index_F

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Fabrics
     deterministic
     switched 2nd
     virtual 2nd 3rd
Failover
     defined
     in remote copy 2nd
False positive events
FC [See Fibre Channel (FC)]
FC Ping
FC-SP (Fibre Channel Security Protocol)
FCAP (Fibre Channel Authentication Protocol)
FCIP (Fibre Channel over IP)
FCP (Fibre Channel SCSI) 2nd
Federal Emergency Management Agency
Fibre Channel (FC)
     addressing in 2nd
     arbitrated loops 2nd
     defined
     FC-SP and FCAP protocols
     hard zoning in 2nd
     network stack 2nd
     SAN components in 2nd
     topology 2nd
     vs. SAN
     vulnerabilities
         authentication 2nd
         encryption
         FC analyzers
         FC arbitrated loop and LIPs
         file system bypassing 2nd
         gateway devices 2nd
         isolation 2nd
         management interfaces in 2nd
         trust issues 2nd
Fibre Channel Arbitrated Loop 2nd
Fibre Channel Authentication Protocol (FCAP)
Fibre Channel Industry Association
Fibre Channel over IP (FCIP)
Fibre Channel SCSI (FCP) 2nd
Fibre Channel Security Protocol (FC-SP)
File heads
     defined
     in NAS 2nd
File I/O 2nd
File replication
File systems 2nd
     bypassing in FC 2nd
     defined
     in location paths
Filers
Financial losses
Fines
Firewalls
     defined
     diversity of
     operation of 2nd
     with iSCSI 2nd
Flexibility, ILM for
Full backups 2nd 3rd
Full-bandwidth connections

 < Day Day Up >   


Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net