0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

The Busy IT Manager’s Guide to Data Recovery: Preston Deguise The Busy IT Manager’s Guide to Data Recovery
Preston Deguise
R721 Discovery Miles 7 210 Ships in 12 - 17 working days

No IT Manager or worker enjoys being woken in the middle of the night over a system fault. But arguably the worst way to be woken up in the middle of the night is over a situation where data loss has occurred -- and the recovery is going wrong. Busy IT Manager's Guide to Data Recovery takes a razor focus on details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the designing of robust data protection systems. This covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximizes the potential for a successful recovery. With cyber-attacks now a daily challenge for IT and business, the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud, this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs.

The Busy IT Manager’s Guide to Data Recovery: Preston Deguise The Busy IT Manager’s Guide to Data Recovery
Preston Deguise
R2,878 Discovery Miles 28 780 Ships in 12 - 17 working days

No IT Manager or worker enjoys being woken in the middle of the night over a system fault. But arguably the worst way to be woken up in the middle of the night is over a situation where data loss has occurred -- and the recovery is going wrong. Busy IT Manager's Guide to Data Recovery takes a razor focus on details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the designing of robust data protection systems. This covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximizes the potential for a successful recovery. With cyber-attacks now a daily challenge for IT and business, the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud, this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs.

Data Protection - Ensuring Data Availability (Hardcover, 2nd edition): Preston Deguise Data Protection - Ensuring Data Availability (Hardcover, 2nd edition)
Preston Deguise
R3,494 Discovery Miles 34 940 Ships in 12 - 17 working days

The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. There are three essential activities that refer to themselves as data protection; while they all overlap in terms of scope and function, each operates as a reasonably self-contained field with its own specialists and domain nomenclature. These three activities are: * Data protection as a storage and recovery activity * Data protection as a security activity * Data protection as a privacy activity These activities are covered in detail, with a focus on how organizations can use them to leverage their IT investments and optimize costs. The book also explains how data protection is becoming an enabler for new processes around data movement and data processing. This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized datacenter and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business. About the Author Preston de Guise has been working with data recovery products for his entire career-designing, implementing, and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too.

Data Protection - Ensuring Data Availability (Paperback, 2nd edition): Preston Deguise Data Protection - Ensuring Data Availability (Paperback, 2nd edition)
Preston Deguise
R1,801 Discovery Miles 18 010 Ships in 12 - 17 working days

The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. There are three essential activities that refer to themselves as data protection; while they all overlap in terms of scope and function, each operates as a reasonably self-contained field with its own specialists and domain nomenclature. These three activities are: * Data protection as a storage and recovery activity * Data protection as a security activity * Data protection as a privacy activity These activities are covered in detail, with a focus on how organizations can use them to leverage their IT investments and optimize costs. The book also explains how data protection is becoming an enabler for new processes around data movement and data processing. This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized datacenter and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business. About the Author Preston de Guise has been working with data recovery products for his entire career-designing, implementing, and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too.

Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover): Preston Deguise Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover)
Preston Deguise
R4,602 Discovery Miles 46 020 Ships in 12 - 17 working days

The success of information backup systems does not rest on IT administrators alone. Rather, a well-designed backup system comes about only when several key factors coalesce business involvement, IT acceptance, best practice designs, enterprise software, and reliable hardware. Enterprise Systems Backup and Recovery: A Corporate Insurance Policy provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Instead of focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information to any organization, regardless of which operating systems or applications are deployed, what backup system is in place, or what planning has been done for business continuity. It explains how backup must be included in every phase of system planning, development, operation, and maintenance. It also provides techniques for analyzing and improving current backup system performance. After reviewing the concepts in this book, organizations will be able to answer these questions with respect to their enterprise: What features and functionality should be expected in a backup environment? What terminology and concepts are unique to backup software, and what can be related to other areas? How can a backup system be monitored successfully? How can the performance of a backup system be improved? What features are just "window dressing" and should be ignored, as opposed to those features that are relevant? Backup and recovery systems touch on just about every system in an organization. Properly implemented, they can provide an enterprise with greater assurance that its information is safe. By utilizing the

Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Paperback, New): Preston Deguise Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Paperback, New)
Preston Deguise
R2,345 Discovery Miles 23 450 Ships in 12 - 17 working days

The success of information backup systems does not rest on IT administrators alone. Rather, a well-designed backup system comes about only when several key factors coalesce-business involvement, IT acceptance, best practice designs, enterprise software, and reliable hardware. Enterprise Systems Backup and Recovery: A Corporate Insurance Policy provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Instead of focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information to any organization, regardless of which operating systems or applications are deployed, what backup system is in place, or what planning has been done for business continuity. It explains how backup must be included in every phase of system planning, development, operation, and maintenance. It also provides techniques for analyzing and improving current backup system performance. After reviewing the concepts in this book, organizations will be able to answer these questions with respect to their enterprise: What features and functionality should be expected in a backup environment? What terminology and concepts are unique to backup software, and what can be related to other areas? How can a backup system be monitored successfully? How can the performance of a backup system be improved? What features are just "window dressing" and should be ignored, as opposed to those features that are relevant? Backup and recovery systems touch on just about every system in an organization. Properly implemented, they can provide an enterprise with greater assurance that its information is safe. By utilizing the information in this book, organizations can take a greater step toward improving the security of their data and preventing the devastating loss of data and business revenue that can occur with poorly constructed or inefficient systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Percy Jackson And The Olympians - 5-Book…
Rick Riordan Paperback R622 Discovery Miles 6 220
Imploding The Mirage
The Killers CD R437 Discovery Miles 4 370
Moon Bag (Black)
R57 Discovery Miles 570
Elecstor 18W In-Line UPS (Black)
R999 R404 Discovery Miles 4 040
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Bestway Inflatable Donut Ring
R120 R105 Discovery Miles 1 050
Cable Guys Controller and Smartphone…
R399 R359 Discovery Miles 3 590
Beast
Idris Elba, Sharlto Copley DVD R103 Discovery Miles 1 030
Everyday Fresh - Meals In Minutes
Donna Hay Paperback R450 R341 Discovery Miles 3 410
Efekto 77300-P Nitrile Gloves (L)(Pink)
R63 Discovery Miles 630

 

Partners