Data Protection Ensuring Data Availability 2nd edition by Preston de Guise – Ebook PDF Instant Download/Delivery: 1000062570, 9781000062571
Full download Data Protection Ensuring Data Availability 2nd edition after payment

Product details:
ISBN 10: 1000062570
ISBN 13: 9781000062571
Author: Preston de Guise
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. There are three essential activities that refer to themselves as data protection; while they all overlap in terms of scope and function, each operates as a reasonably self-contained field with its own specialists and domain nomenclature. These three activities are: • Data protection as a storage and recovery activity • Data protection as a security activity • Data protection as a privacy activity These activities are covered in detail, with a focus on how organizations can use them to leverage their IT investments and optimize costs. The book also explains how data protection is becoming an enabler for new processes around data movement and data processing. This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized datacenter and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business. About the Author Preston de Guise has been working with data recovery products for his entire career—designing, implementing, and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too.
Data Protection Ensuring Data Availability 2nd Table of contents:
Sure! Here’s the text you provided, reformatted according to the table of contents structure:
Acknowledgments
1. Introduction
1.1 The Value of Data
1.2 The Lay of the Land
1.3 What Are You Doing Here?
1.4 What’s Changed in the Datacenter?
1.5 What Is Data Protection?
1.5.1 Data Protection as a Security Activity
1.5.2 Data Protection as a Privacy Activity
1.5.3 Data Protection as a Storage/Recovery Activity
1.6 Key Challenges
1.6.1 The Rise of Unstructured Data
1.6.2 Big Data
1.6.3 Cloud
1.6.4 Virtualization
1.6.5 Containers and Functions
1.6.6 Data and Systems Complexity
1.6.7 The Law
1.6.8 Crime
1.7 A Brief History of Data Protection
1.8 The Miserly Hoarder
1.9 Summary
1.10 Self-Reflection
- Personal Data
- Business Data
2. Contextualizing Data Protection
2.1 Introduction
2.2 Data Classification
2.2.1 What Is the Data?
2.2.2 Where Is the Data?
2.2.3 Who Uses the Data?
2.2.4 When Is the Data Used?
2.2.5 How Is the Data Used?
2.2.6 Summarizing Data Classification
2.3 Protection Methodology
2.4 Protection vs Regeneration
2.5 Organizational Change
2.6 Summary
2.7 Self-Reflection
3. Data Lifecycle
3.1 Introduction
3.2 Understanding Copy Proliferation
3.3 Archiving and Deleting
3.4 Summary
3.5 Self-Reflection
4. Elements of a Protection System
4.1 Introduction
4.2 People
4.2.1 Designers
4.2.2 Operators
4.2.3 End Users
4.2.4 Data Protection Team
4.3 Training
4.4 Documentation and Processes
4.4.1 Design
4.4.2 Implementation
4.4.2.1 System Configuration Guide
4.4.2.2 System Map
4.5 Testing
4.5.1 Type Testing
4.5.2 Informal vs Formal
4.5.2.1 Test Procedure
4.5.2.2 Test Register
4.5.2.3 Test Schedule
4.5.3 Performance Testing
4.5.4 Test Risks
4.5.5 Automated Testing
4.5.6 What Is a Test?
4.6 Service Level Agreements
4.7 Technology
4.8 Summary
4.9 Self-Reflection
5. IT Governance and Data Protection
5.1 Introduction
5.2 Architecture
5.2.1 The FARR Model of Data Protection
5.2.1.1 Fault Tolerance
5.2.1.2 Availability
5.2.1.3 Redundancy
5.2.1.4 Recoverability
5.2.1.5 Tying the FARR Model Together
5.2.2 Data Protection Architect (DPA)
5.3 Service Transition
5.4 Change Management
5.5 Summary
5.6 Self-Reflection
6. Monitoring and Reporting
6.1 Introduction
6.2 Monitoring
6.2.1 Security and Privacy
6.2.2 Health
6.2.2.1 Drive Failures and Recovery Time
6.2.2.2 Broader Uses of MTBF and MTTR
6.2.3 Capacity
6.2.3.1 RAID/Data Storage
6.2.3.2 Snapshots
6.2.3.3 Replication
6.2.3.4 Backup and Recovery
6.2.4 Performance
6.2.5 Notifications versus Dashboards
6.3 Reporting
6.3.1 Reporting via Aggregation of Monitoring
6.3.2 Reporting for Trending and Predictive Planning
6.3.3 Automated Reporting
6.4 Summary
6.5 Self-Reflection
7. Business Continuity
7.1 Introduction
7.2 Business versus IT Functions
7.3 Risk versus Cost
7.4 Planning Data Protection Strategies and Service Level Agreements
7.5 Summary
7.6 Self-Reflection
8. Data Discovery
8.1 Introduction
8.2 What Will Be Protected?
8.3 Data Gravity
8.4 Shades of Data
8.5 Indexing
8.6 Summary
8.7 Self-Reflection
9. Security, Privacy, Ethical, and Legal Considerations
9.1 Introduction
9.2 Security and Privacy
9.2.1 Logging
9.2.2 Encryption
9.2.3 Access Controls
9.2.3.1 Multi-tenancy
9.2.3.2 General User Controls
9.2.3.3 Security Officers versus Service Administrator
9.2.3.4 Do You Trust Trusted Access?
9.2.4 Standard Security Controls
9.2.4.1 Hardening Protocols
9.2.4.2 Secure Physical Access
9.2.4.3 Physical Data Transport
9.2.5 Secure Erasure
9.2.6 Privacy Considerations
9.3 Ethical Considerations
9.3.1 Performance of Duties
9.3.2 Custodians of Data
9.3.3 Implications of Non-Protection
9.3.4 Why Do We Care about Ethical Obligations?
9.4 Legal Considerations
9.4.1 Knowing Your Retention Requirements
9.4.1.1 Overview
9.4.1.2 Sarbanes–Oxley Act 2002
9.4.1.3 Mandatory Records Retention
9.4.2 European Union GDPR
9.4.3 PCI DSS
9.4.4 US Sheltered Harbor
9.4.5 Data Separation
9.4.6 In-Flight and At-Rest Encryption
9.4.7 Mandatory Breach Reporting
9.5 Summary
9.6 Self-Reflection
10. Continuous Availability, Replication, and CDP
10.1 Introduction
10.1.1 What’s a Few Nines between Friends?
10.1.2 Data Protection and Reliability
10.2 Continuous Availability
10.2.1 Clustering
10.2.2 Continuous Availability as a Virtualization Function
10.2.3 Continuous Availability as a Storage Function
10.2.4 A Combined Approach to Continuous Availability
10.3 Replication
10.3.1 Synchronous Replication
10.3.2 Asynchronous Replication
10.4 Continuous Data Protection
10.4.1 CDP as a Storage Function
10.4.2 CDP as a Virtualization Function
10.4.3 File Versioning
10.5 Summary
10.6 Self-Reflection
People also search for Data Protection Ensuring Data Availability 2nd :
data protection ensuring data availability pdf
ensure data availability
data availability usability integrity and security
a data protection authority is responsible for
what is a way to ensure data availability
Tags:
Preston de Guise,Data Protection,Data Availability
Reviews
There are no reviews yet.