues Surrounding Data Life Cycle -- 9.3 Data Life Cycle Management -- 9.4 Application Considerations -- 9.5 Additional Considerations -- 9.6 Security -- 9.7 Compliance -- 9.8 Conclusion -- 10. Quality Control -- 10.1 Introduction -- 10.2 Quality Control as a Framework -- 10.3 Managing the Service Level Agreements (SLAs) -- 10.4 Protection by Business Unit -- 10.5 Application Considerations -- 10.6 Policy and Compliance -- 10.7 Cost Modelling -- 10.8 Security -- 10.9 Conclusion -- 11. Tools for the System -- 11.1 Introduction -- 11.2 HA -- 11.3 Provisioning -- 11.4 Virtualization -- 11.5 Summary -- Conclusion -- Glossary -- Appendix A -- Appendix B -- Index. |
| Record Nr. | UNINA-9910830957303321 |
Little David B.
|
||
| Chichester, England ; , : John Wiley & Sons, , c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali
| Digital data integrity : the evolution from passive protection to active management / / David B. Little, Skip Farmer, Oussama El-Hilali |
| Autore | Little David B |
| Pubbl/distr/stampa | Chichester, : John Wiley, 2007 |
| Descrizione fisica | 1 online resource (258 p.) |
| Disciplina |
005.8
005.86 |
| Altri autori (Persone) |
FarmerSkip
El-HilaliOussama |
| Soggetto topico |
Data protection
Database management Data recovery (Computer science) Electronic data processing - Backup processing alternatives |
| ISBN |
9786610838967
9781280838965 1280838965 9780470035184 0470035188 9780470035191 0470035196 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Acknowledgements -- Introduction -- 1. An Introduction to Data Protection Today -- 1.1 Introduction -- 1.2 Traditional Backup and Recovery -- 1.3 Hierarchical Storage Migration (HSM) -- 1.4 Disaster Recovery -- 1.5 Vaulting -- 1.6 Encryption -- 1.7 Management and Reporting -- 1.8 Summary -- 2. The Evolution -- 2.1 Introduction -- 2.2 Storage Virtualization -- 2.3 RAID -- 2.4 RAID Levels -- 2.5 What Mirroring and RAID Do Not Do -- 2.6 Replication -- 2.6.1 Host-Based Replication -- 2.6.2 RAID System Replication -- 2.7 Standby or DR Site -- 2.8 Summary -- 3. Backup Integration -- 3.1 Introduction -- 3.2 Snapshots -- 4. Bare Metal Restore -- 4.1 Introduction -- 4.2 Background -- 4.3 The Evolution of BMR Capabilities -- 4.4 Filling the Gap / Integrated BMR -- 4.5 The Problem of Dissimilar Disk Recovery -- 4.6 The Problem of Automating Disk Mapping -- 4.7 The Problem of Dissimilar System Recovery -- 4.8 The Current State of Integrated BMR -- 4.9 The Future of BMR -- 4.10 New Capabilities and Challenges in Data Protection and the Effect on Bare Metal Recovery -- 4.11 Large-Scale Automated Bare Metal Recovery -- 4.12 Summary -- 5. Management -- 5.1 Introduction 67 -- 5.2 Protecting Data Throughout Its Life Cycle -- 5.3 Architecting for Efficient Management -- 5.4 Reporting -- 5.5 Business Unit Chargeback -- 5.6 Conclusion -- 6. Security -- 6.1 Introduction -- 6.2 Encryption and Data Protection -- 6.3 Data Protection Application Security -- 6.4 Security Vulnerabilities in Data Protection Applications -- 6.5 Conclusion -- 7. New Features in Data Protection -- 7.1 Introduction -- 7.2 Synthetic Backups -- 7.3 Evolution of Synthetic Backups -- 7.4 Benefits of Synthetic Backups -- 7.5 Building a Synthetic Backup -- 7.6 Technical Considerations and Limitations -- 7.7 Disk-Based Solutions -- 7.8 Disk to Disk -- 7.9 Disk Staging -- 7.10 Virtual Tape -- 7.11 Disk-Based Data Protection Implementation Issues -- 7.12 Conclusion -- 8. Disk-Based Protection Technologies -- 8.1 Introduction.
