Muutke küpsiste eelistusi

E-raamat: Modern Data Protection

  • Formaat: 386 pages
  • Ilmumisaeg: 29-Apr-2021
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9781492094005
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 47,96 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 386 pages
  • Ilmumisaeg: 29-Apr-2021
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9781492094005
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365, Google Workspace, and Salesforce; and persistent data created by Kubernetes and container workloads.

To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine which is right for your company. You'll learn the unique requirements that each workload presents, then explore various categories of commercial backup hardware, software, and services available to protect these data sources, including the advantages and disadvantages of each approach.

  • Learn the workload types that your organization should be backing up
  • Explore the hardware, software, and services you can use to back up your systems
  • Understand what's wrong with your current data protection system
  • Pair your backed-up workloads to the appropriate backup system
  • Learn the adjustments that will make your backups better, without wasting money
Foreword xiii
Preface xv
1 Risks to Your Data: Why We Back Up
1(18)
Human Disasters
2(1)
Accidents
3(1)
Bad Code
4(1)
Malicious Attacks
5(1)
Terrorism
6(1)
Electronic Attacks
6(1)
Ransomware
7(1)
Internal Threats
8(4)
Mechanical or System Failure
12(1)
Power Disruptions
12(1)
There Is No Cloud
13(1)
System Failure
13(1)
Natural Disasters
14(1)
Floods
15(1)
Fires
15(1)
Earthquakes
16(1)
Hurricanes, Typhoons, and Cyclones
16(1)
Tornadoes
17(1)
Sinkholes
17(1)
Takeaways
18(1)
2 Gathering and Determining Service Levels
19(18)
What Does Your Organization Do?
20(1)
Build Yourself a Framework
20(1)
Document Templates
21(1)
Review/Advisory Boards
22(1)
Collecting Requirements
23(1)
What Are RPO and RTO?
23(1)
Find the Subject Matter Experts
23(2)
Solicit Requirements
25(1)
Review Requirements
26(2)
Design and Build Your System
28(1)
Draw up Multiple Designs
29(1)
Review the Designs
30(1)
Select and Build the System
30(1)
Document and Implement the New System
31(1)
Defining Operational Responsibility
31(1)
Operations Review and Documentation
32(1)
Documentation Is Good
32(1)
Runbooks
33(1)
Implement the New System
33(1)
Takeaways
34(3)
3 Backup and Archive Are Very Different
37(22)
Before We Get Started
37(1)
What Is Backup?
38(1)
"Copy"
39(1)
"Stored Separately from the Original"
40(1)
"For the Purposes of Restoring"
40(1)
What Is a Restore?
40(1)
How Does a Restore Work?
41(1)
The 3-2-1 Rule
42(5)
What Is an Archive?
47(1)
To Serve as a Reference
48(1)
Stored with Additional Metadata
48(1)
What Is a Retrieve?
49(1)
Protecting Backup and Archive Data
50(1)
Encryption
50(1)
Air Gaps
51(4)
Immutability
55(2)
Takeaways
57(2)
4 Backup and Recovery Basics
59(30)
Recovery Testing
59(1)
Backup Levels
60(1)
Traditional Full Backup
60(1)
Traditional Incremental Backup
61(6)
Do Backup Levels Matter?
67(1)
Metrics
68(1)
Recovery Metrics
69(3)
Capacity Metrics
72(2)
Backup Window
74(1)
Backup and Recovery Success and Failure
75(1)
Retention
75(1)
Using Metrics
76(1)
Backup and Archive Myths
77(5)
Item-Versus Image-Level Backups
82(1)
Item-Level Backup
82(1)
Image-Level Backups
83(1)
File-Level Recovery from an Image-Level Backup
84(1)
Combining Image- and File-Level Backups
84(1)
Backup Selection Methods
85(1)
Selective Inclusion Versus Selective Exclusion
85(1)
Tag-Based and Folder-Based Inclusion
86(1)
Takeaways
87(2)
5 Using Disk and Deduplication for Data Protection
89(26)
Deduplication
90(1)
What Can Dedupe Do?
90(3)
How Dedupe Works
93(3)
Target Deduplication
96(3)
Source Deduplication
99(1)
Target Versus Source Deduplication
99(1)
Hybrid Dedupe
100(1)
Selecting the Right Dedupe for You
101(1)
Using Disk in Your Backup System
102(1)
Disk Caching
102(2)
Disk-to-Disk-to-Tape (D2D2T)
104(1)
Disk-to-Disk-to-Disk (D2D2D)
104(2)
Direct-to-Cloud (D2C)
106(1)
Disk-to-Disk-to-Cloud (D2D2C)
106(1)
Recovery Concepts
107(1)
Image Recovery
107(1)
File-Level Recovery
108(3)
Instant Recovery
111(2)
Choosing a Recovery Type
113(1)
Takeaways
113(2)
6 Traditional Data Sources
115(18)
Physical Servers
116(1)
Standard Backup
116(1)
Bare-Metal Backup
116(1)
Backing Up NAS
117(2)
Virtual Servers
119(1)
VM-Level Backups
120(1)
What Is VSS?
