Opis ebooka: Modern Data Protection
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365, Google Workspace, and Salesforce; and persistent data created by Kubernetes and container workloads.
To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine which is right for your company. You'll learn the unique requirements that each workload presents, then explore various categories of commercial backup hardware, software, and services available to protect these data sources, including the advantages and disadvantages of each approach.
- Learn the workload types that your organization should be backing up
- Explore the hardware, software, and services you can use to back up your systems
- Understand what's wrong with your current data protection system
- Pair your backed-up workloads to the appropriate backup system
- Learn the adjustments that will make your backups better, without wasting money
Wybrane bestsellery
-
"Archiwizacja i odzyskiwanie danych" to przewodnik po darmowych narzędziach do archiwizacji i odzyskiwania danych, przeznaczony głównie dla administratorów. W. Curtis Preston, specjalista w dziedzinie ochrony danych, zwrócił uwagę, że środki przeznaczone na system archiwizacji są często zbyt małe...(49.50 zł najniższa cena z 30 dni)
49.50 zł
99.00 zł(-50%) -
Packed with practical, freely available backup and recovery solutions for Unix, Linux, Windows, and Mac OS X systems -- as well as various databases -- this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75% new material.Backu...(152.01 zł najniższa cena z 30 dni)
151.96 zł
199.00 zł(-24%) -
Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quickly, thereby keeping their life...(68.34 zł najniższa cena z 30 dni)
68.24 zł
99.90 zł(-32%) -
Oto drugie wydanie książki, którą specjaliści CISO uznali za przełomową. Dowiesz się z niej, jak kwantyfikować niepewność i jak za pomocą prostych metod i narzędzi poprawić ocenę ryzyka w nowoczesnych organizacjach. Znalazły się tu nowe techniki modelowania, pomiaru i szacowania, a także mnóstwo ...(60.90 zł najniższa cena z 30 dni)
52.20 zł
87.00 zł(-40%) -
Dzięki tej świetnie napisanej, miejscami przezabawnej książce dowiesz się, na czym naprawdę polega testowanie granic bezpieczeństwa fizycznego. To fascynująca relacja o sposobach wynajdywania niedoskonałości zabezpieczeń, stosowania socjotechnik i wykorzystywania słabych stron ludzkiej natury. Wy...(35.40 zł najniższa cena z 30 dni)
35.40 zł
59.00 zł(-40%) -
Oto przewodnik po inżynierii detekcji, przeznaczony dla inżynierów zabezpieczeń i analityków bezpieczeństwa. Zaprezentowano w nim praktyczną metodologię planowania, budowy i walidacji mechanizmów wykrywania zagrożeń. Opisano zasady pracy z frameworkami służącymi do testowania i uwierzytelniania p...(53.40 zł najniższa cena z 30 dni)
53.40 zł
89.00 zł(-40%) -
Trzymasz w rękach drugie wydanie książki, którą docenili specjaliści bezpieczeństwa IT na całym świecie. Dzięki niej zrozumiesz zasady tworzenia skutecznych strategii cyberbezpieczeństwa dla swojej organizacji. Poznasz długoterminowe trendy w ujawnianiu i wykorzystywaniu luk w zabezpieczeniach, r...(65.40 zł najniższa cena z 30 dni)
65.40 zł
109.00 zł(-40%) -
Dzięki tej książce nauczysz się gromadzić publicznie dostępne informacje, korzystać z wiedzy o cyklu życia wrażliwych danych i przekształcać je w informacje wywiadowcze przydatne dla zespołów zajmujących się bezpieczeństwem. Opanujesz proces gromadzenia i analizy danych, poznasz również strategie...(59.40 zł najniższa cena z 30 dni)
59.40 zł
99.00 zł(-40%) -
W ostatnich latach na lidera konteneryzacji wyrosło środowisko uruchomieniowe Docker. Dzięki funkcjonalności, wygodnej obsłudze i szerokiej kompatybilności z różnymi systemami operacyjnymi stanowi on dziś techniczny standard. Docker otwiera przed badaczami cyberbezpieczeństwa nowe możliwości test...(29.40 zł najniższa cena z 30 dni)
29.40 zł
49.00 zł(-40%) -
