000 -LEADER |
fixed length control field |
02675nam a22003735i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310153551.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110718s2011 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781430226635 |
|
978-1-4302-2663-5 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA75.5-76.95 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004 |
Edition number |
23 |
264 #1 - |
-- |
Berkeley, CA : |
-- |
Apress, |
-- |
2011. |
912 ## - |
-- |
ZDB-2-CWD |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Nelson, Steven. |
Relator term |
author. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Pro Data Backup and Recovery |
Medium |
[electronic resource] / |
Statement of responsibility, etc |
by Steven Nelson. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XIII, 296 p. |
Other physical details |
online resource. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Good backup and recovery strategies are key to the health of any organization. Medium- to very-large-scale systems administrators have to protect large amounts of critical data as well as design backup solutions that are scalable and optimized to meet changing conditions. Pro Data Backup and Recovery will cover some of the more common backup applications, such as Symantec NetBackup/BackupExec, EMC NetWorker, and CommVault, but the main discussion will focus on the implementation of 21st century architectures that allow the backup software to be a “commodity” item. The underlying architecture provides the framework for meeting the requirements of data protection for the organization. This book covers new developments in data protection as well as the impact of single-instance storage upon backup infrastructures. It discusses the impact of backup and data replication, the often misapplied B2D and D2D strategies, and “tapeless” backup environments. Continuous data protection and remote replication strategies are also addressed as they are integrated within backup strategies—a very important topic today. Learn backup solution design regardless of specific backup software Design realistic recovery solutions Take into account new data protection standards and the impact of data replication Whether you are using NetBackup, CommVault, or some other backup software, Pro Data Backup and Recovery will give you the information you need to keep your data safe and available. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Computer Science, general. |
|
Topical term or geographic name as entry element |
Data Storage Representation. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9781430226628 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-1-4302-2663-5 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |