ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Data Protection: Ensuring Data Availability

دانلود کتاب حفاظت از داده ها: اطمینان از در دسترس بودن داده ها

Data Protection: Ensuring Data Availability

مشخصات کتاب

Data Protection: Ensuring Data Availability

دسته بندی: امنیت
ویرایش: 2 
نویسندگان:   
سری:  
ISBN (شابک) : 0367256770, 9780367474102 
ناشر: CRC Press/Taylor & Francis Group 
سال نشر: 2020 
تعداد صفحات: 423 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 103 مگابایت 

قیمت کتاب (تومان) : 40,000



کلمات کلیدی مربوط به کتاب حفاظت از داده ها: اطمینان از در دسترس بودن داده ها: شبکه های کامپیوتری: اقدامات امنیتی، حفاظت از داده ها



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 18


در صورت تبدیل فایل کتاب Data Protection: Ensuring Data Availability به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب حفاظت از داده ها: اطمینان از در دسترس بودن داده ها نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب حفاظت از داده ها: اطمینان از در دسترس بودن داده ها

ویرایش دوم حفاظت از داده ها فراتر از موضوعات سنتی از جمله کپی برداری، در دسترس بودن مداوم، عکس های فوری، تکرار، پشتیبان گیری و بازیابی است و ملاحظات دیگری مانند مسائل حقوقی، حریم خصوصی و اخلاقی را بررسی می کند. مدل جدیدی برای درک و برنامه ریزی جنبه های مختلف حفاظت از داده ها ارائه شده است که برای توسعه استراتژی های کل نگر ضروری است. نسخه دوم همچنین به Cloud و پذیرش رو به رشد نرم افزار و عملکرد به عنوان یک سرویس می پردازد و همچنین به طور موثر برای طول عمر یک حجم کاری برنامه ریزی می کند که بهترین ترکیبی از خدمات حفاظت از داده های سنتی و بومی ابری ممکن است باشد. مجازی‌سازی همچنان چالش‌های جدیدی را برای حفاظت از داده‌ها ارائه می‌کند و تأثیر کانتینری‌سازی مورد بررسی قرار می‌گیرد. این کتاب رویکردی جامع و مبتنی بر کسب‌وکار برای حفاظت از داده‌ها دارد. این توضیح می دهد که چگونه حفاظت از داده ها ترکیبی از برنامه ریزی، فناوری و فعالیت های فعال و فعال است که امکان تداوم داده ها را فراهم می کند. سه فعالیت اساسی وجود دارد که خود را حفاظت از داده ها می نامند. در حالی که همه آنها از نظر دامنه و عملکرد با هم همپوشانی دارند، هر یک به عنوان زمینه های منطقی مستقل با متخصصان و نام دامنه خود عمل می کنند. این سه فعالیت عبارتند از: حفاظت از داده ها به عنوان یک فعالیت ذخیره سازی و بازیابی حفاظت از داده ها به عنوان یک فعالیت امنیتی حفاظت از داده ها به عنوان یک فعالیت حریم خصوصی این فعالیت ها به طور مفصل پوشش داده شده اند، با تمرکز بر اینکه چگونه سازمان ها می توانند از آنها برای افزایش سرمایه گذاری های فناوری اطلاعات خود و بهینه سازی هزینه ها استفاده کنند. این کتاب همچنین توضیح می‌دهد که چگونه حفاظت از داده‌ها به عاملی برای فرآیندهای جدید در مورد انتقال داده‌ها و پردازش داده تبدیل می‌شود. این کتاب خوانندگان را با اطلاعات حیاتی برای تصمیم گیری در مورد نحوه محافظت از داده ها در برابر از دست دادن در فضای ابری، در محل یا در ترکیبی از این دو، مسلح می کند. این تغییر چهره بازیابی در یک مرکز داده بسیار مجازی شده و تکنیک های مقابله با کلان داده را توضیح می دهد. علاوه بر این، مدلی را ارائه می‌کند که در آن فرآیندهای بازیابی داده‌ها را می‌توان با مدیریت و مدیریت فناوری اطلاعات ادغام کرد تا تمرکز مناسبی بر قابلیت بازیابی در سراسر کسب‌وکار حاصل شود.