Ta książka jest doskonałym wprowadzeniem do inżynierii społecznej. Omawia koncepcje psychologiczne leżące u podstaw tej dyscypliny i jej aspekty etyczne. Zaprezentowano tu narzędzie ułatwiające korzystanie z technik inżynierii społecznej w atakach socjotechnicznych. Następnie szczegółowo pokazano...(41.40 zł najniższa cena z 30 dni)
41.40 zł
69.00 zł(-40%)
Ebooka "Modern Data Protection" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Modern Data Protection" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Modern Data Protection" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-920-9400-5, 9781492094005
- Data wydania ebooka:
- 2021-04-29 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 3.2MB
- Rozmiar pliku Mobi:
- 7.5MB
Spis treści ebooka
- Foreword
- Preface
- The Work Continues
- Conventions Used in This Book
- OReilly Online Learning
- How to Contact Us
- Acknowledgments
- 1. Risks to Your Data: Why We Back Up
- Human Disasters
- Accidents
- Bad Code
- Malicious Attacks
- Terrorism
- Electronic Attacks
- Ransomware
- Internal Threats
- Separation of powers
- Role-based administration
- Least privilege
- Multiperson authentication
- Human Disasters
- Mechanical or System Failure
- Power Disruptions
- There Is No Cloud
- System Failure
- Natural Disasters
- Floods
- Fires
- Earthquakes
- Hurricanes, Typhoons, and Cyclones
- Tornadoes
- Sinkholes
- Takeaways
- 2. Gathering and Determining Service Levels
- What Does Your Organization Do?
- Build Yourself a Framework
- Document Templates
- Review/Advisory Boards
- Collecting Requirements
- What Are RPO and RTO?
- Find the Subject Matter Experts
- Data creators
- Executives
- Compliance and governance
- Solicit Requirements
- Review Requirements
- Service-level agreements
- Talk about a charge-back model
- Data classification
- Wrapping up the requirements review
- Design and Build Your System
- Draw up Multiple Designs
- Review the Designs
- Select and Build the System
- Document and Implement the New System
- Defining Operational Responsibility
- Operations Review and Documentation
- Documentation Is Good
- Runbooks
- Implement the New System
- Takeaways
- 3. Backup and Archive Are Very Different
- Before We Get Started
- What Is Backup?
- Copy
- Stored Separately from the Original
- For the Purposes of Restoring
- What Is a Restore?
- How Does a Restore Work?
- The 3-2-1 Rule
- Three versions of your data
- On two different media
- One of which is somewhere else
- What Is an Archive?
- To Serve as a Reference
- Stored with Additional Metadata
- What Is a Retrieve?
- Protecting Backup and Archive Data
- Encryption
- Air Gaps
- Physical air gap
- Virtual air gap
- Immutability
- Takeaways
- 4. Backup and Recovery Basics
- Recovery Testing
- Backup Levels
- Traditional Full Backup
- Traditional Incremental Backup
- Typical incremental backup
- Cumulative incremental backup
- Incremental backup with levels
- Block-level incremental backup
- Source-side deduplication
- Synthetic full backups
- Synthetic full by copying
- Virtual synthetic full
- Incremental forever
- Do Backup Levels Matter?
- Metrics
- Recovery Metrics
- Recovery time objective (RTO)
- Recovery point objective (RPO)
- Negotiating your RPO and RTO
- Recovery time actual and recovery point actual
- Testing recoveries
- Recovery Metrics
- Capacity Metrics
- License/workload usage
- Storage capacity and usage
- Throughput capacity and usage
- Compute capacity and usage
- Backup Window
- Backup and Recovery Success and Failure
- Retention
- Using Metrics
- Backup and Archive Myths
- Item- Versus Image-Level Backups
- Item-Level Backup
- Image-Level Backups
- File-Level Recovery from an Image-Level Backup
- Combining Image- and File-Level Backups
- Backup Selection Methods
- Selective Inclusion Versus Selective Exclusion
- Tag-Based and Folder-Based Inclusion
- Takeaways
- 5. Using Disk and Deduplication for Data Protection
- Deduplication
- What Can Dedupe Do?
