|
|
|
|
LEADER |
00000cam a22000007 4500 |
001 |
OR_on1152995563 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
200413s2019 xx o 000 0 und d |
040 |
|
|
|a VT2
|b eng
|c VT2
|d ERF
|d DST
|d OCLCQ
|
019 |
|
|
|a 1300694429
|a 1303371578
|
020 |
|
|
|a 9780738457246
|
020 |
|
|
|a 0738457248
|
035 |
|
|
|a (OCoLC)1152995563
|z (OCoLC)1300694429
|z (OCoLC)1303371578
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a IBM DS8000 SafeGuarded Copy /
|c Nick Clayton [and others].
|
260 |
|
|
|a [Place of publication not identified]
|b IBM Redbooks,
|c 2019.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
500 |
|
|
|a Title from content provider.
|
520 |
|
|
|a This IBM® Redpaper"!publication explains the IBM DS8000 Safeguarded Copy functionality. With Safeguarded Copy, organizations have the ability to improve their cyber resiliency by frequently creating protected point-in-time backups of their critical data, with minimum impact and effective resource utilization. The paper introduces Safeguarded Copy and discusses the need for logical corruption protection (LCP) and information about regulatory requirements. It presents the general concepts of LCP, and then explore various use cases for recovery. The paper is intended for IT security architects, who plan and design an organization's cyber security strategy, as well as the infrastructure technical specialists who implement them
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
700 |
1 |
|
|a Clayton, Nick.
|
776 |
0 |
|
|z 0738457248
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780738457246/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|