IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience
This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified]
IBM Redbooks
2024
|
Ausgabe: | [First edition]. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-100860400 | ||
003 | DE-627-1 | ||
005 | 20240227122214.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240227s2024 xx |||||o 00| ||eng c | ||
020 | |a 9780738461489 |c electronic bk. |9 978-0-7384-6148-9 | ||
020 | |a 0738461482 |c electronic bk. |9 0-7384-6148-2 | ||
035 | |a (DE-627-1)100860400 | ||
035 | |a (DE-599)KEP100860400 | ||
035 | |a (ORHE)9780738461489 | ||
035 | |a (DE-627-1)100860400 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240213 | |
100 | 1 | |a Morris, Neil |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a IBM and CMTG cyber resiliency |b building an automated, VMware Aware safeguarded copy solution to provide data resilience |c Neil Morris, Stephen Doney, Barry Whyte |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b IBM Redbooks |c 2024 | |
300 | |a 1 online resource (22 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage Copy Data Management. The target audience for this Blueprint is IBM Storage technical specialists and storage admins. | ||
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Internet |x Security measures | |
700 | 1 | |a Doney, Stephen |e VerfasserIn |4 aut | |
700 | 1 | |a Whyte, Barry |e VerfasserIn |4 aut | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738461489/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-100860400 |
---|---|
_version_ | 1818767372424577024 |
adam_text | |
any_adam_object | |
author | Morris, Neil Doney, Stephen Whyte, Barry |
author_facet | Morris, Neil Doney, Stephen Whyte, Barry |
author_role | aut aut aut |
author_sort | Morris, Neil |
author_variant | n m nm s d sd b w bw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)100860400 (DE-599)KEP100860400 (ORHE)9780738461489 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01906nam a22003972 4500</leader><controlfield tag="001">ZDB-30-ORH-100860400</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240227122214.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240227s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738461489</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-7384-6148-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738461482</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-7384-6148-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100860400</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100860400</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738461489</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100860400</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240213</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Morris, Neil</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IBM and CMTG cyber resiliency</subfield><subfield code="b">building an automated, VMware Aware safeguarded copy solution to provide data resilience</subfield><subfield code="c">Neil Morris, Stephen Doney, Barry Whyte</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (22 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage Copy Data Management. The target audience for this Blueprint is IBM Storage technical specialists and storage admins.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Doney, Stephen</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Whyte, Barry</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738461489/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-100860400 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:48:50Z |
institution | BVB |
isbn | 9780738461489 0738461482 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (22 pages) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | IBM Redbooks |
record_format | marc |
spelling | Morris, Neil VerfasserIn aut IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Neil Morris, Stephen Doney, Barry Whyte [First edition]. [Place of publication not identified] IBM Redbooks 2024 1 online resource (22 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage Copy Data Management. The target audience for this Blueprint is IBM Storage technical specialists and storage admins. Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures Doney, Stephen VerfasserIn aut Whyte, Barry VerfasserIn aut TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9780738461489/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Morris, Neil Doney, Stephen Whyte, Barry IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures |
title | IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience |
title_auth | IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience |
title_exact_search | IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience |
title_full | IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Neil Morris, Stephen Doney, Barry Whyte |
title_fullStr | IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Neil Morris, Stephen Doney, Barry Whyte |
title_full_unstemmed | IBM and CMTG cyber resiliency building an automated, VMware Aware safeguarded copy solution to provide data resilience Neil Morris, Stephen Doney, Barry Whyte |
title_short | IBM and CMTG cyber resiliency |
title_sort | ibm and cmtg cyber resiliency building an automated vmware aware safeguarded copy solution to provide data resilience |
title_sub | building an automated, VMware Aware safeguarded copy solution to provide data resilience |
topic | Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures |
topic_facet | Cyber intelligence (Computer security) Computer networks Security measures Internet Security measures |
url | https://learning.oreilly.com/library/view/-/9780738461489/?ar |
work_keys_str_mv | AT morrisneil ibmandcmtgcyberresiliencybuildinganautomatedvmwareawaresafeguardedcopysolutiontoprovidedataresilience AT doneystephen ibmandcmtgcyberresiliencybuildinganautomatedvmwareawaresafeguardedcopysolutiontoprovidedataresilience AT whytebarry ibmandcmtgcyberresiliencybuildinganautomatedvmwareawaresafeguardedcopysolutiontoprovidedataresilience |