- How Dedupe Works
- Dedupe scope
- Do not compare dedupe ratios
- Chunk size matters
- File-level dedupe
- Target Deduplication
- The popularity of target dedupe
- Inline versus post-process deduplication
- Deduplication
- Source Deduplication
- Target Versus Source Deduplication
- Hybrid Dedupe
- Selecting the Right Dedupe for You
- Using Disk in Your Backup System
- Disk Caching
- Disk-to-Disk-to-Tape (D2D2T)
- Disk-to-Disk-to-Disk (D2D2D)
- Direct-to-Cloud (D2C)
- Disk-to-Disk-to-Cloud (D2D2C)
- Recovery Concepts
- Image Recovery
- File-Level Recovery
- Direct restore
- Restoring with an SMB/NFS mount
- Restore via image mount
- Recovering SaaS data
- Instant Recovery
- Storage matters
- Use cases
- Choosing a Recovery Type
- Takeaways
- 6. Traditional Data Sources
- Physical Servers
- Standard Backup
- Bare-Metal Backup
- Backing Up NAS
- Using a proxy
- NDMP
- Snapshot replication
- Physical Servers
- Virtual Servers
- VM-Level Backups
- What Is VSS?
- Specialized Backups for Hypervisors
- VADP
- Hyper-V and VSS
- Snapshot-based backup
- Hyper-converged infrastructure (HCI)
- What about lesser-known hypervisors?
- Desktops and Laptops
- Laptops as a Cache
- Normal Desktop and Laptop Usage
- Desktop and Laptop Backup Options
- Portable hard drive backup
- File-level incremental backup
- File sync and share
- Source-side dedupe to a backup system or service
- Mobile Devices
- Cloud Sync
- Physical Sync
- Mobile Device Backup
- Mobile Device Management (MDM)
- Takeaways
- 7. Protecting Databases
- Database Delivery Models
- Traditional Database Software
- Platform-as-a-Service
- Serverless Databases
- Database Delivery Models
- Database Models
- Consistency Models
- Traditional Databases Running in Your Datacenter
- PaaS and Serverless Databases
- Traditional Database Terminology
- Instance
- Database
- Table
- Index
- Row
- Attribute
- Data File
- Tablespace
- Partition
- Master File
- Transaction
- Transaction Log
- Backing Up Traditionally Delivered Databases
- Cold Backup
- Split Replica
- Hot Backup Mode
- Snap and Sweep
- Dump and Sweep
- Stream-to-Backup Product
- Transaction Log Backup
- Master File
- Backing Up PaaS and Serverless Databases
- Dump and Sweep
- Integrated Backup-as-a-Service
- Test your backups
- 3-2-1 rule
- Preferred backup methods
- Recovering Traditional Databases
- Recovering Modern Databases
- Takeaways
- 8. Modern Data Sources
- The Public Cloud
- Infrastructure-as-a-Service (IaaS)
- Block storage in the cloud
- Object storage in the cloud
- Infrastructure-as-a-Service (IaaS)
- Platform-as-a-Service (PaaS)
- Serverless Services
- Software-as-a-Service (SaaS)
- Salesforce
- Microsoft 365
- Google Workspace
- Slack
- GitHub
- The Public Cloud
- You Need to Protect the Cloud
- Hybrid Cloud Configurations
- NFS/SMB Gateway
- The Cloud in a Box
- Docker and Kubernetes
- How Containers Break Backups
- Dockerfiles
- Docker Images
- Kubernetes etcd
- Persistent Volumes
- Databases
- Kubernetes: A New Path
- The Internet of Things (IoT)
- Making Backup Decisions
- Criticality to the Organization
- Consider the Source
- Takeaways
- 9. Backup and Recovery Software Methods
- Is Everything Backup?
- Backup Methods Supporting a Traditional Restore
- Multiplexing
- Traditional Full and Incremental Backups
- File-Level Incremental Forever
- Block-Level Incremental Forever
- Source Deduplication
- Methods Supporting Instant Recovery
- Replication
- Synchronous replication
- Asynchronous replication
- Hybrid replication
- Database replication
- Limitations of replication
- Replication
- Continuous Data Protection (CDP)
- Snapshots
- Copy-on-write
- Redirect-on-write
- Hold all writes
- Pros and cons of snapshots
- Near-Continuous Data Protection (Near-CDP)
- Copy Data Management
- Other Software with Instant Recovery
- Leveraging Backups for More
- Deciding on a Backup Method
- Does What You Have Meet Your Needs?
