reklama - zainteresowany?

Modern Data Protection - Helion

Modern Data Protection
ebook
Autor: W. Curtis Preston
ISBN: 9781492094005
stron: 386, Format: ebook
Data wydania: 2021-04-29
Księgarnia: Helion

Cena książki: 186,15 zł (poprzednio: 216,45 zł)
Oszczędzasz: 14% (-30,30 zł)

Dodaj do koszyka Modern Data Protection

Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365, Google Workspace, and Salesforce; and persistent data created by Kubernetes and container workloads.

To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine which is right for your company. You'll learn the unique requirements that each workload presents, then explore various categories of commercial backup hardware, software, and services available to protect these data sources, including the advantages and disadvantages of each approach.

  • Learn the workload types that your organization should be backing up
  • Explore the hardware, software, and services you can use to back up your systems
  • Understand what's wrong with your current data protection system
  • Pair your backed-up workloads to the appropriate backup system
  • Learn the adjustments that will make your backups better, without wasting money

Dodaj do koszyka Modern Data Protection

 

Osoby które kupowały "Modern Data Protection", wybierały także:

  • Windows Media Center. Domowe centrum rozrywki
  • Ruby on Rails. Ćwiczenia
  • DevOps w praktyce. Kurs video. Jenkins, Ansible, Terraform i Docker
  • Przywództwo w Å›wiecie VUCA. Jak być skutecznym liderem w niepewnym Å›rodowisku
  • Scrum. O zwinnym zarzÄ…dzaniu projektami. Wydanie II rozszerzone

