MARC details
000 -LEADER |
fixed length control field |
02093cam a22003018i 4500 |
001 - CONTROL NUMBER |
control field |
21406046 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240711160313.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
200128s2020 flu 000 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2019057515 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367256777 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367474102 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781003028345 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.D425 2020 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 DEG/Dat |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
De Guise, Preston, |
Relator term |
author. |
9 (RLIN) |
5527 |
245 10 - TITLE STATEMENT |
Title |
Data protection : |
Remainder of title |
ensuring data availability / |
Statement of responsibility, etc |
by Preston De Guise. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
New delhi: |
Name of publisher, distributor, etc |
CRC PRESS, |
Date of publication, distribution, etc |
2020. |
263 ## - PROJECTED PUBLICATION DATE |
Projected publication date |
2007 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
400p.;pages cm |
Dimensions |
28*21 cm. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"This book arms readers with information for making decisions on how to protect data from loss in the cloud, on-site, or both. It explains the changing face of data recovery and techniques for dealing with big data. The second edition has new chapters on ethical and legal issues, convergent data protection, architecture, smart data protection, and protection at the edge. It also includes expanded chapters on data protection in the cloud and protecting infrastructure. Key Features: Protect data and systems from ransomware and other cyberthreats Become compliant with legal requirements for protecting data Protect data in the cloud, on-premises, or in mixed environments Tackle deduplication to ensure data integrity Author Bio: Preston de Guise has been working with data recovery products for his entire career - designing, implementing and supporting solutions for governments, universities, and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery, but the management and procedural aspects too"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
5525 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data protection. |
9 (RLIN) |
5528 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
955 ## - COPY-LEVEL INFORMATION (RLIN) |
Book number/undivided call number, CCAL (RLIN) |
rk14 2020-01-28 |
Copy information and material description, CCAL + MDES (RLIN) |
rk14 2020-01-28 telework to subj |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) |
Koha normalized classification for sorting |
005_800000000000000_DEG_DAT |
Koha itemnumber |
192039 |