index_I

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

I/O (Input/Output)
     access time
     basics 2nd
     data access
     defined
I/O stack 2nd 3rd
     block I/O
     file I/O
     raid 2nd 3rd 4th
IDE/ATA storage protocols 2nd
IDSs (Intrusion Detection Systems)
iFCP (Internet Fibre Channel Protocol)
ILM [See Information life cycle management (ILM)]
ILM Summit
Image copies 2nd
Images, ILM for
Implicit context
INCITS (International Committee on Information Technology Standards)
Incremental backups 2nd 3rd
Inference engines 2nd
Information
     defined
     location paths of 2nd 3rd
     models 2nd
     transformations
Information assurance 2nd 3rd 4th
Information life cycle management (ILM) 2nd 3rd 4th
     automating 2nd
         auditing and tracking in
         content addressed storage in 2nd
         information movers in
         policy engines for
         search and classification engines for
     benefits of
     case study 2nd
    context in [See Context]
     defined
     general model for 2nd 3rd
     information perimeter 2nd
     information protection costs 2nd
     information value in 2nd
         changes 2nd 3rd
         matching 2nd
     key points 2nd
     life and death of information in 2nd
     misconceptions 2nd
     paths in 2nd 3rd
     policies in 2nd
     purpose of 2nd 3rd
     regulatory concerns 2nd 3rd
     schema 2nd 3rd
     unstructured and structured information in 2nd
Information Lifecycle Management Initiative
Information management layer
Information movers
Information value in ILM 2nd
Initiators in SCSI 2nd
Inside intruders
Integrity
     of backups
     of data
Intelligent storage switches
Internal DAS backups
Internal vectors in storage system security 2nd 3rd
International Committee on Information Technology Standards (INCITS)
Internet Fibre Channel Protocol (iFCP)
Interrupted backups
Intruders
Intrusion Detection Systems (IDSs)
Intrusion Response Systems (IRSs)
IP
     connection management in 2nd
     FC over 2nd
IP SANs: An Introduction to iSCSI, iFCP, and FCIP Protocols for Storage Area Networks
IP-based SANS
     extending
     vulnerabilities 2nd 3rd 4th 5th
     working with 2nd
IPSEC
IRSs (Intrusion Response Systems)
iSCSI
     authentication in
     defined
     firewalls with 2nd
Isolation in FC 2nd
IT (information technology)

 < Day Day Up >   


Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net