It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 05575cam 2200613Ma 4500
001 ocn857077247
003 OCoLC
005 20201118210814.0
008 130724s2013 enk o 001 0 eng d
006 m o d
007 cr cn|||||||||
040 $aE7B$beng$epn$cE7B$dOCLCO$dOCLCF$dCOO$dOCLCQ$dAGLDB$dMOR$dPIFAG$dOCLCQ$dU3W$dSTF$dWRM$dNRAMU$dINT$dVT2$dOCLCQ$dG3B$dTKN$dOCLCQ$dHS0
019 $a961635482$a962648295
020 $a1849686319
020 $a9781849686310
020 $a1849686300
020 $a9781849686303
020 $z9781849686310
020 $z9781849686303
035 $a(OCoLC)857077247$z(OCoLC)961635482$z(OCoLC)962648295
050 4 $aQA76.754$b.B83 2013eb
082 04 $a005.376
100 1 $aBuchanan, Steve.
245 10 $aMicrosoft System Center Data Protection Manager 2012 SP1 :$blearn how to deploy, monitor, and administer System Center Data Protection Manager 2012 SP1 /$cSteve Buchanan [and others].
260 $aBirmingham :$bPackt Publishing,$c2013.
300 $a1 online resource (viii, 305 pages)
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
500 $aIncludes index.
505 0 $a""Cover""; ""Copyright""; ""Credits""; ""About the Authors""; ""About the Reviewers""; ""www.PacktPub.com""; ""Table of Contents""; ""Preface""; ""Chapter 1: What is Data Protection Manager?""; ""Planning for your DPM deployment""; ""Hardware requirements""; ""Minimum requirements""; ""Recommended requirements""; ""Limitations of DPM""; ""The Windows applications""; ""The Exchange server""; ""The SQL Server""; ""SharePoint""; ""Virtual platforms""; ""The Windows clients""; ""The system state""; ""The DPM disk pool""; ""The RAID levels for the disk pool""
505 8 $a""Software controllers versus hardware controllers""""The sector size""; ""The Custom volumes""; ""Deduplication""; ""Dependent services, local accounts, and groups""; ""Services""; ""DPM""; ""The DPM AccessManager service""; ""The DPM Agent Coordinator service""; ""The DPM CPWrapper service""; ""The DPM Writer service""; ""The DPMLA service""; ""The DPMRA service""; ""The local accounts and groups""; ""Volume Shadow Copy Services (VSS)""; ""The creation of a shadow copy""; ""Different creation of the shadow copy""; ""How does the DPM agent operate?""
505 8 $a""Distributed Component Object Model (DCOM)""""Direction of communication""; ""The Firewall settings for DPM""; ""Underlying technologies""; ""Change Journal""; ""The File System Filter""; ""DPM File filter""; ""A GUI walkthrough""; ""The Navigation bar""; ""Monitoring""; ""Protection""; ""Recovery""; ""Reporting""; ""Management""; ""Additional functions and roles within DPM""; ""End-user Restore Recovery (EUR)""; ""DPM Self-service Recovery Tool (SSRT)""; ""Single Instance Storage (SIS)""; ""PSDataSourceConfig.XML""; ""Troubleshooting backups""; ""The local Windows logs""
505 8 $a""Troubleshooting VSS""""The DPM agent logs""; ""The DPM server logs""; ""Upgrading scenarios""; ""Summary""; ""Chapter 2: Backup Strategies""; ""The definition of data""; ""Microsoft's approach""; ""Service License Agreements""; ""Recovery Point Objectives, Recovery Time Objectives, and Recovery Level Objectives""; ""Recovery Point Objectives (RPO)""; ""Recovery Time Objectives (RTO)""; ""Recovery Level Objectives (RLO)""; ""What data should we back up?""; ""Initial tasks""; ""Server technologies""; ""Windows workload protection group design""; ""Enterprise protection group design""
505 8 $a""The primary approach""""Non-Windows applications servers""; ""Generic data source protection""; ""Local services""; ""The Windows workloads""; ""The next step""; ""Protection group names""; ""Member of the protection group""; ""Verification of your backups""; ""Restore training""; ""The verification process""; ""Summary""; ""Chapter 3: DPM Server Management Tasks""; ""Automated installation of DPM""; ""Migrating a DPM server to a new hardware""; ""How to calculate storage for DPM""; ""Creating custom reports in DPM""; ""DPM Report Views""; ""Building a custom DPM report""
520 $aThis book is a Packt tutorial, walking the administrator through the steps needed to create real solutions to the problems and tasks faced when ensuring that their data is protected. This book is for network administrators, system administrators, backup administrators, or IT consultants who are looking to expand their knowledge on how to utilize DPM to protect their organization's data.
650 0 $aGroupware (Computer software)
650 0 $aComputer software.
650 7 $aComputer software.$2fast$0(OCoLC)fst00872527
650 7 $aGroupware (Computer software)$2fast$0(OCoLC)fst00948552
655 4 $aElectronic books.
700 1 $aHedblom, Robert.
700 1 $aGomaa, Islam.
700 1 $aRiis, Flemming.
856 40 $3ebrary$uhttp://site.ebrary.com/id/10732107
856 40 $3EBSCOhost$uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=606110
856 40 $3ProQuest Ebook Central$uhttp://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=1192650
856 40 $3ProQuest Ebook Central$uhttps://login.gbcprx01.georgebrown.ca/login?url=http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=1192650
938 $aebrary$bEBRY$nebr10732107
029 1 $aAU@$b000053308932
029 1 $aAU@$b000062539194
029 1 $aNZ1$b15589442
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 68 OTHER HOLDINGS