Person(s):
De Guise, Preston
Keywords:
COMPUTERS
Data Processing
;
Storage & Retrieval
;
COMPUTERS Disaster Recovery
;
Datenschutz
;
Computer networks
;
Data protection
;
Datenschutz
Description / Table of Contents:
Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Chapter 1 Introduction -- 1.1 The Value of Data -- 1.2 The Lay of the Land -- 1.3 What Are You Doing Here? -- 1.4 What's Changed in the Datacenter? -- 1.5 What Is Data Protection? -- 1.5.1 Data Protection as a Security Activity -- 1.5.2 Data Protection as a Privacy Activity -- 1.5.3 Data Protection as a Storage/Recovery Activity -- 1.6 Key Challenges -- 1.6.1 The Rise of Unstructured Data -- 1.6.2 Big Data -- 1.6.3 Cloud -- 1.6.4 Virtualization -- 1.6.5 Containers and Functions
Description / Table of Contents:
1.6.6 Data and Systems Complexity -- 1.6.7 The Law -- 1.6.8 Crime -- 1.7 A Brief History of Data Protection -- 1.8 The Miserly Hoarder -- 1.9 Summary -- 1.10 Self-Reflection -- Personal Data -- Business Data -- Chapter 2 Contextualizing Data Protection -- 2.1 Introduction -- 2.2 Data Classification -- 2.2.1 What Is the Data? -- 2.2.2 Where Is the Data? -- 2.2.3 Who Uses the Data? -- 2.2.4 When Is the Data Used? -- 2.2.5 How Is the Data Used? -- 2.2.6 Summarizing Data Classification -- 2.3 Protection Methodology -- 2.4 Protection vs Regeneration -- 2.5 Organizational Change -- 2.6 Summary
Description / Table of Contents:
2.7 Self-Reflection -- Chapter 3 Data Lifecycle -- 3.1 Introduction -- 3.2 Understanding Copy Proliferation -- 3.3 Archiving and Deleting -- 3.4 Summary -- 3.5 Self-Reflection -- Chapter 4 Elements of a Protection System -- 4.1 Introduction -- 4.2 People -- 4.2.1 Designers -- 4.2.2 Operators -- 4.2.3 End Users -- 4.2.4 Data Protection Team -- 4.3 Training -- 4.4 Documentation and Processes -- 4.4.1 Design -- 4.4.2 Implementation -- 4.4.2.1 System Configuration Guide -- 4.4.2.2 System Map -- 4.5 Testing -- 4.5.1 Type Testing -- 4.5.2 Informal vs Formal -- 4.5.2.1 Test Procedure
Description / Table of Contents:
4.5.2.2 Test Register -- 4.5.2.3 Test Schedule -- 4.5.3 Performance Testing -- 4.5.4 Test Risks -- 4.5.5 Automated Testing -- 4.5.6 What Is a Test? -- 4.6 Service Level Agreements -- 4.7 Technology -- 4.8 Summary -- 4.9 Self-Reflection -- Chapter 5 IT Governance and Data Protection -- 5.1 Introduction -- 5.2 Architecture -- 5.2.1 The FARR Model of Data Protection -- 5.2.1.1 Fault Tolerance -- 5.2.1.2 Availability -- 5.2.1.3 Redundancy -- 5.2.1.4 Recoverability -- 5.2.1.5 Tying the FARR Model Together -- 5.2.2 Data Protection Architect (DPA) -- 5.3 Service Transition -- 5.4 Change Management
Description / Table of Contents:
5.5 Summary -- 5.6 Self-Reflection -- Chapter 6 Monitoring and Reporting -- 6.1 Introduction -- 6.2 Monitoring -- 6.2.1 Security and Privacy -- 6.2.2 Health -- 6.2.2.1 Drive Failures and Recovery Time -- 6.2.2.2 Broader Uses of MTBF and MTTR -- 6.2.3 Capacity -- 6.2.3.1 RAID/Data Storage -- 6.2.3.2 Snapshots -- 6.2.3.3 Replication -- 6.2.3.4 Backup and Recovery -- 6.2.4 Performance -- 6.2.5 Notifications versus Dashboards -- 6.3 Reporting -- 6.3.1 Reporting via Aggregation of Monitoring -- 6.3.2 Reporting for Trending and Predictive Planning -- 6.3.3 Automated Reporting -- 6.4 Summary
Abstract:
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity.^
Type of Medium:
Electronic Resource
Pages:
1 Online-Ressource (xxi, 400 Seiten)
Edition:
Second edition
ISBN:
9781000062458
,
9780367463496
Language:
English
Permalink