Knjiga je del e-razstave Frankfurt po Frankfurtu na Emka.si. Izberite med več kot 4200 najboljšimi knjigami sveta.
Pri vseh nakupih nad 59 € je poštnina brezplačna.
Strošek priprave paketa in dostave znaša 3,95 €.
Številni izdelki imajo oznako "brezplačna dostava", kar pomeni, da v primeru nakupa takšnega izdelka poštnine za celoten paket ne boste plačali.
Več o dostavi
Emka.si omogoča naslednje načine plačila:
z gotovino ob prevzemu (velja le za fizične osebe),
s karticami (Mastercard, Visa, ActivaMaestro, Activa, Diners),
Plačilo po predračunu (pravne osebe)
Račun z odlogom plačila (za javna podjetja, knjižnice, šole)
Več o plačilih
Pri vsakem izdelku je naveden predviden rok dostave. Glede na to katere izdelke izberete, se vam pri oddaji naročila prikaže tudi končni predviden datum dobave vašega pakete.
Večino izdelkov dostavljamo iz lastne zaloge, zato so naši dobavni roki zelo kratki.
Ko vam bomo poslali paket boste o tem obveščeni tudi po emailu. V emailu bo navedena številka vašega paketa ter povezava do Pošte Slovenije, kjer boste lahko preverili natančen status dostave.
Več o dostavi
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload: what the best mix of traditional and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined.
The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology, and activities that allow for data continuity. There are three essential activities that refer to themselves as data protection; while they all overlap in terms of scope and function, each operates as a reasonably self-contained field with its own specialists and domain nomenclature.