توضیحاتی درمورد کتاب به خارجی

The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the Cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload what the best mix of traditional, and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology and activities that allow for data continuity. There are three essential activities that refer to themselves as data protection; while they all overlap in terms of scope and function, each operate as reasonably self-contained fields with their own specialists and domain nomenclature. These three activities are: Data protection as a storage and recovery activity Data protection as a security activity Data protection as a privacy activity These activities are covered in detail, with a focus on how organizations can use them to leverage their IT investments and optimize costs. The book also explains how data protection is becoming an enabler for new processes around data movement and data processing. This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on-premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized data center and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business.



فهرست مطالب

Cover
Half Title	#2,0,-32767Title Page
Copyright Page	#5,0,-32767Dedication	#6,0,-32767Table of Contents	#8,0,-32767Preface	#20,0,-32767Chapter 1 Introduction
	1.1 The Value of Data
	1.2 The Lay of the Land
	1.3 What Are You Doing Here?
	1.4 What’s Changed in the Datacenter?
	1.5 What Is Data Protection?
		1.5.1 Data Protection as a Security Activity
		1.5.2 Data Protection as a Privacy Activity
		1.5.3 Data Protection as a Storage/Recovery Activity
	1.6 Key Challenges
		1.6.1 The Rise of Unstructured Data
		1.6.2 Big Data
		1.6.3 Cloud
		1.6.4 Virtualization
		1.6.5 Containers and Functions
		1.6.6 Data and Systems Complexity
		1.6.7 The Law
		1.6.8 Crime
	1.7 A Brief History of Data Protection
	1.8 The Miserly Hoarder
	1.9 Summary
	1.10 Self-Reflection
		Personal Data
		Business Data
Chapter 2 Contextualizing Data Protection
	2.1 Introduction
	2.2 Data Classification
		2.2.1 What Is the Data?
		2.2.2 Where Is the Data?
		2.2.3 Who Uses the Data?
		2.2.4 When Is the Data Used?
		2.2.5 How Is the Data Used?
		2.2.6 Summarizing Data Classification
	2.3 Protection Methodology
	2.4 Protection vs Regeneration
	2.5 Organizational Change
	2.6 Summary
	2.7 Self-Reflection
Chapter 3 Data Lifecycle
	3.1 Introduction
	3.2 Understanding Copy Proliferation
	3.3 Archiving and Deleting
	3.4 Summary
	3.5 Self-Reflection
Chapter 4 Elements of a Protection System
	4.1 Introduction
	4.2 People
		4.2.1 Designers
		4.2.2 Operators
		4.2.3 End Users
		4.2.4 Data Protection Team
	4.3 Training
	4.4 Documentation and Processes
		4.4.1 Design
		4.4.2 Implementation
			4.4.2.1 System Configuration Guide
			4.4.2.2 System Map
	4.5 Testing
		4.5.1 Type Testing
		4.5.2 Informal vs Formal
			4.5.2.1 Test Procedure
			4.5.2.2 Test Register
			4.5.2.3 Test Schedule
		4.5.3 Performance Testing
		4.5.4 Test Risks
		4.5.5 Automated Testing
		4.5.6 What Is a Test?
	4.6 Service Level Agreements
	4.7 Technology
	4.8 Summary
	4.9 Self-Reflection
Chapter 5 IT Governance and Data Protection
	5.1 Introduction
	5.2 Architecture
		5.2.1 The FARR Model of Data Protection
			5.2.1.1 Fault Tolerance
			5.2.1.2 Availability
			5.2.1.3 Redundancy
			5.2.1.4 Recoverability
			5.2.1.5 Tying the FARR Model Together
		5.2.2 Data Protection Architect (DPA)
	5.3 Service Transition
	5.4 Change Management
