index_S

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Sales, risk to 2nd
SANs [See Storage Area Networks (SANs)]
Sarbanes-Oxley (SOX) Act 2nd
SAS (Serial Attached SCSI)
     benefits of
     defined
     working with 2nd
SATA (Serial ATA)
     characteristics 2nd
     defined
     in DLM
     SAS support for 2nd
Scaling in san
Scanned documents, ILM for
Schema
     defined
     ILM 2nd 3rd
     XML 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Scope in information protection costs
SCSI (Small Computer Systems Interface) 2nd 3rd
     addressing in
     controllers in 2nd
     defined
     in file system bypassing 2nd
     in IP-based SAN attacks
     inline management of 2nd
     iSCSI
     LUNs in
         locking
         masking 2nd 3rd
     parallel 2nd 3rd 4th
     protocols
     SAS 2nd
     standards
     targets and initiators in 2nd
SCSI Enclosure Services (SES) 2nd
SCSI Trade Association
Search engines
     for ILM automation
     vs. inference engines 2nd
SearchStorage.Com site
Secrets, theft of 2nd
Securities and Exchange Commission 2nd
Security concepts 2nd
     defense in depth 2nd 3rd 4th
     diversity of defense 2nd
     encryption 2nd
     key points
     least privilege 2nd 3rd
     typical attacks 2nd 3rd
Security postures 2nd 3rd
Security through obscurity
Selective backup and restore 2nd
Serial ATA (SATA)
     characteristics 2nd
     defined
     in DLM
     SAS support for 2nd
Serial Attached SCSI (SAS)
     benefits of
     defined
     working with 2nd
Server Message Block (SMB) protocol
Server type programming errors 2nd
Server-less backups 2nd
Servers in LAN-based backups
SES (SCSI Enclosure Services) 2nd
SHA-1 hashes
Shadow copies
Shadowing in RAID
Shareholder lawsuits
Simple Name Server (SNS)
Single-mode fiber optic cable
Single-tape backups
Slashes (/) in XML
Slave devices in parallel ATA
Small Computer Systems Interface [See SCSI (Small Computer Systems Interface)]
Smart cards
SMB (Server Message Block) protocol
Snapshots
     defined
     replication
     vs. backups
SNIA (Storage Networking Industry Association)
SNS (Simple Name Server)
SNUG (Storage Networking User Groups)
Soft zoning in FC 2nd
Software
     failures in 2nd 3rd
     for backups and restore 2nd 3rd
     with vendor lock-in 2nd
Solid-state storage
     defined
     uses
SOX (Sarbanes-Oxley) Act 2nd
Specificity in policies
Speed
     of backups
     of restoring data
Spoofing
     defined
     IP-based SAN hosts
     WWN 2nd
SQL replication commands
SRDF (Symmetrix Remote Data Facility)
Standard lifecycles
State
     defined
     in context
Stateful failover
Storage and storage technology 2nd
     access time
     arrays, libraries, and jukeboxes 2nd
    DAS [See Direct Attach Storage (DAS)]
     data access in
     for backup and recovery 2nd 3rd
     history of 2nd 3rd 4th
     I/O 2nd
     I/O stack 2nd 3rd 4th 5th 6th
     key points 2nd
     model for 2nd
     NAS 2nd 3rd 4th 5th
     roles of 2nd
    SAN [See Storage Area Networks (SANs)]
    security for [See Storage system security]
     streaming tape 2nd
     vs. ILM
Storage Area Networks (SANs) 2nd 3rd 4th
     backups 2nd 3rd 4th 5th 6th
     components of 2nd
     defined
     FC 2nd 3rd 4th 5th 6th
     hybrid NAS-SAN devices 2nd
     IP-based 2nd 3rd
     iSCSI
     over MANs and WANs 2nd
     remote copy for
     risk multiplier of
     security in
         access control and encryption 2nd 3rd
         authentication 2nd
         FC vulnerabilities 2nd 3rd 4th 5th 6th 7th 8th 9th
         IP-based vulnerabilities 2nd 3rd 4th 5th
         NAS security
         SCSI vulnerabilities 2nd 3rd
         switch operating systems
     system management software for 2nd
Storage Networking Industry Association (SNIA)
Storage Networking User Groups (SNUG)
Storage Networking World
Storage switches
     defined
     intelligent
Storage system security 2nd 3rd
     case study
     checklist for 2nd
     DAS 2nd
     internal and external vectors in 2nd 3rd
     key points 2nd
     practices for 2nd 3rd 4th 5th 6th
     risk in 2nd 3rd 4th
     role of 2nd 3rd
    SAN security [See Storage Area Networks (SANs)]
     secure FC channel protocols
Streaming transfer
     defined
     tape 2nd
Striping in RAID
Structured data
     backup constraints 2nd
     classifying
     in ILM 2nd
Sufficient action for data protection
Switched fabric 2nd
Switches
     FC 2nd 3rd 4th
     intelligent
     SANs
Symmetrical encryption
Symmetrix Remote Data Facility (SRDF)
Synchronous processes
Synchronous remote copy 2nd 3rd
System failure, data loss from 2nd
System management software for SANs 2nd

 < Day Day Up >   


Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net