| | | Copyright |
| | | Acknowledgments |
| | | About the Author |
| | | Preface |
| | | | Who Is This Book For? |
| | | | How This Book Is Arranged |
| | | | What You Will Take Away from This Book |
| | | Chapter 1. Introduction to Data Protection |
| | | | What Does Data Protection Mean? |
| | | | A Model for Information, Data, and Storage |
| | | | Why Is Data Protection Important to the Enterprise? |
| | | | Data Loss and Business Risk |
| | | | Connectivity: The Risk Multiplier |
| | | | Business Continuity: The Importance of Data Availability to Business Operations |
| | | | The Changing Face of Data Protection |
| | | | Key Points |
| | | Chapter 2. An Overview of Storage Technology |
| | | | A Quick History of Data Storage |
| | | | Storage I/O Basics |
| | | | The I/O Stack |
| | | | Direct Attach Storage |
| | | | Network Attached Storage (NAS) |
| | | | Storage Area Networks |
| | | | Extending SANs over MAN and WAN |
| | | | Key Points |
| | | Chapter 3. Backup and Restore |
| | | | The First Line of Defense |
| | | | Designing Storage Systems for Backup and Recovery |
| | | | Recovering from Disaster: Restoring Data |
| | | | Things That Go Wrong with Restore Operations |
| | | | Tape Backup |
| | | | Disk-to-Disk Backup |
| | | | Disk-to-Disk to Tape |
| | | | Backup and Restore Practices |
| | | | Application-Level Backup and Recovery |
| | | | Case Study: Bingham McCutchen |
| | | | Key Points |
| | | Chapter 4. Remote Copy and Replication: Moving Data to a Safe Location |
| | | | How Remote Copy and Replication Are Different from Backup |
| | | | Remote Copy |
| | | | Design Considerations for Remote Copy |
| | | | Replication |
| | | | Case Study: PdMain |
| | | | Key Points |
| | | Chapter 5. Basic Security Concepts |
| | | | Least Privilege |
| | | | Security Posture |
| | | | Defense in Depth |
| | | | Diversity of Defense |
| | | | Encryption |
| | | | Typical Attacks |
| | | | Key Points |
| | | Chapter 6. Storage System Security |
| | | | The Role of Storage Security in Enterprise Data Protection |
| | | | DAS Security |
| | | | SAN Security |
| | | | Internal and External Vectors |
| | | | Risk |
| | | | Security Practices for Storage |
| | | | Secure Fibre Channel Protocols: FC-SP and FCAP |
| | | | Case Study: Transend Services |
| | | | Key Points |
| | | Chapter 7. Policy-Based Data Protection |
| | | | Difficulties with Data Protection Strategies |
| | | | Data Lifecycle Management (DLM) |
| | | | Key Points |
| | | Chapter 8. Information Lifecycle Management |
| | | | Information Assurance and Data Protection |
| | | | What Is Information Lifecycle Management? |
| | | | Unstructured and Structured Information |
| | | | The Importance of Context |
| | | | Determining and Managing Information Context |
| | | | Location and the Information Perimeter |
| | | | The Information Lifecycle |
| | | | An ILM Schema |
| | | | Matching Information Value to Protection Options |
| | | | The Changing Value of Information |
| | | | Regulatory Concerns |
| | | | Protecting Information Using ILM Policies |
| | | | Controlling Information Protection Costs |
| | | | Automating ILM |
| | | | Case Study: MidAmerica Bank |
| | | | Key Points |
| | | Appendix A. XML Schemas and Document Type Definitions for Policy Statements |
| | | Appendix B. Resources |
| | | | Books Worth Reading |
| | | | Organizations and Conferences |
| | | | Web Sites Worth Visiting |
| | | | Government Documents and Resources |
| | | Appendix C. Acronyms |
| | | Glossary |
| | | Bibliography |
| | | Index |