Disaster Proofing Information Systems (災難防護資訊系統)

Robert W. Buchanan Jr.

買這商品的人也買了...

相關主題

商品描述

Does Your Business Continuity Plan Rely on Prevention or Cure?


In todays communications-dependent business world, disaster may come in the guise of an act of God, or an act of war. It may also come in the form of such unremarkable events as ISP problems, server outages, systems changes, network glitches, or routine upgrades. With a little bad luck, any one of these can trigger a single point of failure for a major problem.


Increasingly, companies are looking for a more proactive approach to disaster management than traditional disaster recovery can provide. Its time, as Rick Devenuti suggests in his foreword, to change our thinking about preparedness. Disaster-Proofing Information Systems:

* Provides a methodology for underwriting business continuity through end-to-end availability and resource distribution

* Takes a close look at best practices and available products and tools for colocated, fault-tolerant systems

* Illustrates how all components of a disaster avoidance implementation can carry their own weight on a daily basis, unlike traditional disaster recovery cost allocations


END-TO-END DISASTER MANAGEMENT FOR YOUR:

* databases

* applications

* servers

* infrastructure

* Internet links

* workstations

* remote users

* personnel

* facilities


This book utilitizes [todays new system capabilities] through a method called SHARED that integrates high availability with disaster avoidance to provide systems that are highly redundant and tolerant of disaster in whatever form it occurs. It will help you chart a course toward systems that avoid the need for disaster recovery...and provide other operational benefits in the areas of performance, reliability, and maintainability. -- Richard R. Devenuti, CIO, Microsoft Corporation

          

   PART I: A SHARED METHODOLOGY FOR DISASTER AVOIDANCE ACROSS ENTERPRISE, B2B AND B2C SYSTEMS
    Chapter 1: Avoidance Versus Recovery
    Chapter 2: Business Continuity Requirements
    Chapter 3: Developing a Disaster Avoidance Strategy
    Chapter 4: Integrating Business Continuity and Disaster Avoidance Needs
   PART II: IMPLEMENTING THE SHARED ARCHITECTURE
    Chapter 5: Access Devices
    Chapter 6: Platforms
    Chapter 7: Applications
    Chapter 8: Data Store
    Chapter 9: Infrastructure
    Chapter 10: B2B, B2C, B2G, and Small Business Needs
    Chapter 11: Validation and Testing
     Index

商品描述(中文翻譯)

您的業務持續性計劃是依賴預防還是治療?

在今天這個依賴通訊的商業世界中,災難可能以天災或戰爭的形式出現。它也可能以ISP問題、伺服器故障、系統更改、網絡故障或例行升級等平凡事件的形式出現。稍有不幸,這些事件中的任何一個都可能引發重大問題的單一故障點。

越來越多的公司正在尋求比傳統災難恢復更積極的災難管理方法。正如Rick Devenuti在序言中建議的那樣,是時候改變我們對準備工作的思考方式了。《防災信息系統》:

- 通過端到端的可用性和資源分配提供了一種保證業務持續性的方法論。
- 仔細研究了共同託管、容錯系統的最佳實踐和可用產品和工具。
- 說明了災難避免實施的所有組件如何在日常工作中承擔自己的責任,而不像傳統的災難恢復成本分配那樣。

端到端的災難管理適用於以下方面:

- 數據庫
- 應用程式
- 伺服器
- 基礎設施
- 網際網路連接
- 工作站
- 遠程用戶
- 人員
- 設施

這本書利用了今天的新系統能力,通過一種名為SHARED的方法將高可用性與災難避免相結合,提供高度冗余且能夠容忍任何形式災難的系統。它將幫助您制定一個避免災難恢復需求的系統路線圖,並在性能、可靠性和可維護性等方面提供其他運營優勢。- Richard R. Devenuti, 微軟公司首席信息官

目錄:

- 第一部分:企業、B2B和B2C系統的共享災難避免方法論
- 第1章:避免與恢復
- 第2章:業務持續性需求
- 第3章:制定災難避免策略
- 第4章:整合業務持續性和災難避免需求
- 第二部分:實施共享架構
- 第5章:訪問設備
- 第6章:平台
- 第7章:應用程式
- 第8章:數據存儲
- 第9章:基礎設施
- 第10章:B2B、B2C、B2G和小企業需求
- 第11章:驗證和測試
- 索引