	5.5 Summary
	5.6 Self-Reflection
Chapter 6 Monitoring and Reporting
	6.1 Introduction
	6.2 Monitoring
		6.2.1 Security and Privacy
		6.2.2 Health
			6.2.2.1 Drive Failures and Recovery Time
			6.2.2.2 Broader Uses of MTBF and MTTR
		6.2.3 Capacity
			6.2.3.1 RAID/Data Storage
			6.2.3.2 Snapshots
			6.2.3.3 Replication
			6.2.3.4 Backup and Recovery
		6.2.4 Performance
		6.2.5 Notifications versus Dashboards
	6.3 Reporting
		6.3.1 Reporting via Aggregation of Monitoring
		6.3.2 Reporting for Trending and Predictive Planning
		6.3.3 Automated Reporting
	6.4 Summary
	6.5 Self-Reflection
Chapter 7 Business Continuity
	7.1 Introduction
	7.2 Business versus IT Functions
	7.3 Risk versus Cost
	7.4 Planning Data Protection Strategies and Service Level Agreements
	7.5 Summary
	7.6 Self-Reflection
Chapter 8 Data Discovery
	8.1 Introduction
	8.2 What Will Be Protected?
	8.3 Data Gravity
	8.4 Shades of Data
	8.5 Indexing
	8.6 Summary
	8.7 Self-Reflection
Chapter 9 Security, Privacy, Ethical, and Legal Considerations
	9.1 Introduction
	9.2 Security and Privacy
		9.2.1 Logging
		9.2.2 Encryption
		9.2.3 Access Controls
			9.2.3.1 Multi-tenancy
			9.2.3.2 General User Controls
			9.2.3.3 Security Officers versus Service Administrator
			9.2.3.4 Do You Trust Trusted Access?
		9.2.4 Standard Security Controls
			9.2.4.1 Hardening Protocols
			9.2.4.2 Secure Physical Access
			9.2.4.3 Physical Data transport
		9.2.5 Secure Erasure
		9.2.6 Privacy Considerations
	9.3 Ethical Considerations
		9.3.1 Performance of Duties
		9.3.2 Custodians of Data
		9.3.3 Implications of Non-Protection
		9.3.4 Why Do We Care about Ethical Obligations?
	9.4 Legal Considerations
		9.4.1 Knowing Your Retention Requirements
			9.4.1.1 Overview
			9.4.1.2 Sarbanes–Oxley Act 2002
			9.4.1.3 Mandatory Records Retention
		9.4.2 European Union GDPR
		9.4.3 PCI DSS
		9.4.4 US Sheltered Harbor
		9.4.5 Data Separation
		9.4.6 In-Flight and At-Rest Encryption
		9.4.7 Mandatory Breach Reporting
	9.5 Summary
	9.6 Self-Reflection
Chapter 10 Continuous Availability, Replication, and CDP
	10.1 Introduction
		10.1.1 What’s a Few Nines between Friends?
		10.1.2 Data Protection and Reliability
	10.2 Continuous Availability
		10.2.1 Clustering
		10.2.2 Continuous Availability as a Virtualization Function
		10.2.3 Continuous Availability as a Storage Function
		10.2.4 A Combined Approach to Continuous Availability
	10.3 Replication
		10.3.1 Synchronous Replication
		10.3.2 Asynchronous Replication
	10.4 Continuous Data Protection
		10.4.1 CDP as a Storage Function
		10.4.2 CDP as a Virtualization Function
		10.4.3 File Versioning
	10.5 Summary
	10.6 Self-Reflection
Chapter 11 Snapshots
	11.1 Introduction
	11.2 Snapshot Techniques
		11.2.1 Copy on First Write
		11.2.2 Copy on First Access
		11.2.3 Redirect on Write
	11.3 Crash-Consistent versus Application-Consistent Snapshots
	11.4 Read-Only Versus Read/Write Snapshots
	11.5 Integration Points in Holistic Data Protection
	11.6 Operational versus Long-Term Retention for Snapshots
	11.7 Summary
	11.8 Self-Reflection
Chapter 12 Backup and Recovery
	12.1 Introduction
	12.2 Backup and Recovery Concepts
		12.2.1 Host Nomenclature
		12.2.2 Backup Topology
			12.2.2.1 Decentralized
			12.2.2.2 Centralized
			12.2.2.3 Hybrid/Modular Topology
			12.2.2.4 Embedded Topology
		12.2.3 Backup Levels
			12.2.3.1 Full Backups
			12.2.3.2 Incremental Backups
			12.2.3.3 Differential-Level Backups