Dodaj do koszyka Modern Data Protection

Spis treści

Modern Data Protection eBook -- spis treści

  • Foreword
  • Preface
    • The Work Continues
    • Conventions Used in This Book
    • OReilly Online Learning
    • How to Contact Us
    • Acknowledgments
  • 1. Risks to Your Data: Why We Back Up
    • Human Disasters
      • Accidents
      • Bad Code
      • Malicious Attacks
      • Terrorism
      • Electronic Attacks
      • Ransomware
      • Internal Threats
        • Separation of powers
        • Role-based administration
        • Least privilege
        • Multiperson authentication
    • Mechanical or System Failure
      • Power Disruptions
      • There Is No Cloud
      • System Failure
    • Natural Disasters
      • Floods
      • Fires
      • Earthquakes
      • Hurricanes, Typhoons, and Cyclones
      • Tornadoes
      • Sinkholes
    • Takeaways
  • 2. Gathering and Determining Service Levels
    • What Does Your Organization Do?
    • Build Yourself a Framework
      • Document Templates
      • Review/Advisory Boards
    • Collecting Requirements
      • What Are RPO and RTO?
      • Find the Subject Matter Experts
        • Data creators
        • Executives
        • Compliance and governance
      • Solicit Requirements
      • Review Requirements
        • Service-level agreements
        • Talk about a charge-back model
        • Data classification
        • Wrapping up the requirements review
    • Design and Build Your System
      • Draw up Multiple Designs
      • Review the Designs
      • Select and Build the System
    • Document and Implement the New System
      • Defining Operational Responsibility
      • Operations Review and Documentation
      • Documentation Is Good
      • Runbooks
      • Implement the New System
    • Takeaways
  • 3. Backup and Archive Are Very Different
    • Before We Get Started
    • What Is Backup?
      • Copy
      • Stored Separately from the Original
      • For the Purposes of Restoring
      • What Is a Restore?
      • How Does a Restore Work?
      • The 3-2-1 Rule
        • Three versions of your data
        • On two different media
        • One of which is somewhere else
    • What Is an Archive?
      • To Serve as a Reference
      • Stored with Additional Metadata
      • What Is a Retrieve?
    • Protecting Backup and Archive Data
      • Encryption
      • Air Gaps
        • Physical air gap
        • Virtual air gap
      • Immutability
    • Takeaways
  • 4. Backup and Recovery Basics
    • Recovery Testing
    • Backup Levels
      • Traditional Full Backup
      • Traditional Incremental Backup
        • Typical incremental backup
        • Cumulative incremental backup
        • Incremental backup with levels
        • Block-level incremental backup
        • Source-side deduplication
        • Synthetic full backups
          • Synthetic full by copying
          • Virtual synthetic full
          • Incremental forever
      • Do Backup Levels Matter?
    • Metrics
      • Recovery Metrics
        • Recovery time objective (RTO)
        • Recovery point objective (RPO)
        • Negotiating your RPO and RTO
        • Recovery time actual and recovery point actual
        • Testing recoveries
      • Capacity Metrics
        • License/workload usage
        • Storage capacity and usage
        • Throughput capacity and usage
        • Compute capacity and usage
      • Backup Window
      • Backup and Recovery Success and Failure
      • Retention
      • Using Metrics
    • Backup and Archive Myths
    • Item- Versus Image-Level Backups
      • Item-Level Backup
      • Image-Level Backups
      • File-Level Recovery from an Image-Level Backup
      • Combining Image- and File-Level Backups
    • Backup Selection Methods
      • Selective Inclusion Versus Selective Exclusion
      • Tag-Based and Folder-Based Inclusion
    • Takeaways
  • 5. Using Disk and Deduplication for Data Protection
    • Deduplication
      • What Can Dedupe Do?
      • How Dedupe Works
        • Dedupe scope
        • Do not compare dedupe ratios
        • Chunk size matters
        • File-level dedupe
      • Target Deduplication
        • The popularity of target dedupe
        • Inline versus post-process deduplication
      • Source Deduplication
      • Target Versus Source Deduplication
      • Hybrid Dedupe
      • Selecting the Right Dedupe for You
    • Using Disk in Your Backup System
      • Disk Caching
      • Disk-to-Disk-to-Tape (D2D2T)
      • Disk-to-Disk-to-Disk (D2D2D)
      • Direct-to-Cloud (D2C)
      • Disk-to-Disk-to-Cloud (D2D2C)
    • Recovery Concepts
      • Image Recovery
      • File-Level Recovery
        • Direct restore
        • Restoring with an SMB/NFS mount
        • Restore via image mount
        • Recovering SaaS data
      • Instant Recovery
        • Storage matters
        • Use cases
      • Choosing a Recovery Type
    • Takeaways
  • 6. Traditional Data Sources
    • Physical Servers
      • Standard Backup
      • Bare-Metal Backup
      • Backing Up NAS
        • Using a proxy
        • NDMP
        • Snapshot replication
    • Virtual Servers
      • VM-Level Backups
      • What Is VSS?
      • Specialized Backups for Hypervisors
        • VADP
        • Hyper-V and VSS
        • Snapshot-based backup
        • Hyper-converged infrastructure (HCI)
        • What about lesser-known hypervisors?
    • Desktops and Laptops
      • Laptops as a Cache
      • Normal Desktop and Laptop Usage
      • Desktop and Laptop Backup Options
        • Portable hard drive backup
        • File-level incremental backup
        • File sync and share
        • Source-side dedupe to a backup system or service
    • Mobile Devices
      • Cloud Sync
      • Physical Sync
      • Mobile Device Backup
      • Mobile Device Management (MDM)
    • Takeaways
  • 7. Protecting Databases
    • Database Delivery Models
      • Traditional Database Software
      • Platform-as-a-Service
      • Serverless Databases
    • Database Models
    • Consistency Models
      • Traditional Databases Running in Your Datacenter
      • PaaS and Serverless Databases
    • Traditional Database Terminology
      • Instance
      • Database
      • Table
      • Index
      • Row
      • Attribute
      • Data File
      • Tablespace
      • Partition
      • Master File
      • Transaction
      • Transaction Log
    • Backing Up Traditionally Delivered Databases
      • Cold Backup
      • Split Replica
      • Hot Backup Mode
      • Snap and Sweep
      • Dump and Sweep
      • Stream-to-Backup Product
      • Transaction Log Backup
      • Master File
    • Backing Up PaaS and Serverless Databases
      • Dump and Sweep
      • Integrated Backup-as-a-Service
        • Test your backups
        • 3-2-1 rule
        • Preferred backup methods
    • Recovering Traditional Databases
    • Recovering Modern Databases
    • Takeaways
  • 8. Modern Data Sources
    • The Public Cloud
      • Infrastructure-as-a-Service (IaaS)
        • Block storage in the cloud
        • Object storage in the cloud
