Limit search to available items
Book Cover
E-book
Author De Guise, Preston, author.

Title Data protection : ensuring data availability / by Preston De Guise
Edition Second edition
Published Boca Raton, FL : Auerbach Publications/CRC Press, 2020

Copies

Description 1 online resource (423 pages)
Contents Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Chapter 1 Introduction -- 1.1 The Value of Data -- 1.2 The Lay of the Land -- 1.3 What Are You Doing Here? -- 1.4 What's Changed in the Datacenter? -- 1.5 What Is Data Protection? -- 1.5.1 Data Protection as a Security Activity -- 1.5.2 Data Protection as a Privacy Activity -- 1.5.3 Data Protection as a Storage/Recovery Activity -- 1.6 Key Challenges -- 1.6.1 The Rise of Unstructured Data -- 1.6.2 Big Data -- 1.6.3 Cloud -- 1.6.4 Virtualization -- 1.6.5 Containers and Functions
1.6.6 Data and Systems Complexity -- 1.6.7 The Law -- 1.6.8 Crime -- 1.7 A Brief History of Data Protection -- 1.8 The Miserly Hoarder -- 1.9 Summary -- 1.10 Self-Reflection -- Personal Data -- Business Data -- Chapter 2 Contextualizing Data Protection -- 2.1 Introduction -- 2.2 Data Classification -- 2.2.1 What Is the Data? -- 2.2.2 Where Is the Data? -- 2.2.3 Who Uses the Data? -- 2.2.4 When Is the Data Used? -- 2.2.5 How Is the Data Used? -- 2.2.6 Summarizing Data Classification -- 2.3 Protection Methodology -- 2.4 Protection vs Regeneration -- 2.5 Organizational Change -- 2.6 Summary
2.7 Self-Reflection -- Chapter 3 Data Lifecycle -- 3.1 Introduction -- 3.2 Understanding Copy Proliferation -- 3.3 Archiving and Deleting -- 3.4 Summary -- 3.5 Self-Reflection -- Chapter 4 Elements of a Protection System -- 4.1 Introduction -- 4.2 People -- 4.2.1 Designers -- 4.2.2 Operators -- 4.2.3 End Users -- 4.2.4 Data Protection Team -- 4.3 Training -- 4.4 Documentation and Processes -- 4.4.1 Design -- 4.4.2 Implementation -- 4.4.2.1 System Configuration Guide -- 4.4.2.2 System Map -- 4.5 Testing -- 4.5.1 Type Testing -- 4.5.2 Informal vs Formal -- 4.5.2.1 Test Procedure
4.5.2.2 Test Register -- 4.5.2.3 Test Schedule -- 4.5.3 Performance Testing -- 4.5.4 Test Risks -- 4.5.5 Automated Testing -- 4.5.6 What Is a Test? -- 4.6 Service Level Agreements -- 4.7 Technology -- 4.8 Summary -- 4.9 Self-Reflection -- Chapter 5 IT Governance and Data Protection -- 5.1 Introduction -- 5.2 Architecture -- 5.2.1 The FARR Model of Data Protection -- 5.2.1.1 Fault Tolerance -- 5.2.1.2 Availability -- 5.2.1.3 Redundancy -- 5.2.1.4 Recoverability -- 5.2.1.5 Tying the FARR Model Together -- 5.2.2 Data Protection Architect (DPA) -- 5.3 Service Transition -- 5.4 Change Management
5.5 Summary -- 5.6 Self-Reflection -- Chapter 6 Monitoring and Reporting -- 6.1 Introduction -- 6.2 Monitoring -- 6.2.1 Security and Privacy -- 6.2.2 Health -- 6.2.2.1 Drive Failures and Recovery Time -- 6.2.2.2 Broader Uses of MTBF and MTTR -- 6.2.3 Capacity -- 6.2.3.1 RAID/Data Storage -- 6.2.3.2 Snapshots -- 6.2.3.3 Replication -- 6.2.3.4 Backup and Recovery -- 6.2.4 Performance -- 6.2.5 Notifications versus Dashboards -- 6.3 Reporting -- 6.3.1 Reporting via Aggregation of Monitoring -- 6.3.2 Reporting for Trending and Predictive Planning -- 6.3.3 Automated Reporting -- 6.4 Summary
Summary The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. There are three essential activities that refer to themselves as data protection; while they all overlap in terms of scope and function, each operates as a reasonably self-contained field with its own specialists and domain nomenclature. These three activities are: Data protection as a storage and recovery activity Data protection as a security activity Data protection as a privacy activity These activities are covered in detail, with a focus on how organizations can use them to leverage their IT investments and optimize costs. The book also explains how data protection is becoming an enabler for new processes around data movement and data processing. This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized datacenter and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business. About the Author Preston de Guise has been working with data recovery products for his entire career--designing, implementing, and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too
Bibliography Includes bibliographical references and index
Notes Preston de Guise has been working with data recovery products for his entire career - designing, implementing and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too
Print version record
Subject Computer networks -- Security measures.
Data protection.
COMPUTERS -- Data Processing -- Storage & Retrieval.
COMPUTERS -- Disaster Recovery.
Computer networks -- Security measures
Data protection
Form Electronic book
ISBN 9781000062458
1000062457
9780367463496
0367463490
9781000062571
1000062570
9781315169620
1315169622
9781000062519
1000062511