			12.2.3.4 Synthetic Full Backups
			12.2.3.5 Virtual Synthetic Fulls
			12.2.3.6 Manual Backups
			12.2.3.7 Skipping Backups
			12.2.3.8 Full Once, Incrementals Forever
		12.2.4 Data Availability
			12.2.4.1 Offline Backups
			12.2.4.2 Online Backups
			12.2.4.3 Snapshot Backups
		12.2.5 Data Selection Types
			12.2.5.1 Inclusive Backups
			12.2.5.2 Exclusive Backups
		12.2.6 Backup Retention Strategies
			12.2.6.1 Dependency-Based Retention
			12.2.6.2 Simple Retention Model
			12.2.6.3 Manual Backups, Revisited
	12.3 Recovery Approaches
		12.3.1 Recovery Types
			12.3.1.1 Aggregated Filesystem View
			12.3.1.2 Last Filesystem View
			12.3.1.3 Point in Time Recoveries
			12.3.1.4 Destructive Recoveries
			12.3.1.5 Non-Indexed Recovery
			12.3.1.6 Incremental Recovery
		12.3.2 Recovery Locality
			12.3.2.1 Local Recovery
			12.3.2.2 Server-Initiated Recovery
			12.3.2.3 Directed Recovery
	12.4 Client Impact
		12.4.1 Server-Based Backups
		12.4.2 Serverless Backups
		12.4.3 Convergent Data Protection
	12.5 Database Backups
		12.5.1 Cold Database Backups
		12.5.2 Hot and Online Backups
		12.5.3 Database Export Backup
	12.6 Backup Initiation Methods
	12.7 Job Concurrency
		12.7.1 Server Concurrency
		12.7.2 Client Concurrency
		12.7.3 Device Concurrency
	12.8 Network Data Management Protocol
	12.9 Miscellaneous Enterprise Features
		12.9.1 Pre- and Post-Processing
		12.9.2 Arbitrary Command Execution
		12.9.3 Cluster Support
		12.9.4 Client Collections
		12.9.5 Backup Segregation
		12.9.6 Granular Backup Control
		12.9.7 Backup Schedule Overrides
		12.9.8 Security
		12.9.9 Duplication and Migration
		12.9.10 Alerts
		12.9.11 Command Line Interface and REST APIs
		12.9.12 Backup Catalogs
	12.10 Conflicting SLAs for Backup Systems Design
	12.11 Summary
	12.12 Self-Reflection
Chapter 13 Deduplication
	13.1 Introduction
	13.2 Key Architectural Aspects of Deduplication
		13.2.1 Inline versus Post-Processing
		13.2.2 Variable versus Fixed Block Size Deduplication
		13.2.3 Segment Size
		13.2.4 Source versus Target Deduplication
		13.2.5 Deduplication Pool Size
	13.3 What Does and Doesn’t Deduplicate?
	13.4 Cost Considerations
	13.5 Deduplication Considerations for Data Protection in Primary Storage
	13.6 Deduplication Considerations for Data Protection in Backup and Recovery Systems
		13.6.1 The Case for Deduplication
		13.6.2 Revisiting Source versus Target Deduplication
		13.6.3 Advanced Deduplication Features
	13.7 Deduplication Capacity Management
	13.8 Cleaning Operations
	13.9 Summary
	13.10 Self-Reflection
Chapter 14 The Cloud
	14.1 Introduction
	14.2 Data Protection Risks in the Public Cloud
		14.2.1 Should the Workload Be There?
		14.2.2 Is the Workload Secured?
		14.2.3 Is the Workload Protected?
		14.2.4 What Is the Exit Strategy?
	14.3 The Rise of Shadow IT
	14.4 Public Clouds and Availability
		14.4.1 What’s a Few Nines between Friends (Redux)?
		14.4.2 Data Loss versus Accessibility Loss
		14.4.3 Objectives and Agreements
		14.4.4 Cascaded Providers
		14.4.5 Cloud as Another Datacenter
		14.4.6 The FARR Model Applies to Cloud
	14.5 Cloud Native Protection
		14.5.1 Cloud Snapshots
		14.5.2 Holistic Data Protection Services
		14.5.3 Converting Snapshots to Backups
		14.5.4 Long-Term Retention and Cloud Native
	14.6 Protecting SaaS Systems
	14.7 PaaS Protection
	14.8 Data Protection for FaaS
	14.9 Data Protection for IaaS
		14.9.1 Built-in Approach
		14.9.2 Self-Service Approach
	14.10 Private and Hybrid Clouds