- Advantages and Disadvantages of Different Approaches
- Complete Solution
- Takeaways
- 10. Archive Software Methods
- A Deeper Dive into Archive
- Retrieval Versus Restore
- Types of Archive Systems
- Traditional Batch Archive
- Real-Time Archive
- HSM-Style Archive
- Deciding on an Archive System
- Do You Need One?
- Requirements
- Data format issues
- Storage media
- Other concerns
- Separate system or integrated?
- Takeaways
- 11. Disaster Recovery Methods
- Disaster Recovery Becomes Paramount
- Ransomware Changed Everything
- An Overview of Disaster Recovery
- What Is in a DR Plan?
- A Box of Tapes Isnt a DR Plan
- A Replicated Dedupe Appliance Isnt Much Better
- Its All About the RTA
- Building a Recovery Site
- Roll Your Own DR Site
- Recovery-Site-as-a-Service
- The Public Cloud Was Born for DR
- Keeping the DR Site Up to Date
- Cold, Hot, and Warm Sites
- Choosing Hot, Warm, or Cold
- Recovery Mechanisms
- Primary data replication
- Primary data replication methods
- Replication of backups
- Platform format issues
- Choosing between these two methods
- Software or Service
- Commercial DR Software
- DR-as-a-Service
- All-in-One or Best of Breed?
- Choosing a Plan
- Creating a DR Runbook
- Runbook Goals
- Overview
- Technology Inventory
- Contact Information
- Procedures
- Exception Processing with Escalation
- Takeaways
- 12. Data Protection Targets
- Tape Drives
- What Tape Is Good At
- Cost
- Reliably writing data
- Long-term retention
- What Tape Is Good At
- What Tape Is Bad At
- How Did This Happen?
- Tape Drive Technologies
- Linear Tape File System
- Robotic tape libraries
- Tape Drives
- Optical Media
- Individual Disk Drives
- Standard Disk Arrays
- Object Storage
- Target Deduplication Appliances
- Virtual Tape Libraries
- NAS Appliances
- Public Cloud Storage
- Choosing and Using a Backup Target
- Optimize the Performance of What You Have
- Performance-tuning tape
- Performance-tuning RAID
- Performance-tuning target dedupe array
- Optimize the Performance of What You Have
- Select a More Appropriate Device
- Pick your backup software or service first
- Pick what works for you
- On-premises disk
- Cloud disk
- All tape
- Hybrid
- Takeaways
- 13. Commercial Data Protection Challenges
- A Brief History of Backup
- Challenges with Commercial Backup Solutions
- Size the Backup System
- Maintain Backup Server OS
- Maintain Backup Software
- Manage Multiple Vendors
- Separate System for DR
- Separate System for E-Discovery
- Tape-Related Challenges
- Tape drives are difficult to tune
- Tapes can be lost
- Manage an off-site vaulting vendor
- Disk-Related Challenges
- Disk has no air gap
- Bit rot
- Large Up-Front Capital Purchases
- Overprovisioning Is Required
- Difficult to Scale
- Difficulty of Changing Backup Products
- Let Them Expire
- Use a Service
- Restore and Backup
- Takeaways
- 14. Traditional Data Protection Solutions
- Not Naming Names
- Traditional Backup Solutions
- Advantages of Traditional Backup
- Challenges with Traditional Backup
- Analysis
- Target Deduplication Backup Appliances
- Advantages of Target Dedupe
- Challenges with Target Dedupe
- Analysis
- Takeaways
- 15. Modern Data Protection Solutions
- Virtualization-Centric Solutions
- Advantages of Virtualization-Centric Solutions
- Challenges of Virtualization-Centric Backup
- Analysis
- Virtualization-Centric Solutions
- Hyper-Converged Backup Appliances
- Advantages of Hyper-Converged Backup Appliances
- Challenges with HCBAs
- Analysis
- Data-Protection-as-a-Service (DPaaS)
- Advantages of DPaaS
- Challenges of DPaaS
- Analysis
- Fully Managed Service Providers
- Advantages of Using an MSP
- Challenges of Using an MSP
- Analysis
- Adapting to the Market
- Traditional Backup Appliances
- Subscription Pricing
- Responding to the Cloud
- Copy backups to cloud storage
- On-premises software in the cloud
- Takeaways
- 16. Replacing or Upgrading Your Backup System
- Which Solution Is Best for You?