8.2 Disk Synthetic Backup -- 8.3 Online Protection: CDP -- 8.4 Data Reduction: SIS -- 8.5 New Pricing Paradigms for Disk-Based Protection -- 8.6 Conclusion -- 9. Managing Data Life Cycle and Storage -- 9.1 Introduction -- 9.2 Issues Surrounding Data Life Cycle -- 9.3 Data Life Cycle Management -- 9.4 Application Considerations -- 9.5 Additional Considerations -- 9.6 Security -- 9.7 Compliance -- 9.8 Conclusion -- 10. Quality Control -- 10.1 Introduction -- 10.2 Quality Control as a Framework -- 10.3 Managing the Service Level Agreements (SLAs) -- 10.4 Protection by Business Unit -- 10.5 Application Considerations -- 10.6 Policy and Compliance -- 10.7 Cost Modelling -- 10.8 Security -- 10.9 Conclusion -- 11. Tools for the System -- 11.1 Introduction -- 11.2 HA -- 11.3 Provisioning -- 11.4 Virtualization -- 11.5 Summary -- Conclusion -- Glossary -- Appendix A -- Appendix B -- Index. |
| Record Nr. | UNINA-9911020117103321 |
Little David B
|
||
| Chichester, : John Wiley, 2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Investigating windows systems / / Harlan Carvey
| Investigating windows systems / / Harlan Carvey |
| Autore | Carvey Harlan |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | London, England : , : Academic Press, , 2018 |
| Descrizione fisica | 1 online resource (137 pages) |
| Disciplina | 005.86 |
| Soggetto topico |
Electronic data processing - Backup processing alternatives
Data recovery (Computer science) Proceso electrónico de datos |
| ISBN | 0-12-811416-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910583352003321 |
Carvey Harlan
|
||
| London, England : , : Academic Press, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
A manager's guide to ISO22301 : practical guide to developing and implementing a business continuity management system / / Tony Drewitt
| A manager's guide to ISO22301 : practical guide to developing and implementing a business continuity management system / / Tony Drewitt |
| Autore | Drewitt Tony |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Ely, Cambridgeshire : , : IT Governance Publishing, , 2013 |
| Descrizione fisica | 1 online resource (224 p.) |
| Disciplina | 005.86 |
| Soggetto topico |
Database management
Information technology - Management Risk management |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-84928-468-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
About the Author; Contents; Introduction; Chapter 1: Introducing Business Continuity Management; What is business continuity management?; Evolution; The business continuity management system (BCMS); The relationship between business continuity and disaster recovery; Cause and effect; BCM policy; What is policy?; The policy statement; Use of the policy; Chapter 2: Overview of the BCM Process; Context of the organisation; Understanding of the organisation and its context; Understanding the needs and expectations of interested parties
Determining the scope of the business continuity management systemBusiness continuity management system; Leadership; Policy; Roles, responsibilities and authorities; Planning; Support; Provision of resources; Competency of BCM personnel; Awareness and communication; Documentation; Operation; Business impact analysis; Risk assessment; BCM strategy; BCM response; Exercising and testing; Performance evaluation and improvement; The PDCA cycle; Practical programme management; Set-up phase; Ongoing/maintenance phase; End products; Resources; Governance and assurance processes Chapter 3: Business Impact Analysis and Risk AssessmentBusiness impact analysis; What is BIA?; Non-financial impacts; Impact treatment; Identifying the activities; Suppliers; Collecting the data; Impact data analysis; Recovery time objectives; Partial and full recovery; Tools; The role of insurance; Disaster recovery resources; Mapping and analysis; Identifying resources; Conflicts; Tools; Risk identification, assessment and management; What is risk?; Practical operational risk management; Risk identification; Scope; Custom and practice; Threats; Multiple threats; Risk assessment The risk matrixRisk appetite; Risk analysis; Risk control and treatment; Preventative and curative measures; The risk management process; Chapter 4: Business Continuity Strategy; IT disaster recovery; Availability; Failover; The ITDR marketplace; Reciprocal and co-operative arrangements; Go out and buy it; People; The rest of the resource spectrum; BCM objectives; Deliverables; Chapter 5: Business Continuity Procedures; The incident response structure; Command structure - teams and roles; Teams and structure; Roles; Collecting information; Communicating with stakeholders Team resilience - deputiesTriggering the BCM response - activation; Business continuity planning; Master plan; Summary; Activation; Command location; Command structure; Priorities and objectives; Scenario plans; Recovery plans; Other plan components; Procedures; Incident log; Internal communication; Contact data; How the plan works; Multilevel (organisational) plans; Ending the business continuity phase; Recovery; Chapter 6: Exercising and Testing; Exercises; Planning the exercise; Execution; Reporting; Chapter 7: Performance Evaluation; Monitoring and measurement; Criteria; The BCMS Internal audit |