121(1)
Specialized Backups for Hypervisors
122(4)
Desktops and Laptops
126(1)
Laptops as a Cache
127(1)
Normal Desktop and Laptop Usage
127(1)
Desktop and Laptop Backup Options
128(2)
Mobile Devices
130(1)
Cloud Sync
131(1)
Physical Sync
131(1)
Mobile Device Backup
131(1)
Mobile Device Management (MDM)
131(1)
Takeaways
132(1)
7 Protecting Databases
133(26)
Database Delivery Models
133(1)
Traditional Database Software
134(1)
Platform-as-a-Service
135(1)
Serverless Databases
136(1)
Database Models
137(2)
Consistency Models
139(1)
Traditional Databases Running in Your Datacenter
140(1)
PaaS and Serverless Databases
141(1)
Traditional Database Terminology
142(1)
Instance
143(1)
Database
143(1)
Table
143(1)
Index
143(1)
Row
144(1)
Attribute
144(1)
Data File
144(1)
Tablespace
144(1)
Partition
144(1)
Master File
145(1)
Transaction
145(1)
Transaction Log
145(1)
Backing Up Traditionally Delivered Databases
146(1)
Cold Backup
147(1)
Split Replica
147(1)
Hot Backup Mode
147(1)
Snap and Sweep
147(1)
Dump and Sweep
148(1)
Stream-to-Backup Product
149(1)
Transaction Log Backup
149(1)
Master File
150(1)
Backing Up PaaS and Serverless Databases
150(1)
Dump and Sweep
151(1)
Integrated Backup-as-a-Service
151(4)
Recovering Traditional Databases
155(1)
Recovering Modern Databases
156(1)
Takeaways
157(2)
8 Modem Data Sources
159(30)
The Public Cloud
159(1)
Infrastructure-as-a-Service (IaaS)
160(5)
Platform-as-a-Service (PaaS)
165(1)
Serverless Services
166(1)
Software-as-a-Service (SaaS)
166(6)
You Need to Protect the Cloud
172(5)
Hybrid Cloud Configurations
177(1)
NFS/SMB Gateway
177(1)
The Cloud in a Box
178(1)
Docker and Kubernetes
179(1)
How Containers Break Backups
180(1)
Dockerfiles
181(1)
Docker Images
181(1)
Kubernetes etcd
182(1)
Persistent Volumes
182(1)
Databases
183(1)
Kubernetes: A New Path
184(1)
The Internet of Things (IoT)
185(1)
Making Backup Decisions
186(1)
Criticality to the Organization
186(1)
Consider the Source
187(1)
Takeaways
188(1)
9 Backup and Recovery Software Methods
189(24)
Is Everything Backup?
189(1)
Backup Methods Supporting a Traditional Restore
190(1)
Multiplexing
191(1)
Traditional Full and Incremental Backups
191(1)
File-Level Incremental Forever
192(1)
Block-Level Incremental Forever
193(1)
Source Deduplication
194(2)
Methods Supporting Instant Recovery
196(1)
Replication
196(2)
Continuous Data Protection (CDP)
198(2)
Snapshots
200(2)
Near-Continuous Data Protection (Near-CDP)
202(2)
Copy Data Management
204(1)
Other Software with Instant Recovery
205(1)
Leveraging Backups for More
206(2)
Deciding on a Backup Method
208(1)
Does What You Have Meet Your Needs?
208(1)
Advantages and Disadvantages of Different Approaches
209(1)
Complete Solution
210(1)
Takeaways
211(2)
10 Archive Software Methods
213(12)
A Deeper Dive into Archive
213(1)
Retrieval Versus Restore
214(1)
Types of Archive Systems
215(1)
Traditional Batch Archive
215(1)
Real-Time Archive
216(1)
HSM-Style Archive
217(1)
Deciding on an Archive System
218(1)
Do You Need One?
219(1)
Requirements
220(3)
Takeaways
223(2)
11 Disaster Recovery Methods
225(32)
Disaster Recovery Becomes Paramount
225(1)
Ransomware Changed Everything
226(2)
An Overview of Disaster Recovery
228(1)
What Is in a DR Plan?
229(2)
A Box of Tapes Isn't a DR Plan
231(1)
A Replicated Dedupe Appliance Isn't Much Better
232(1)
It's All About the RTA
232(1)
Building a Recovery Site
233(1)
Roll Your Own DR Site
233(1)
Recovery-Site-as-a-Service
234(1)
The Public Cloud Was Born for DR
235(1)
Keeping the DR Site Up to Date
236(1)
Cold, Hot, and Warm Sites
236(1)
Choosing Hot, Warm, or Cold
237(1)
Recovery Mechanisms
237(8)
Software or Service
245(1)
Commercial DR Software
245(1)
DR-as-a-Service
246(2)
All-in-One or Best of Breed?
248(1)
Choosing a Plan
249(1)
Creating a DR Runbook
250(1)
Runbook Goals
250(2)
Overview
252(1)
Technology Inventory
253(1)
Contact Information
253(1)
Procedures
254(2)
Exception Processing with Escalation
256(1)
Takeaways
256(1)
12 Data Protection Targets
257(28)
Tape Drives
257(1)
What Tape Is Good At
258(4)
What Tape Is Bad At
262(3)
How Did This Happen?
265(1)
Tape Drive Technologies
266(1)
Optical Media
267(1)
Individual Disk Drives
268(1)
Standard Disk Arrays
269(1)
Object Storage
270(2)
Target Deduplication Appliances
272(1)
Virtual Tape Libraries
272(1)
NAS Appliances
273(1)
Public Cloud Storage
274(1)
Choosing and Using a Backup Target
275(1)
Optimize the Performance of What You Have
275(3)
Select a More Appropriate Device
278(5)
Takeaways
283(2)
13 Commercial Data Protection Challenges
285(18)
A Brief History of Backup
285(2)
Challenges with Commercial Backup Solutions
287(1)
Size the Backup System
288(4)
Maintain Backup Server OS
292(1)
Maintain Backup Software
293(1)
Manage Multiple Vendors
294(1)
Separate System for DR
295(1)
Separate System for E-Discovery
295(1)
Tape-Related Challenges
296(2)
Disk-Related Challenges
298(1)
Large Up-Front Capital Purchases
299(1)
Overprovisioning Is Required
300(1)
Difficult to Scale
300(1)
Difficulty of Changing Backup Products
301(1)
Let Them Expire
301(1)
Use a Service
301(1)
Restore and Backup
302(1)
Takeaways
302(1)
14 Traditional Data Protection Solutions
303(12)
Not Naming Names
304(1)
Traditional Backup Solutions
304(1)
Advantages of Traditional Backup
305(1)
Challenges with Traditional Backup
306(1)
Analysis
307(2)
Target Deduplication Backup Appliances
309(1)
Advantages of Target Dedupe
310(1)
Challenges with Target Dedupe
311(2)
Analysis
313(1)
Takeaways
314(1)
15 Modern Data Protection Solutions
315(24)
Virtualization-Centric Solutions
316(1)
Advantages of Virtualization-Centric Solutions
317(1)
Challenges of Virtualization-Centric Backup
318(1)
Analysis
319(1)
Hyper-Converged Backup Appliances
320(1)
Advantages of Hyper-Converged Backup Appliances
321(2)
Challenges with HCBAs
323(1)
Analysis
324(1)
Data-Protection-as-a-Service (DPaaS)
325(3)
Advantages of DPaaS
328(1)
Challenges of DPaaS
329(2)
Analysis
331(1)
Fully Managed Service Providers
332(1)
Advantages of Using an MSP
333(1)
Challenges of Using an MSP
333(1)
Analysis
334(1)
Adapting to the Market
334(1)
Traditional Backup Appliances
334(1)
Subscription Pricing
335(1)
Responding to the Cloud
335(2)
Takeaways
337(2)
16 Replacing or Upgrading Your Backup System
339(16)
Which Solution Is Best for You?
341(2)
Your Responsibilities
343(2)
Before You Do Anything
345(1)
This Is Your Backup System
345(2)
Consider TCO, Not Just Acquisition Cost
347(2)
Picking a Solution
349(1)
Find Any Showstoppers
350(1)
Prioritize Ease of Use
350(1)
Prioritize Scalability
351(1)
Prioritize Future Proofing
352(1)
Takeaways
352(3)
Index 355
W. Curtis Preston, also known as "Mr. Backup," is the author of three O'Reilly books and the founder/webmaster of backupcentral.com, a site dedicated to backup & recovery for over 20 years. He is also the host of the independent Restore it All podcast. He is currently the Chief Technical Evangelist at Druva, Inc, a data protection as a service company.