|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocm54670475 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
040310s2003 maua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d YDXCP
|d OCLCQ
|d B24X7
|d TNF
|d OCLCQ
|d OCLCF
|d NLGGC
|d OCLCO
|d MERUC
|d CCO
|d E7B
|d NTG
|d BMU
|d REDDC
|d DKDLA
|d EBLCP
|d DEBSZ
|d FVL
|d OCLCQ
|d AZK
|d COCUF
|d AGLDB
|d CNNOR
|d MOR
|d PIFBR
|d ZCU
|d LIV
|d OCLCQ
|d WY@
|d U3W
|d OCLCA
|d LUE
|d STF
|d JBG
|d BRL
|d WRM
|d VTS
|d ICG
|d INT
|d TOF
|d NRAMU
|d MOQ
|d VT2
|d OCLCQ
|d AU@
|d COO
|d A6Q
|d OCLCQ
|d G3B
|d DKC
|d OCLCQ
|d UKAHL
|d OCLCQ
|d K6U
|d RDF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 63166181
|a 70721113
|a 475190244
|a 488482860
|a 559856318
|a 646733040
|a 722362107
|a 728027807
|a 961673247
|a 962601365
|a 988433831
|a 992097476
|a 992106203
|a 1037463476
|a 1037791822
|a 1038595598
|a 1045525209
|a 1058138949
|a 1076287063
|a 1081202233
|a 1148131261
|a 1228560426
|
020 |
|
|
|a 1580535593
|q (electronic bk.)
|
020 |
|
|
|a 9781580535595
|q (electronic bk.)
|
020 |
|
|
|a 9781580535168
|q (alk. paper)
|
020 |
|
|
|a 158053516X
|q (alk. paper)
|
029 |
1 |
|
|a AU@
|b 000051395579
|
029 |
1 |
|
|a AU@
|b 000062547217
|
029 |
1 |
|
|a DEBBG
|b BV043127477
|
029 |
1 |
|
|a DEBBG
|b BV044080332
|
029 |
1 |
|
|a DEBSZ
|b 396064086
|
029 |
1 |
|
|a DEBSZ
|b 42240392X
|
029 |
1 |
|
|a GBVCP
|b 801120217
|
029 |
1 |
|
|a NZ1
|b 12021777
|
035 |
|
|
|a (OCoLC)54670475
|z (OCoLC)63166181
|z (OCoLC)70721113
|z (OCoLC)475190244
|z (OCoLC)488482860
|z (OCoLC)559856318
|z (OCoLC)646733040
|z (OCoLC)722362107
|z (OCoLC)728027807
|z (OCoLC)961673247
|z (OCoLC)962601365
|z (OCoLC)988433831
|z (OCoLC)992097476
|z (OCoLC)992106203
|z (OCoLC)1037463476
|z (OCoLC)1037791822
|z (OCoLC)1038595598
|z (OCoLC)1045525209
|z (OCoLC)1058138949
|z (OCoLC)1076287063
|z (OCoLC)1081202233
|z (OCoLC)1148131261
|z (OCoLC)1228560426
|
050 |
|
4 |
|a TK5105.5
|b .L562 2003eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Liotine, Matthew.
|
245 |
1 |
0 |
|a Mission-critical network planning /
|c Matthew Liotine.
|
260 |
|
|
|a Boston :
|b Artech House,
|c ©2003.
|
300 |
|
|
|a 1 online resource (xviii, 414 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a Artech House telecommunications library
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
520 |
3 |
|
|a Whether a terrorist attack, fiber cut, security breach, natural disaster or traffic overload, today's networks must be designed to withstand adverse conditions and provide continuous service. This comprehensive, leading-edge book reveals the techniques and strategies to help you keep enterprise data and voice networks in service under critical circumstances. You learn numerous ways to minimize single points of failure through redundancy and backups, and discover how to select the right networking technologies to improve survivability and performance.
|c Publisher abstract.
|
505 |
0 |
|
|a Forword; Preface; 1. Introduction; 1.1 What is Mission Critical?; 1.2 Purpose of the book; 1.3 Network Continuity Versus Disaster Recovery; 1.4 The Case for Mission-Critical Planning; 1.5 Trends Affecting Continuity Planning; 1.6 Mission Goals and Objectives; 1.7 Originization of the Book; 2. Principals of Continuity; 2.1 Fault Mechanics; 2.2 Principles of Redundancy; 2.3 Principles of Tolerance; 2.4 Principles of Design; 2.5 Summary and Conclusions; 3. Continuity Metrics; 3.1 Recovery Metrics; 3.2 Reliability Metrics; 3.3 Availability Metrics; 3.4 Exposure Metrics
|
505 |
8 |
|
|a 3.5 Risk/Loss Metrics3.6 Cost Metrics; 3.7 Capacity Metrics; 3.8 Performance Metrics; 3.9 Summary and Conclusions; 4. Network Topology and Protocol Considerations for Continuity; 4.1 Network Topology; 4.2 Network Protocol Considerations; 4.3 Summary and Conclusions; 5. Networking Technologies for Continuity; 5.1 Local Area Networks; 5.2 Wide Area Networks; 5.3 Metropolitan Area Networks; 5.4 Summary and Conclusions; 6. Processing, Load Control, and Internetworking for Continuity; 6.1 Clusters; 6.2 Load Balancing; 6.3 Internet working; 6.4 Caching; 6.5 Summary and Conclusions
|
505 |
8 |
|
|a 7. Networking Access Continuity7.1 Voice Network Access; 7.2 Data Network Access; 7.3 Wireless Access; 7.4 Summary and Conclusions; 8. Mission-Critical Platforms; 8.1 Critical Platform Characteristics; 8.2 Platform Tolerance; 8.3 Server Platforms; 8.4 Network Platforms; 8.5 Platform Managements; 8.6 Power Management; 8.7 Summary and Conclusions; 9. Software Application Continuity; 9.1 Classifying Applications; 9.2 Application Development; 9.3 Application Architecture; 9.4 Application Deployment; 9.5 Application Performance Management; 9.6 Application Recovery
|
505 |
8 |
|
|a 9.7 Application/Platform Interaction9.8 Application Performance Checklist; 9.9 Summary and Conclusions; 10. Storage Continuity; 10.1 Mission-Critical Storage Requirements; 10.2 Data Replication; 10.3 Replication Strategies; 10.4 Backup Strategies; 10.5 Storage Systems; 10.6 Storage Sites and Services; 10.7 Networked Storage; 10.8 Storage Operations and Management; 10.9 Summary and Conclusions; 11. Continuity Facilities; 11.1 Enterprise Layout; 11.2 Cable Plant; 11.3 Power Plant; 11.4 Environmental Strategies; 11.5 Summary and Conclusions; 12. Network Management for Continuity
|
505 |
8 |
|
|a 12.1 Migrating Network Management to the Enterprise12.2 Topology Discovery; 12.3 Network Monitoring; 12.4 Problem Resolution; 12.5 Restoration Management; 12.6 Carrier/Supplier Management; 12.7 Traffic Management; 12.8 Service-Level Management; 12.9 QoS; 12.10 Policy-Based Network Management; 12.11 Service-Level Agreements; 12.12 Change Management; 12.13 Summary and Conclusions; 13. Using Recovery Sites; 13.1 Types of Sites; 13.2 Site Services; 13.3 Implementing and Managing Recovery Sites; 13.4 Summary and Conclusions; 14. Continuity Testing; 14.1 Requirements and Testing; 14.2 Test Planning
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer networks
|x Planning.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Planification.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Planning.
|2 fast
|0 (OCoLC)fst00872331
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|a Liotine, Matthew.
|t Mission-critical network planning.
|d Boston : Artech House, ©2003
|z 158053516X
|w (DLC) 2003060108
|w (OCoLC)52694850
|
830 |
|
0 |
|a Artech House telecommunications library.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=98864
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH20050016
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00003475
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL227652
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10081910
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 98864
|
938 |
|
|
|a IEEE
|b IEEE
|n 9100014
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2358635
|
994 |
|
|
|a 92
|b IZTAP
|