TY - BOOK AU - Cougias,Dorian J. AU - Heiberger,E.L. AU - Koop,Karsten TI - The backup book: disaster recovery from desktop to data center SN - 0972903909 (pbk.) : AV - QA76.9.D348 C68 2003 PY - 2003/// CY - Lecanto, FL PB - SV Books KW - Data recovery (Computer science) KW - Computer security KW - Electronic data processing KW - Backup processing alternatives N1 - Includes index; What's a disaster without a recovery? -- Creating a balance for when bad things happen -- Security is job 1 ... -- When bad things happen to good computers -- From macro to micro--a quick look at the stability of assets -- Freezes, corruption, and loss--that which can go wrong -- Putting it into perspective -- Cost justifying your backup plan -- Types of calculations -- Business continuity when data loss occurs = re-creation costs -- Downtime for an individual is much different than downtime for a workgroup -- Commerce systems loss = sales net profit losses -- When timing is everything, costs are associated with the event -- Sometimes, it's simply cheaper to do things with a computer -- Protection for application freezes -- Freeze loss prevention--sort of -- Protection for computer freezes -- Document corruption -- Word (and other stand-alone documents) file corruption -- Entry-level database corruption -- Outlook and Entourage e-mail clients corruption -- Application & operating system corruption -- Repairing your Windows operating system -- Can you stop application and OS corruption? -- Storage corruption -- Storage formats and storage corruption -- Fragmentation may not be corruption ... -- Hard drive interfaces--differences between SCSI and EIDE/ATA -- SMART precludes DUMB ... -- Network corruption -- How does my Ethernet work? -- First stop on the corruption express: your cabling -- The computer's-eye view of your network -- Trouble spots on the Local Area Network -- Searching out latency and throughput trouble spots -- The REAL root cause of all network problems? -- Keeping the alligators out of the sewer -- "I'm going to ignore this chapter because I have a firewall" -- Testing (scanning) your network -- Protection: Set up an intrusion detection system (IDS) -- Assign responsibilities & create your team -- Responding to a hacker attack or other security breach -- A security checklist for bringing a new system online -- Setting up an e-mail defense system -- DNS security -- Security research sites -- Documents that don't die -- Fault tolerance = Bringing files back from "gone" -- File and directory duplication and replication -- What's a backup? -- The basics of internet backup services -- An overview of backup tool operations -- Backup media -- Open file backup for databases -- That which you can't do nuttin about: In-use or locked files -- Open-file database backups -- Recovering from operating system and application loss -- Restoration and Emergency Recovery Disks -- Disk imaging--understanding imaging basics -- Home User/Small business disk imaging options -- Larger organizations & network booting -- Larger organizations & network installs & imaging -- VERITAS Bare Metal Restore (BMR) -- Personality migration as a part of imaging -- Hardware loss -- Understanding your drives from a business continuity perspective -- Protection against drive loss = RAID -- Planning a RAID system to combat drive and server failure -- Internal RAID setups -- What about external storage? -- Storage Area Networks -- Network Attached Storage (NAS) -- What if you can't afford a clustered server or a SAN? -- Keyboard loss -- Replication -- Current, or simply consistent data? -- The tools -- Uses for IP-based replication -- Dealing with power loss -- The Main Thing -- Talk the talk--The language of power problems and UPSes -- Which UPS is for you? -- Doing it for real -- Questions you should ask -- High-availability networks -- A high-availability quiz -- The four rules of thumb for highly available networks -- E-mail that doesn't go down -- Adding a VPN for disaster preparation -- Building loss doesn't mean business loss -- What goes to offsite storage -- Pre-planning offsite computers for information availability -- Normalizing access to your systems while hunting for new digs -- Tape rotation methods -- Organizational network backups -- Backing up your servers starts with understanding them -- Setting up multiple backup servers and windowed schedules -- Finding the important data--what's your strategy? -- Creating specific selectors in your backup software to eliminate cruft -- Working with SRM (Storage Resource Management) software to eliminate cruft and reduce hardware needs -- What about workstations? N2 - Detailing what can go wrong in backup and recovery and how that applies to the various backup methods available, this book couples that information with recovery and business continuity tactics played out over the backdrop of various real-world scenarios ER -