index_D

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

DAS (Direct Attach Storage) 2nd
     ATA 2nd 3rd
    backups
         external 2nd
         internal
     defined
     SCSI 2nd 3rd 4th 5th 6th 7th
     security for 2nd
DASD (Direct Access Storage Devices) 2nd
Data
     defined
     models for 2nd
Data at rest
Data corruption
     defined
     in restore operations 2nd
Data in motion
Data Lifecycle Management (DLM) 2nd 3rd 4th
     automation 2nd
     defined
     multi-tier storage architectures in 2nd 3rd
     policies in 2nd
Data loss 2nd
     accidental
     effect of 2nd 3rd 4th
     from disasters 2nd
     from security breaches 2nd
     from system failure 2nd
Data management layer
Data migration
     defined
     DLM
Data movers
     defined
     in server-less backup
Data path width in parallel SCSI
Data protection 2nd
     changes in 2nd
     defined
     importance of 2nd
     key points 2nd
     practices and techniques 2nd
Data Protection Act of 1998 2nd
Data retention
     defined
     requirements
Databases
     context of
     replicating 2nd
Death of information in ILM 2nd
Decision making in ILM automation
Default ALLOW posture 2nd 3rd
Default DENY posture 2nd 3rd
Defense in depth
     authentication and access control 2nd
     defined
     host and application defense
     perimeter defense 2nd
Delays in remote copy 2nd 3rd 4th
Denial of service (DoS) attacks
     defined
     from security breaches
     in IP-based SANs 2nd
Dense Wave Division Multiplexing (DWDM)
Designing Storage Networks
Destruction policies in DLM
Detail in policies
Detecting intruders
Determinable values
Deterministic fabrics
Device layer in storage model 2nd
Device names in policies
Devices in SCSI 2nd 3rd
Differential SCSI
Direct Access Storage Devices (DASD) 2nd
Direct Attach Storage (DAS) 2nd
     ATA 2nd 3rd
    backups
         external 2nd
         internal
     defined
     SCSI 2nd 3rd 4th 5th 6th 7th
     security for 2nd
Directive 2002/58/EC
Directors
     defined
     in FC topology
Disasters
     data loss from 2nd
     restoring data in 2nd
Discovery services in IP-based SANs 2nd
Disk drives
     arrays 2nd
     crashes
     defined
     in RAID 2nd 3rd 4th
Disk system remote copy 2nd 3rd
Disk-based backups
Disk-to-disk backups
     defined
     process 2nd 3rd 4th
Disk-to-disk-to-tape backups
     defined
     process 2nd
Distances in remote copy latency 2nd
Diversity of defense
     characteristics 2nd
     defined
DLM (Data Lifecycle Management) 2nd 3rd 4th
     automation 2nd
     defined
     multi-tier storage architectures in 2nd 3rd
     policies in 2nd
DNS (Domain Naming Service)
Document management vs. ILM 2nd
Document type definitions (DTDs) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Dongles
DoS (denial of service) attacks
     defined
     from security breaches
     in IP-based SANs 2nd
Double homed hosts
Drive controllers for arrays 2nd
DTDs (document type definitions) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Duplication in information protection costs
DVD-ROM/RW storage
DWDM (Dense Wave Division Multiplexing)

 < Day Day Up >   


Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net