		14.10.1 Private Clouds
	14.11 Hybrid Cloud
	14.12 Extending Data Protection into the Cloud
	14.13 Backup as a Service
	14.14 Disaster Recovery as a Service
	14.15 Architectural Considerations for Cloud Service Providers
	14.16 Summary
	14.17 Self-Reflection
Chapter 15 Protecting Virtual Infrastructure
	15.1 Introduction
	15.2 Snapshots
	15.3 Replication
	15.4 Backup and Recovery
		15.4.1 Image-Level versus In-Guest Backup
		15.4.2 Virtualized Database Backups
		15.4.3 Recovery Options
		15.4.4 The Long-Term Retention Conundrum
		15.4.5 Virtualizing the Backup Infrastructure
	15.5 Containers and Data Protection
	15.6 Summary
	15.7 Self-Reflection
Chapter 16 Big Data
	16.1 Introduction
	16.2 Protecting within the Big Data Environment
	16.3 Big Data That Isn’t Big Data
	16.4 Using Data Protection Storage in a Big Data Environment
	16.5 Summary
	16.6 Self-Reflection
Chapter 17 Protecting the Edge
	17.1 Introduction
	17.2 Laptop and Desktop Protection
		17.2.1 Using Enterprise Backup and Recovery Systems
		17.2.2 Local Systems Protection
		17.2.3 Is Cloud Backup the Answer?
		17.2.4 Is Cloud Storage the Answer?
		17.2.5 Replicating to a Central Server
		17.2.6 Summary of Laptop/Desktop Backup Options
	17.3 Smartphones and Tablets
	17.4 Protecting Internet of Things
	17.5 The Branch Office/Remote Office Conundrum
	17.6 Summary
	17.7 Self-Reflection
Chapter 18 Data Storage Fault Tolerance
	18.1 Introduction
	18.2 Traditional RAID
		18.2.1 RAID-1
		18.2.2 RAID-5
		18.2.3 RAID-4
		18.2.4 RAID-6
	18.3 Nested RAID
	18.4 Sub-drive RAID
		18.4.1 Capacity-Optimized Sub-drive RAID
		18.4.2 Scattered RAID
	18.5 Object-Level Protection
		18.5.1 Geo-Distribution
		18.5.2 Erasure Coding
	18.6 Summary
	18.7 Self-Reflection
Chapter 19 Tape
	19.1 Introduction: The Historical Primacy of Tape
	19.2 Hierarchical Storage Management and Archive
	19.3 Backup and Recovery
		19.3.1 Media Spanning
		19.3.2 Rapid Data Access
		19.3.3 Media Multiplexing
		19.3.4 Twinning/Automated Replication
		19.3.5 Library/SAN Sharing
		19.3.6 Dynamic Drive Sharing
		19.3.7 Library Partitioning
		19.3.8 Physical Media Management
	19.4 Decline of Tape
		19.4.1 HSM and Archive
		19.4.2 Backup and Recovery
			19.4.2.1 Disk-to-Disk-to-Tape
			19.4.2.2 Disk-to-Disk-to-Disk
			19.4.2.3 Disk-to-Disk-to-Cloud
	19.5 Do Unmanaged Tapes Provide Protection?
	19.6 Is Tape a Ransomware Shield?
	19.7 Legal Challenges for Tape
	19.8 Considerations When Migrating Away from Tape
		19.8.1 Cost-per-GB
		19.8.2 Disk-to-Disk-to-Tape Isn’t Always an Efficient Start
		19.8.3 Removing Tape Can Remove Complexity
		19.8.4 Disk Will Wait
		19.8.5 Disk Is Not a Silver Bullet
		19.8.6 Disk Is Online
		19.8.7 Deduplication Is Not Deduplication Is Not Deduplication
	19.9 Summary
	19.10 Self-Reflection
Chapter 20 Converged Infrastructure
	20.1 Introduction
	20.2 Protecting Converged Systems
	20.3 Protection Compatibility
	20.4 What Will Be Protected? (Redux)
	20.5 Converged Staff
	20.6 Summary
Chapter 21 Data Protection Service Catalogs
	21.1 Introduction
	21.2 Key Requirements for a Service Catalog
		21.2.1 Utility
		21.2.2 Measurable
		21.2.3 Achievable
		21.2.4 Distinct
		21.2.5 Costed
		21.2.6 Priced
		21.2.7 Repeatable
	21.3 Service Catalog Tiers and Options
		21.3.1 Service Catalog Based on Application Type
		21.3.2 Service Catalog Independent of Application Type
		21.3.3 Service Catalog Options per Data Protection Activity
	21.4 Retention Multiplier