      • Platform-as-a-Service (PaaS)
      • Serverless Services
      • Software-as-a-Service (SaaS)
        • Salesforce
        • Microsoft 365
        • Google Workspace
        • Slack
        • GitHub
      • You Need to Protect the Cloud
    • Hybrid Cloud Configurations
      • NFS/SMB Gateway
      • The Cloud in a Box
    • Docker and Kubernetes
      • How Containers Break Backups
      • Dockerfiles
      • Docker Images
      • Kubernetes etcd
      • Persistent Volumes
      • Databases
      • Kubernetes: A New Path
    • The Internet of Things (IoT)
    • Making Backup Decisions
      • Criticality to the Organization
      • Consider the Source
    • Takeaways
  • 9. Backup and Recovery Software Methods
    • Is Everything Backup?
    • Backup Methods Supporting a Traditional Restore
      • Multiplexing
      • Traditional Full and Incremental Backups
      • File-Level Incremental Forever
      • Block-Level Incremental Forever
      • Source Deduplication
    • Methods Supporting Instant Recovery
      • Replication
        • Synchronous replication
        • Asynchronous replication
        • Hybrid replication
        • Database replication
        • Limitations of replication
      • Continuous Data Protection (CDP)
      • Snapshots
        • Copy-on-write
        • Redirect-on-write
        • Hold all writes
        • Pros and cons of snapshots
      • Near-Continuous Data Protection (Near-CDP)
      • Copy Data Management
      • Other Software with Instant Recovery
    • Leveraging Backups for More
    • Deciding on a Backup Method
      • Does What You Have Meet Your Needs?
      • Advantages and Disadvantages of Different Approaches
      • Complete Solution
    • Takeaways
  • 10. Archive Software Methods
    • A Deeper Dive into Archive
    • Retrieval Versus Restore
    • Types of Archive Systems
      • Traditional Batch Archive
      • Real-Time Archive
      • HSM-Style Archive
    • Deciding on an Archive System
      • Do You Need One?
      • Requirements
        • Data format issues
        • Storage media
        • Other concerns
        • Separate system or integrated?
    • Takeaways
  • 11. Disaster Recovery Methods
    • Disaster Recovery Becomes Paramount
    • Ransomware Changed Everything
    • An Overview of Disaster Recovery
    • What Is in a DR Plan?
      • A Box of Tapes Isnt a DR Plan
      • A Replicated Dedupe Appliance Isnt Much Better
      • Its All About the RTA
    • Building a Recovery Site
      • Roll Your Own DR Site
      • Recovery-Site-as-a-Service
      • The Public Cloud Was Born for DR
    • Keeping the DR Site Up to Date
      • Cold, Hot, and Warm Sites
      • Choosing Hot, Warm, or Cold
      • Recovery Mechanisms
        • Primary data replication
        • Primary data replication methods
        • Replication of backups
        • Platform format issues
        • Choosing between these two methods
    • Software or Service
      • Commercial DR Software
      • DR-as-a-Service
      • All-in-One or Best of Breed?
    • Choosing a Plan
    • Creating a DR Runbook
      • Runbook Goals
      • Overview
      • Technology Inventory
      • Contact Information
      • Procedures
      • Exception Processing with Escalation
    • Takeaways
  • 12. Data Protection Targets
    • Tape Drives
      • What Tape Is Good At
        • Cost
        • Reliably writing data
        • Long-term retention
      • What Tape Is Bad At
      • How Did This Happen?
      • Tape Drive Technologies
        • Linear Tape File System
        • Robotic tape libraries
    • Optical Media
    • Individual Disk Drives
    • Standard Disk Arrays
    • Object Storage
    • Target Deduplication Appliances
      • Virtual Tape Libraries
      • NAS Appliances
    • Public Cloud Storage
    • Choosing and Using a Backup Target
      • Optimize the Performance of What You Have
        • Performance-tuning tape
        • Performance-tuning RAID
        • Performance-tuning target dedupe array
      • Select a More Appropriate Device
        • Pick your backup software or service first
        • Pick what works for you
        • On-premises disk
        • Cloud disk
        • All tape
        • Hybrid
    • Takeaways
  • 13. Commercial Data Protection Challenges
    • A Brief History of Backup
    • Challenges with Commercial Backup Solutions
      • Size the Backup System
      • Maintain Backup Server OS
      • Maintain Backup Software
      • Manage Multiple Vendors
      • Separate System for DR
      • Separate System for E-Discovery
      • Tape-Related Challenges
        • Tape drives are difficult to tune
        • Tapes can be lost
        • Manage an off-site vaulting vendor
      • Disk-Related Challenges
        • Disk has no air gap
        • Bit rot
      • Large Up-Front Capital Purchases
      • Overprovisioning Is Required
      • Difficult to Scale
    • Difficulty of Changing Backup Products
      • Let Them Expire
      • Use a Service
      • Restore and Backup
    • Takeaways
  • 14. Traditional Data Protection Solutions
    • Not Naming Names
    • Traditional Backup Solutions
      • Advantages of Traditional Backup
      • Challenges with Traditional Backup
      • Analysis
    • Target Deduplication Backup Appliances
      • Advantages of Target Dedupe
      • Challenges with Target Dedupe
      • Analysis
    • Takeaways
  • 15. Modern Data Protection Solutions
    • Virtualization-Centric Solutions
      • Advantages of Virtualization-Centric Solutions
      • Challenges of Virtualization-Centric Backup
      • Analysis
    • Hyper-Converged Backup Appliances
      • Advantages of Hyper-Converged Backup Appliances
      • Challenges with HCBAs
      • Analysis
    • Data-Protection-as-a-Service (DPaaS)
      • Advantages of DPaaS
      • Challenges of DPaaS
      • Analysis
    • Fully Managed Service Providers
      • Advantages of Using an MSP
      • Challenges of Using an MSP
      • Analysis
    • Adapting to the Market
      • Traditional Backup Appliances
      • Subscription Pricing
      • Responding to the Cloud
        • Copy backups to cloud storage
        • On-premises software in the cloud
    • Takeaways
  • 16. Replacing or Upgrading Your Backup System
    • Which Solution Is Best for You?
    • Your Responsibilities
    • Before You Do Anything
      • This Is Your Backup System
        • Understand your requirements
        • Understand what you already have
        • Understand what you dont like about your solution
      • Consider TCO, Not Just Acquisition Cost
        • Cost of tweaking the current system
        • Cost of upgrading or enhancing the new system
        • Cost of a new on-premises system
        • Cost of an on-premises system in the cloud
        • Cost of a SaaS or MSP system
    • Picking a Solution
      • Find Any Showstoppers
      • Prioritize Ease of Use
      • Prioritize Scalability
      • Prioritize Future Proofing
    • Takeaways
  • Index

Dodaj do koszyka Modern Data Protection

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.