Flylib.com
Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122
Authors:
Tom Petrocelli
BUY ON AMAZON
Data Protection and Information Lifecycle Management
Table of Contents
Copyright
Acknowledgments
About the Author
Preface
Who Is This Book For?
How This Book Is Arranged
What You Will Take Away from This Book
Chapter 1. Introduction to Data Protection
What Does Data Protection Mean?
A Model for Information, Data, and Storage
Why Is Data Protection Important to the Enterprise?
Data Loss and Business Risk
Connectivity: The Risk Multiplier
Business Continuity: The Importance of Data Availability to Business Operations
The Changing Face of Data Protection
Key Points
Chapter 2. An Overview of Storage Technology
A Quick History of Data Storage
Storage IO Basics
The IO Stack
Direct Attach Storage
Network Attached Storage (NAS)
Storage Area Networks
Extending SANs over MAN and WAN
Key Points
Chapter 3. Backup and Restore
The First Line of Defense
Designing Storage Systems for Backup and Recovery
Recovering from Disaster: Restoring Data
Things That Go Wrong with Restore Operations
Tape Backup
Disk-to-Disk Backup
Disk-to-Disk to Tape
Backup and Restore Practices
Application-Level Backup and Recovery
Case Study: Bingham McCutchen
Key Points
Chapter 4. Remote Copy and Replication: Moving Data to a Safe Location
How Remote Copy and Replication Are Different from Backup
Remote Copy
Design Considerations for Remote Copy
Replication
Case Study: PdMain
Key Points
Chapter 5. Basic Security Concepts
Least Privilege
Security Posture
Defense in Depth
Diversity of Defense
Encryption
Typical Attacks
Key Points
Chapter 6. Storage System Security
The Role of Storage Security in Enterprise Data Protection
DAS Security
SAN Security
Internal and External Vectors
Risk
Security Practices for Storage
Secure Fibre Channel Protocols: FC-SP and FCAP
Case Study: Transend Services
Key Points
Chapter 7. Policy-Based Data Protection
Difficulties with Data Protection Strategies
Data Lifecycle Management (DLM)
Key Points
Chapter 8. Information Lifecycle Management
Information Assurance and Data Protection
What Is Information Lifecycle Management?
Unstructured and Structured Information
The Importance of Context
Determining and Managing Information Context
Location and the Information Perimeter
The Information Lifecycle
An ILM Schema
Matching Information Value to Protection Options
The Changing Value of Information
Regulatory Concerns
Protecting Information Using ILM Policies
Controlling Information Protection Costs
Automating ILM
Case Study: MidAmerica Bank
Key Points
Appendix A. XML Schemas and Document Type Definitions for Policy Statements
Appendix B. Resources
Books Worth Reading
Organizations and Conferences
Web Sites Worth Visiting
Government Documents and Resources
Appendix C. Acronyms
Glossary
Bibliography
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Z
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122
Authors:
Tom Petrocelli
BUY ON AMAZON
MySQL Stored Procedure Programming
Some Words of Advice for Developers
Operators
Conclusion
Transactional Support in MySQL
Tuning Table Access
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP Systems Impact on Organizations
Enterprise Application Integration: New Solutions for a Solved Problem or a Challenging Research Field?
Distributed Data Warehouse for Geo-spatial Services
Data Mining for Business Process Reengineering
A Hybrid Clustering Technique to Improve Patient Data Quality
Java for RPG Programmers, 2nd Edition
Data Types And Variables
Date And Time Manipulation
Database Access
Appendix A Using Java on the AS/400
Appendix C Obtaining The Code Samples
Cisco Voice Gateways and Gatekeepers
Media Gateway Control Protocol
PSTN Circuit Selection Overview
Digital Trunks
Review Questions
Case Study: Deploying Gatekeepers to Assist in Migration to VoIP
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Getting Started with Visio 2007
Working Within the Visio Environment
Adding Text to Shapes and the Drawing Page
Key Points
Changing the Layout of Connected Shapes
VBScript in a Nutshell, 2nd Edition
WSH Language Elements
Section A.11. Mathematical and Numeric
Section B.3. Date and Time Constants
Section B.6. Logical and TriState Constants
Section B.9. Variable Type Constants
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies