|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBSCO_ocn852756681 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130713s2013 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d N$T
|d DEBSZ
|d OCLCQ
|d OCLCF
|d YDXCP
|d OCLCQ
|d AGLDB
|d ICA
|d ZCU
|d MERUC
|d D6H
|d OCLCQ
|d VTS
|d ICG
|d OCLCQ
|d OCLCO
|d STF
|d DKC
|d OCLCQ
|d AJS
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1264773218
|
020 |
|
|
|a 9781849686310
|q (electronic bk.)
|
020 |
|
|
|a 1849686319
|q (electronic bk.)
|
029 |
1 |
|
|a CHNEW
|b 001051651
|
029 |
1 |
|
|a CHVBK
|b 567704718
|
029 |
1 |
|
|a DEBBG
|b BV044189206
|
029 |
1 |
|
|a DEBSZ
|b 397546602
|
029 |
1 |
|
|a DEBSZ
|b 493123830
|
035 |
|
|
|a (OCoLC)852756681
|z (OCoLC)1264773218
|
050 |
|
4 |
|a QA76.9.D348
|
072 |
|
7 |
|a COM
|x 066000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.376
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Buchannan, Steve.
|
245 |
1 |
0 |
|a Microsoft System Center Data Protection Manager 2012.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing,
|c 2013.
|
300 |
|
|
|a 1 online resource (328 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: What is Data Protection Manager?; Planning for your DPM deployment; Hardware requirements; Minimum requirements; Recommended requirements; Limitations of DPM; The Windows applications; The Exchange server; The SQL Server; SharePoint; Virtual platforms; The Windows clients; The system state; The DPM disk pool; The RAID levels for the disk pool; Software controllers versus hardware controllers; The sector size; The Custom volumes; Deduplication.
|
505 |
8 |
|
|a Dependent services, local accounts, and groupsServices; DPM; The DPM AccessManager service; The DPM Agent Coordinator service; The DPM CPWrapper service; The DPM Writer service; The DPMLA service; The DPMRA service; The local accounts and groups; Volume Shadow Copy Services (VSS); The creation of a shadow copy; Different creation of the shadow copy; How does the DPM agent operate?; Distributed Component Object Model (DCOM); Direction of communication; The Firewall settings for DPM; Underlying technologies; Change Journal; The File System Filter; DPM File filter; A GUI walkthrough.
|
505 |
8 |
|
|a The Navigation barMonitoring; Protection; Recovery; Reporting; Management; Additional functions and roles within DPM; End-user Restore Recovery (EUR); DPM Self-service Recovery Tool (SSRT); Single Instance Storage (SIS); PSDataSourceConfig. XML; Troubleshooting backups; The local Windows logs; Troubleshooting VSS; The DPM agent logs; The DPM server logs; Upgrading scenarios; Summary; Chapter 2: Backup Strategies; The definition of data; Microsoft's approach; Service License Agreements; Recovery Point Objectives, Recovery Time Objectives, and Recovery Level Objectives.
|
505 |
8 |
|
|a Recovery Point Objectives (RPO)Recovery Time Objectives (RTO); Recovery Level Objectives (RLO); What data should we back up?; Initial tasks; Server technologies; Windows workload protection group design; Enterprise protection group design; The primary approach; Non-Windows applications servers; Generic data source protection; Local services; The Windows workloads; The next step; Protection group names; Member of the protection group; Verification of your backups; Restore training; The verification process; Summary; Chapter 3: DPM Server Management Tasks; Automated installation of DPM.
|
505 |
8 |
|
|a Migrating a DPM server to a new hardwareHow to calculate storage for DPM; Creating custom reports in DPM; DPM Report Views; Building a custom DPM report; Create custom DPM reports using Prism for DPM; Changing the SQL Server instance used by DPM; Moving the DPM server to a new domain or renaming a DPM server; Adding disks to the storage pool; Removing a disk from the storage pool; Replacing a disk in the storage pool; DPM network bandwidth and control traffic; Enabling the network-bandwidth-usage throttling; Enabling the network-bandwidth-usage throttling for multiple DPM agents at once.
|
500 |
|
|
|a Working with DPM SQL self-service.
|
520 |
|
|
|a This book is a Packt tutorial, walking the administrator through the steps needed to create real solutions to the problems and tasks faced when ensuring that their data is protected. This book is for network administrators, system administrators, backup administrators, or IT consultants who are looking to expand their knowledge on how to utilize DPM to protect their organization's data.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a Data protection manager.
|
630 |
0 |
0 |
|a Microsoft Windows server.
|
630 |
0 |
7 |
|a Data protection manager
|2 fast
|
630 |
0 |
7 |
|a Microsoft Windows server
|2 fast
|
650 |
|
0 |
|a Data recovery (Computer science)
|
650 |
|
6 |
|a Récupération des données (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Enterprise Applications
|x Collaboration Software.
|2 bisacsh
|
650 |
|
7 |
|a Data recovery (Computer science)
|2 fast
|
700 |
1 |
|
|a Hedblom, Robert.
|
700 |
1 |
|
|a Gomaa, Islam.
|
776 |
0 |
8 |
|i Print version:
|a Buchannan, Steve.
|t Microsoft System Center Data Protection Manager 2012.
|d Birmingham : Packt Publishing, ©2013
|z 9781849686303
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=606110
|z Texto completo
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 606110
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10845669
|
994 |
|
|
|a 92
|b IZTAP
|