IBM and CMTG cyber resiliency : building an automated, VMware Aware safeguarded copy solution to provide data resilience /
This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage...
Saved in:
Main Authors: | , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
[Place of publication not identified] :
IBM Redbooks,
2024.
|
Edition: | [First edition]. |
Subjects: | |
Online Access: | CONNECT |
MARC
LEADER | 00000nam a22000007i 4500 | ||
---|---|---|---|
001 | in00006447462 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 240213s2024 xx a o 000 0 eng d | ||
005 | 20240214184743.9 | ||
035 | |a 1WRLDSHRon1420888570 | ||
040 | |a ORMDA |b eng |e rda |e pn |c ORMDA | ||
020 | |a 9780738461489 |q (electronic bk.) | ||
020 | |a 0738461482 |q (electronic bk.) | ||
035 | |a (OCoLC)1420888570 | ||
037 | |a 9780738461489 |b O'Reilly Media | ||
050 | 4 | |a QA76.9.A25 | |
082 | 0 | 4 | |a 005.8 |2 23/eng/20240213 |
049 | |a TXMM | ||
100 | 1 | |a Morris, Neil, |e author. | |
245 | 1 | 0 | |a IBM and CMTG cyber resiliency : |b building an automated, VMware Aware safeguarded copy solution to provide data resilience / |c Neil Morris, Stephen Doney, Barry Whyte. |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] : |b IBM Redbooks, |c 2024. | |
300 | |a 1 online resource (22 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a This IBM Blueprint outlines how CMTG and IBM have partnered to provide cyber resilient services to their clients. CMTG is one of Australia's leading private cloud providers based in Perth, Western Australia. The solution is based on IBM Storage FlashSystem, IBM Safeguarded Copy and IBM Storage Copy Data Management. The target audience for this Blueprint is IBM Storage technical specialists and storage admins. | ||
500 | |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) |5 TMurS | ||
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Internet |x Security measures. | |
700 | 1 | |a Doney, Stephen, |e author. | |
700 | 1 | |a Whyte, Barry, |e author. | |
730 | 0 | |a WORLDSHARE SUB RECORDS | |
856 | 4 | 0 | |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780738461489/?ar |z CONNECT |3 O'Reilly |t 0 |
949 | |a ho0 | ||
994 | |a 92 |b TXM | ||
998 | |a wi |d z | ||
999 | f | f | |s 2ae296d7-e7a8-4e30-8d79-bf0a7baa7cde |i d535ad44-0030-41c5-990a-03bbe2c0601f |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 0 |e QA76.9.A25 |h Library of Congress classification |