	21.5 Including Service Level Agreements in Service Catalogs
	21.6 Building a Data Protection Service Catalog
	21.7 Summary
	21.8 Self-Reflection
Chapter 22 Holistic Data Protection Strategies
	22.1 Introduction
	22.2 Examples of Holistic Data Protection Strategies
		22.2.1 Large NAS Protection
		22.2.2 Virtual Machine Protection
		22.2.3 Mission Critical Database Protection
	22.3 Planning Holistic Data Protection Strategies
	22.4 Summary
	22.5 Self-Reflection
Chapter 23 Making Data Protection Smarter
	23.1 Introduction
	23.2 Secondary Use Cases for Protected Data
	23.3 Data Protection Overlap
	23.4 Automated Processes
	23.5 Adaptive Processes
	23.6 Summary
Chapter 24 Data Recovery
	24.1 Introduction
	24.2 Recovery versus Service Restoration
	24.3 On-Platform versus Off-Platform Recovery
	24.4 Context Aware Recoveries
	24.5 Designing for Recovery
	24.6 Recovery Facilitation
		24.6.1 Automated versus Manual Recoveries
		24.6.2 Who Performs the Recovery?
		24.6.3 Frequency of Recovery
		24.6.4 Recency of Data Protection
	24.7 Recovery Procedures and Recommendations
		24.7.1 Read the Documentation before Starting a Recovery
		24.7.2 Choosing the Correct Recovery Location
		24.7.3 Provide an Estimate of How Long the Recovery Will Take
		24.7.4 Provide Updates during Recoveries
		24.7.5 Don’t Assume a Recovery Can Be Done If It Hasn’t Been Tested
		24.7.6 Run Recoveries from Sessions That Can Be Disconnected from/Reconnected To
		24.7.7 Remember Quantum Physics
		24.7.8 Be Patient
		24.7.9 Document the Current Status of the Recovery
		24.7.10 Note Errors, and What Led to Them
		24.7.11 Don’t Assume the Recovery Is an Exam
		24.7.12 Ensure the Recovery Is Performed by Those Trained to Do It
		24.7.13 Write a Post-Recovery Report
		24.7.14 Update Incorrect Instructions
		24.7.15 Considerations Specific to Tape
	24.8 Disaster Recovery Considerations
		24.8.1 Maintenance Backups
		24.8.2 Avoid Upgrades
		24.8.3 Read the Documentation before Backups Are Performed
		24.8.4 Disaster Recoveries Must Be Run by Administrators
		24.8.5 Use Compatible Infrastructure
		24.8.6 Know the System Dependencies
		24.8.7 Keep Accurate System Documentation
		24.8.8 Do You Know Where Your Licenses Are at 1am?
		24.8.9 Disaster Recovery Exercises
	24.9 Protecting the Protection Environment
	24.10 Cyber-Recovery
	24.11 Summary
	24.12 Self-Reflection
Chapter 25 Long-Term Retention Considerations
	25.1 Introduction
	25.2 Determining Long-term Retention Requirements
	25.3 Why Is Archive Challenging?
	25.4 Revisiting Storage Requirements for Long-term Retention
	25.5 Format Considerations
	25.6 Media Considerations
	25.7 Data Protection Considerations
	25.8 Summary
	25.9 Self-Reflection
Chapter 26 Choosing Protection Infrastructure
	26.1 Introduction
	26.2 It’s Never about the Technology
	26.3 It’s Always about the Technology
	26.4 Coverage
		26.4.1 Value Products That Value Protection
		26.4.2 Value Frameworks/Modular Composable Functions over Monoliths
		26.4.3 Don’t Assume
		26.4.4 Functionality Checklist
		26.4.5 Don’t Tie a Legacy Anchor around Your Feet
		26.4.6 Plan to Upgrade
		26.4.7 Minimize Vendors, Not Products
		26.4.8 Understand the Costs
	26.5 You May Be Sizing Your Data Protection Solution Wrong
	26.6 In Summary
	26.7 Self-Reflection
Chapter 27 The Impact of Flash on Data Protection
	27.1 Introduction
	27.2 How Does Flash Affect Data Protection?
	27.3 In Summary
Chapter 28 In Closing




نظرات کاربران