IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience

This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Morris, Neil (VerfasserIn), Doney, Stephen (VerfasserIn), Whyte, Barry (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: [Place of publication not identified] IBM Redbooks 2024
Ausgabe:[First edition].
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000002 4500
001 ZDB-30-ORH-100860400
003 DE-627-1
005 20240227122214.0
007 cr uuu---uuuuu
008 240227s2024 xx |||||o 00| ||eng c
020 |a 9780738461489  |c electronic bk.  |9 978-0-7384-6148-9 
020 |a 0738461482  |c electronic bk.  |9 0-7384-6148-2 
035 |a (DE-627-1)100860400 
035 |a (DE-599)KEP100860400 
035 |a (ORHE)9780738461489 
035 |a (DE-627-1)100860400 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23/eng/20240213 
100 1 |a Morris, Neil  |e VerfasserIn  |4 aut 
245 1 0 |a IBM and CMTG cyber resiliency  |b building an automated, VMware Aware safeguarded copy solution to provide data resilience  |c Neil Morris, Stephen Doney, Barry Whyte 
250 |a [First edition]. 
264 1 |a [Place of publication not identified]  |b IBM Redbooks  |c 2024 
300 |a 1 online resource (22 pages)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage Copy Data Management. The target audience for this Blueprint is IBM Storage technical specialists and storage admins. 
650 0 |a Cyber intelligence (Computer security) 
650 0 |a Computer networks  |x Security measures 
650 0 |a Internet  |x Security measures 
700 1 |a Doney, Stephen  |e VerfasserIn  |4 aut 
700 1 |a Whyte, Barry  |e VerfasserIn  |4 aut 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9780738461489/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-100860400
_version_ 1818767372424577024
adam_text
any_adam_object
author Morris, Neil
Doney, Stephen
Whyte, Barry
author_facet Morris, Neil
Doney, Stephen
Whyte, Barry
author_role aut
aut
aut
author_sort Morris, Neil
author_variant n m nm
s d sd
b w bw
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)100860400
(DE-599)KEP100860400
(ORHE)9780738461489
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition [First edition].
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01906nam a22003972 4500</leader><controlfield tag="001">ZDB-30-ORH-100860400</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240227122214.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240227s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738461489</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-7384-6148-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738461482</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-7384-6148-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100860400</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100860400</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738461489</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100860400</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240213</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Morris, Neil</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IBM and CMTG cyber resiliency</subfield><subfield code="b">building an automated, VMware Aware safeguarded copy solution to provide data resilience</subfield><subfield code="c">Neil Morris, Stephen Doney, Barry Whyte</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (22 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage Copy Data Management. The target audience for this Blueprint is IBM Storage technical specialists and storage admins.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Doney, Stephen</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Whyte, Barry</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738461489/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-100860400
illustrated Illustrated
indexdate 2024-12-18T08:48:50Z
institution BVB
isbn 9780738461489
0738461482
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (22 pages) illustrations
psigel ZDB-30-ORH
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher IBM Redbooks
record_format marc
spelling Morris, Neil VerfasserIn aut
IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Neil Morris, Stephen Doney, Barry Whyte
[First edition].
[Place of publication not identified] IBM Redbooks 2024
1 online resource (22 pages) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage Copy Data Management. The target audience for this Blueprint is IBM Storage technical specialists and storage admins.
Cyber intelligence (Computer security)
Computer networks Security measures
Internet Security measures
Doney, Stephen VerfasserIn aut
Whyte, Barry VerfasserIn aut
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9780738461489/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Morris, Neil
Doney, Stephen
Whyte, Barry
IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience
Cyber intelligence (Computer security)
Computer networks Security measures
Internet Security measures
title IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience
title_auth IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience
title_exact_search IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience
title_full IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Neil Morris, Stephen Doney, Barry Whyte
title_fullStr IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Neil Morris, Stephen Doney, Barry Whyte
title_full_unstemmed IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Neil Morris, Stephen Doney, Barry Whyte
title_short IBM and CMTG cyber resiliency
title_sort ibm and cmtg cyber resiliency building an automated vmware aware safeguarded copy solution to provide data resilience
title_sub building an automated, VMware Aware safeguarded copy solution to provide data resilience
topic Cyber intelligence (Computer security)
Computer networks Security measures
Internet Security measures
topic_facet Cyber intelligence (Computer security)
Computer networks Security measures
Internet Security measures
url https://learning.oreilly.com/library/view/-/9780738461489/?ar
work_keys_str_mv AT morrisneil ibmandcmtgcyberresiliencybuildinganautomatedvmwareawaresafeguardedcopysolutiontoprovidedataresilience
AT doneystephen ibmandcmtgcyberresiliencybuildinganautomatedvmwareawaresafeguardedcopysolutiontoprovidedataresilience
AT whytebarry ibmandcmtgcyberresiliencybuildinganautomatedvmwareawaresafeguardedcopysolutiontoprovidedataresilience