Używamy cookies, aby ułatwić korzystanie z Portalu. Możesz określić warunki przechowywania, dostępu do plików cookies w Twojej przeglądarce. Dowiedz się więcej.
strona główna Strona główna | Nowości | Promocje | Zapowiedzi Twoje konto | Zarejestruj | Schowek | Kontakt | Pomoc
mapa działów
Szukaj: szukanie zaawansowane
Koszyk
Książki \ Bezpieczeństwo

Backup & Recovery Język: 2

9780596102463

Cena Brutto: 190.37

Cena netto: 181.30

Ilość:
Wersja: Drukowana
Autor W. Curtis Preston
Liczba_stron 768
Wydawnictwo OReilly Media
Data_Wydania 2007-01-03
Poziom All Levels

Informacje podstawowe:

  • Wydawnictwo: O'Reilly Media
  • Data wydania: 3 stycznia 2007
  • Liczba stron: 768
  • Autor/autorzy:
    • W. Curtis Preston

Opis:

Packed with practical, freely available backup and recovery solutions for Unix, Linux, Windows, and Mac OS X systems - as well as various databases - this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75% new material.

Backup & Recovery starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA, Bacula, BackupPC, rdiff-backup, and rsnapshot. Backup & Recovery then explains how to perform bare metal recovery of AIX, HP-UX, Linux, Mac OS, Solaris, VMWare, & Windows systems using freely-available utilities. The book also provides overviews of the current state of the commercial backup software and hardware market, including overviews of CDP, Data De-duplication, D2D2T, and VTL technology. Finally, it covers how to automate the backups of DB2, Exchange, MySQL, Oracle, PostgreSQL, SQL-Server, and Sybase databases - without purchasing a commercial backup product to do so.

For environments of all sizes and budgets, this unique book shows you how to ensure data protection without resorting to expensive commercial solutions. You will soon learn to:

  • Automate the backup of popular databases without a commercial utility
  • Perform bare metal recovery of any popular open systems platform, including your PC or laptop
  • Utilize valuable but often unknown open source backup products
  • Understand the state of commercial backup software, including explanations of CDP and data de-duplication software
  • Access the current state of backup hardware, including Virtual Tape Libraries (VTLs)

O autorze/autorach:

W. Curtis Preston

W. Curtis Preston has specialized in designing data protection systems since 1993, and has designed such systems for many environments, both large and small. His lively prose and wry, real-world approach has made him a popular author and speaker.

View W. Curtis Preston's full profile page.

Zawartość (spis treści):

  1. Introduction

    1. Chapter 1 The Philosophy of Backup
      1. Champagne Backup on a Beer Budget
      2. Why Should I Read This Book?
      3. Why Back Up?
      4. Wax On, Wax Off: Finding a Balance
    2. Chapter 2 Backing It All Up
      1. Don’t Skip This Chapter!
      2. Deciding Why You Are Backing Up
      3. Deciding What to Back Up
      4. Deciding When to Back Up
      5. Deciding How to Back Up
      6. Storing Your Backups
      7. Testing Your Backups
      8. Monitoring Your Backups
      9. Following Proper Development Procedures
      10. Unrelated Miscellanea
      11. Good Luck
  2. Open-Source Backup Utilities

    1. Chapter 3 Basic Backup and Recovery Utilities
      1. An Overview
      2. Backing Up and Restoring with ntbackup
      3. Using System Restore in Windows
      4. Backing Up with the dump Utility
      5. Restoring with the restore Utility
      6. Limitations of dump and restore
      7. Features to Check For
      8. Backing Up and Restoring with the cpio Utility
      9. Backing Up and Restoring with the tar Utility
      10. Backing Up and Restoring with the dd Utility
      11. Using rsync
      12. Backing Up and Restoring with the ditto Utility
      13. Comparing tar, cpio, and dump
      14. Using ssh or rsh as a Conduit Between Systems
    2. Chapter 4 Amanda
      1. Summary of Important Features
      2. Configuring Amanda
      3. Backing Up Clients via NFS or Samba
      4. Amanda Recovery
      5. Community and Support Options
      6. Future Plans
    3. Chapter 5 BackupPC
      1. BackupPC Features
      2. How BackupPC Works
      3. Installation How-To
      4. Starting BackupPC
      5. Per-Client Configuration
      6. The BackupPC Community
      7. The Future of BackupPC
    4. Chapter 6 Bacula
      1. Bacula Architecture
      2. Bacula Features
      3. An Example Configuration
      4. Advanced Features
      5. Future Directions
    5. Chapter 7 Open-Source Near-CDP
      1. rsync with Snapshots
      2. rsnapshot
      3. rdiff-backup
  3. Commercial Backup

    1. Chapter 8 Commercial Backup Utilities
      1. What to Look For
      2. Full Support of Your Platforms
      3. Backup of Raw Partitions
      4. Backup of Very Large Filesystems and Files
      5. Aggressive Requirements
      6. Simultaneous Backup of Many Clients to One Drive
      7. Disk-to-Disk-to-Tape Backup
      8. Simultaneous Backup of One Client to Many Drives
      9. Data Requiring Special Treatment
      10. Storage Management Features
      11. Reduction in Network Traffic
      12. Support of a Standard or Custom Backup Format
      13. Ease of Administration
      14. Security
      15. Ease of Recovery
      16. Protection of the Backup Index
      17. Robustness
      18. Automation
      19. Volume Verification
      20. Cost
      21. Vendor
      22. Final Thoughts
    2. Chapter 9 Backup Hardware
      1. Decision Factors
      2. Using Backup Hardware
      3. Tape Drives
      4. Optical Drives
      5. Automated Backup Hardware
      6. Disk Targets
  4. Bare-Metal Recovery

    1. Chapter 10 Solaris Bare-Metal Recovery
      1. Using Flash Archive
      2. Preparing for an Interactive Restore
      3. Setup of a Noninteractive Restore
      4. Final Thoughts
    2. Chapter 11 Linux and Windows
      1. How It Works
      2. The Steps in Theory
      3. Assumptions
      4. Alt-Boot Full Image Method
      5. Alt-Boot Partition Image Method
      6. Live Method
      7. Alt-Boot Filesystem Method
      8. Automate Bare-Metal Recovery with G4L
      9. Commercial Solutions
    3. Chapter 12 HP-UX Bare-Metal Recovery
      1. System Recovery with Ignite-UX
      2. Planning for Ignite-UX Archive Storage and Recovery
      3. Implementation Example
      4. System Cloning
      5. Security
      6. System Recovery and Disk Mirroring
    4. Chapter 13 AIX Bare-Metal Recovery
      1. IBM’s mksysb and savevg Utilities
      2. Backing Up with mksysb
      3. Setting Up NIM
      4. savevg Operations
      5. Verifying a mksysb or savevg Backup
      6. Restoring an AIX System with mksysb
      7. System Cloning
    5. Chapter 14 Mac OS X Bare-Metal Recovery
      1. How It Works
      2. A Sample Bare-Metal Recovery
  5. Database Backup

    1. Chapter 15 Backing Up Databases
      1. Can It Be Done?
      2. Confusion: The Mysteries of Database Architecture
      3. The Muck Stops Here: Databases in Plain English
      4. What’s the Big Deal?
      5. Database Structure
      6. An Overview of a Page Change
      7. ACID Compliance
      8. What Can Happen to an RDBMS?
      9. Backing Up an RDBMS
      10. Restoring an RDBMS
      11. Documentation and Testing
      12. Unique Database Requirements
    2. Chapter 16 Oracle Backup and Recovery
      1. Two Backup Methods
      2. Oracle Architecture
      3. Physical Backups Without rman
      4. Physical Backups with rman
      5. Flashback
      6. Managing the Archived Redo Logs
      7. Recovering Oracle
      8. Logical Backups
      9. A Broken Record
    3. Chapter 17 Sybase Backup and Recovery
      1. Sybase Architecture
      2. The Power User’s View
      3. The DBA’s View
      4. Protecting Your Database
      5. Backup Automation Through Scripting
      6. Physical Backups with a Storage Manager
      7. Recovering Your Database
      8. Common Sybase Procedures
      9. Sybase Recovery Procedure
    4. Chapter 18 IBM DB2 Backup and Recovery
      1. DB2 Architecture
      2. The backup, restore, rollforward, and recover Commands
      3. Recovering Your Database
    5. Chapter 19 SQL Server
      1. Overview of SQL Server
      2. The Power User’s View
      3. The DBA’s View
      4. Backups
      5. Logical (Table-Level) Backups
      6. Restore and Recovery
    6. Chapter 20 Exchange
      1. Exchange Architecture
      2. Storage Groups
      3. Backup
      4. Using ntbackup to Back Up
      5. Restore
      6. Exchange Restore
    7. Chapter 21 PostgreSQL
      1. PostgreSQL Architecture
      2. Backup and Recovery
      3. Point-in-Time Recovery
    8. Chapter 22 MySQL
      1. MySQL Architecture
      2. MySQL Backup and Recovery Methodologies
  6. Potpourri

    1. Chapter 23 VMware and Miscellanea
      1. Backing Up VMware Servers
      2. Volatile Filesystems
      3. Demystifying dump
      4. How Do I Read This Volume?
      5. Gigabit Ethernet
      6. Disk Recovery Companies
      7. Yesterday
      8. Trust Me About the Backups
    2. Chapter 24 It’s All About Data Protection
      1. Business Reasons for Data Protection
      2. Technical Reasons for Data Protection
      3. Backup and Archive
      4. What Needs to Be Backed Up?
      5. What Needs to Be Archived?
      6. Examples of Backup and Archive
      7. Can Open-Source Backup Do the Job?
      8. Disaster Recovery
      9. Everything Starts with the Business
      10. Storage Security
      11. Conclusion
  1. Colophon

powrót
 
Produkty Podobne
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
Niewidzialny w Sieci. Sztuka zacierania śladów
Computer Security: Principles and Practice, 4th Edition
Testy penetracyjne nowoczesnych serwisów. Kompendium inżynierów bezpieczeństwa
Bezpieczeństwo urządzeń mobilnych. Receptury
Ocena bezpieczeństwa sieci, wydanie 3
Network Security Assessment, 3rd Edition
Ransomware. Defending Against Digital Extortion
Sztuka podstępu. Łamałem ludzi, nie hasła. Wydanie II
Network Security Technologies and Solutions (CCIE Professional Development Series)
Więcej produktów