| Record Nr. | UNINA-9910462847903321 |
Drewitt Tony
|
||
| Ely, Cambridgeshire : , : IT Governance Publishing, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
A manager's guide to ISO22301 : practical guide to developing and implementing a business continuity management system / / Tony Drewitt
| A manager's guide to ISO22301 : practical guide to developing and implementing a business continuity management system / / Tony Drewitt |
| Autore | Drewitt Tony |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | IT Governance Publishing |
| Descrizione fisica | 1 online resource (224 p.) |
| Disciplina | 005.86 |
| Soggetto topico |
Database management
Information technology - Management Risk management |
| ISBN |
9781628700060
1628700068 9781849284684 1849284687 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
About the Author; Contents; Introduction; Chapter 1: Introducing Business Continuity Management; What is business continuity management?; Evolution; The business continuity management system (BCMS); The relationship between business continuity and disaster recovery; Cause and effect; BCM policy; What is policy?; The policy statement; Use of the policy; Chapter 2: Overview of the BCM Process; Context of the organisation; Understanding of the organisation and its context; Understanding the needs and expectations of interested parties
Determining the scope of the business continuity management systemBusiness continuity management system; Leadership; Policy; Roles, responsibilities and authorities; Planning; Support; Provision of resources; Competency of BCM personnel; Awareness and communication; Documentation; Operation; Business impact analysis; Risk assessment; BCM strategy; BCM response; Exercising and testing; Performance evaluation and improvement; The PDCA cycle; Practical programme management; Set-up phase; Ongoing/maintenance phase; End products; Resources; Governance and assurance processes Chapter 3: Business Impact Analysis and Risk AssessmentBusiness impact analysis; What is BIA?; Non-financial impacts; Impact treatment; Identifying the activities; Suppliers; Collecting the data; Impact data analysis; Recovery time objectives; Partial and full recovery; Tools; The role of insurance; Disaster recovery resources; Mapping and analysis; Identifying resources; Conflicts; Tools; Risk identification, assessment and management; What is risk?; Practical operational risk management; Risk identification; Scope; Custom and practice; Threats; Multiple threats; Risk assessment The risk matrixRisk appetite; Risk analysis; Risk control and treatment; Preventative and curative measures; The risk management process; Chapter 4: Business Continuity Strategy; IT disaster recovery; Availability; Failover; The ITDR marketplace; Reciprocal and co-operative arrangements; Go out and buy it; People; The rest of the resource spectrum; BCM objectives; Deliverables; Chapter 5: Business Continuity Procedures; The incident response structure; Command structure - teams and roles; Teams and structure; Roles; Collecting information; Communicating with stakeholders Team resilience - deputiesTriggering the BCM response - activation; Business continuity planning; Master plan; Summary; Activation; Command location; Command structure; Priorities and objectives; Scenario plans; Recovery plans; Other plan components; Procedures; Incident log; Internal communication; Contact data; How the plan works; Multilevel (organisational) plans; Ending the business continuity phase; Recovery; Chapter 6: Exercising and Testing; Exercises; Planning the exercise; Execution; Reporting; Chapter 7: Performance Evaluation; Monitoring and measurement; Criteria; The BCMS Internal audit |
| Record Nr. | UNINA-9911006553403321 |
Drewitt Tony
|
||
| IT Governance Publishing | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others]
| Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others] |
| Edizione | [1st ed. 2007.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2007] |
