Data protection : ensuring data availability
Material type: TextPublication details: London CRC 2017Description: 400 pISBN: 9780367240400Subject(s): Computer networks | Data protectionDDC classification: 005.8 Summary: "This book arms readers with information for making decisions on how to protect data from loss in the cloud, on-site, or both. It explains the changing face of data recovery and techniques for dealing with big data. The second edition has new chapters on ethical and legal issues, convergent data protection, architecture, smart data protection, and protection at the edge. It also includes expanded chapters on data protection in the cloud and protecting infrastructure. Key Features: Protect data and systems from ransomware and other cyberthreats Become compliant with legal requirements for protecting data Protect data in the cloud, on-premises, or in mixed environments Tackle deduplication to ensure data integrity Author Bio: Preston de Guise has been working with data recovery products for his entire career - designing, implementing and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too"--Item type | Current library | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
BK | Stack | Stack | 005.8 DEG/D (Browse shelf (Opens below)) | Available | 58891 |
Browsing Kannur University Central Library shelves, Shelving location: Stack, Collection: Stack Close shelf browser (Hides shelf browser)
005.8 BRI/C Computer forensics and cyber crime : an introduction | 005.8 BRI/C Computer forensics and cyber crime : an introduction | 005.8 CLO Cloud computing security : foundations and challenges | 005.8 DEG/D Data protection : ensuring data availability | 005.8 EAS/C Computer security fundamentals | 005.8 END/C Cybersecurity and information security analysts : a practical career guide | 005.8 GRO/D Dot net technology |
"This book arms readers with information for making decisions on how to protect data from loss in the cloud, on-site, or both. It explains the changing face of data recovery and techniques for dealing with big data. The second edition has new chapters on ethical and legal issues, convergent data protection, architecture, smart data protection, and protection at the edge. It also includes expanded chapters on data protection in the cloud and protecting infrastructure. Key Features: Protect data and systems from ransomware and other cyberthreats Become compliant with legal requirements for protecting data Protect data in the cloud, on-premises, or in mixed environments Tackle deduplication to ensure data integrity Author Bio: Preston de Guise has been working with data recovery products for his entire career - designing, implementing and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too"--
There are no comments on this title.