- Your Responsibilities
- Before You Do Anything
- This Is Your Backup System
- Understand your requirements
- Understand what you already have
- Understand what you dont like about your solution
- This Is Your Backup System
- Consider TCO, Not Just Acquisition Cost
- Cost of tweaking the current system
- Cost of upgrading or enhancing the new system
- Cost of a new on-premises system
- Cost of an on-premises system in the cloud
- Cost of a SaaS or MSP system
- Picking a Solution
- Find Any Showstoppers
- Prioritize Ease of Use
- Prioritize Scalability
- Prioritize Future Proofing
- Takeaways
- Index
O'Reilly Media - inne książki
-
This concise yet comprehensive guide explains how to adopt a data lakehouse architecture to implement modern data platforms. It reviews the design considerations, challenges, and best practices for implementing a lakehouse and provides key insights into the ways that using a lakehouse can impact ...(193.69 zł najniższa cena z 30 dni)
193.19 zł
249.00 zł(-22%) -
In today's fast-paced world, more and more organizations require rapid application development with reduced development costs and increased productivity. This practical guide shows application developers how to use PowerApps, Microsoft's no-code/low-code application framework that helps developer...(162.47 zł najniższa cena z 30 dni)
162.27 zł
209.00 zł(-22%) -
Welcome to the systems age, where software professionals are no longer building software&emdash;we're building systems of software. Change is continuously deployed across software ecosystems coordinated by responsive infrastructure. In this world of increasing relational complexity, we need t...(152.21 zł najniższa cena z 30 dni)
152.01 zł
209.00 zł(-27%) -
This book provides an ideal guide for Python developers who want to learn how to build applications with large language models. Authors Olivier Caelen and Marie-Alice Blete cover the main features and benefits of GPT-4 and GPT-3.5 models and explain how they work. You'll also get a step-by-step g...(155.41 zł najniższa cena z 30 dni)
155.36 zł
209.00 zł(-26%) -
In today's cloud native world, where we automate as much as possible, everything is code. With this practical guide, you'll learn how Policy as Code (PaC) provides the means to manage the policies, related data, and responses to events that occur within the systems we maintain—Kubernetes, c...(212.59 zł najniższa cena z 30 dni)
212.39 zł
279.00 zł(-24%) -
Geared to intermediate- to advanced-level DBAs and IT professionals looking to enhance their MySQL skills, this guide provides a comprehensive overview on how to manage and optimize MySQL databases. You'll learn how to create databases and implement backup and recovery, security configurations, h...(221.43 zł najniższa cena z 30 dni)
221.33 zł
279.00 zł(-21%) -
Get the details, examples, and best practices you need to build generative AI applications, services, and solutions using the power of Azure OpenAI Service. With this comprehensive guide, Microsoft AI specialist Adrián González Sánchez examines the integration and utilization of Az...(162.23 zł najniższa cena z 30 dni)
162.18 zł
209.00 zł(-22%) -
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 hand...(214.77 zł najniższa cena z 30 dni)
214.57 zł
239.00 zł(-10%) -
Keeping up with the Python ecosystem can be daunting. Its developer tooling doesn't provide the out-of-the-box experience native to languages like Rust and Go. When it comes to long-term project maintenance or collaborating with others, every Python project faces the same problem: how to build re...(189.29 zł najniższa cena z 30 dni)
188.79 zł
239.00 zł(-21%) -
Bringing a deep-learning project into production at scale is quite challenging. To successfully scale your project, a foundational understanding of full stack deep learning, including the knowledge that lies at the intersection of hardware, software, data, and algorithms, is required.This book il...(227.19 zł najniższa cena z 30 dni)
227.14 zł
279.00 zł(-19%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Modern Data Protection W. Curtis Preston (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.