| Descrizione fisica | 1 online resource (XVII, 867 p.) |
| Disciplina | 005.86 |
| Collana | Computer Communication Networks and Telecommunications |
| Soggetto topico | Electronic data processing - Backup processing alternatives |
| ISBN | 3-540-77024-0 |
| Classificazione |
DAT 461f
ELT 745f SS 4800 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Keynote Speech -- Routing -- Protocol -- Energy Efficiency -- Data Processing -- Self-organization and Synchronization -- Deployment and Application -- Security. |
| Record Nr. | UNISA-996465863603316 |
| Berlin, Heidelberg : , : Springer-Verlag, , [2007] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others]
| Mobile ad-hoc and sensor networks / / edited by Hongke Zhang [and three others] |
| Edizione | [1st ed. 2007.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2007] |
| Descrizione fisica | 1 online resource (XVII, 867 p.) |
| Disciplina | 005.86 |
| Collana | Computer Communication Networks and Telecommunications |
| Soggetto topico | Electronic data processing - Backup processing alternatives |
| ISBN | 3-540-77024-0 |
| Classificazione |
DAT 461f
ELT 745f SS 4800 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Keynote Speech -- Routing -- Protocol -- Energy Efficiency -- Data Processing -- Self-organization and Synchronization -- Deployment and Application -- Security. |
| Record Nr. | UNINA-9910484448203321 |
| Berlin, Heidelberg : , : Springer-Verlag, , [2007] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Replication [[electronic resource] ] : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper
| Replication [[electronic resource] ] : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper |
| Edizione | [1st ed. 2010.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
| Descrizione fisica | 1 online resource (297 p.) |
| Disciplina | 005.86 |
| Collana | Theoretical Computer Science and General Issues |
| Soggetto topico |
Computer programming
Cryptography Data encryption (Computer science) Computer networks Computer science Database management Programming Techniques Cryptology Computer Communication Networks Computer Science Models of Computation Database Management |
| ISBN |
1-280-38539-1
9786613563316 3-642-11294-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Consistency Models for Replicated Data -- Replication Techniques for Availability -- Modular Approach to Replication for Availability -- Stumbling over Consensus Research: Misunderstandings and Issues -- Replicating for Performance: Case Studies -- A History of the Virtual Synchrony Replication Model -- From Viewstamped Replication to Byzantine Fault Tolerance -- Implementing Trustworthy Services Using Replicated State Machines -- State Machine Replication with Byzantine Faults -- Selected Results from the Latest Decade of Quorum Systems Research -- From Object Replication to Database Replication -- Database Replication: A Tutorial -- Practical Database Replication. |
| Record Nr. | UNISA-996465322203316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Replication : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper
| Replication : Theory and Practice / / edited by Bernadette Charron-Bost, Fernando Pedone, Andre Schiper |
| Edizione | [1st ed. 2010.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
| Descrizione fisica | 1 online resource (297 p.) |
| Disciplina | 005.86 |
| Collana | Theoretical Computer Science and General Issues |
| Soggetto topico |
Computer programming
Cryptography Data encryption (Computer science) Computer networks Computer science Database management Programming Techniques Cryptology Computer Communication Networks Computer Science Models of Computation Database Management |
| ISBN |
1-280-38539-1
9786613563316 3-642-11294-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Consistency Models for Replicated Data -- Replication Techniques for Availability -- Modular Approach to Replication for Availability -- Stumbling over Consensus Research: Misunderstandings and Issues -- Replicating for Performance: Case Studies -- A History of the Virtual Synchrony Replication Model -- From Viewstamped Replication to Byzantine Fault Tolerance -- Implementing Trustworthy Services Using Replicated State Machines -- State Machine Replication with Byzantine Faults -- Selected Results from the Latest Decade of Quorum Systems Research -- From Object Replication to Database Replication -- Database Replication: A Tutorial -- Practical Database Replication. |
| Record Nr. | UNINA-9910482974603321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||