index_P

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Packet filtering
Parallel ATA 2nd
Parallel SCSI 2nd 3rd 4th
Passwords
     in authentication 2nd
     in encryption
Path width in parallel SCSI
Paths of information 2nd 3rd
PdMain case study
Peer to Peer Remote Copy (PPRC) 2nd
Performance
     cost of
     of backups
     of restoring data
Perimeter defense 2nd
Persistent storage
PGP (Pretty Good Privacy) 2nd
Photographs, ILM for
Point-in-time backups 2nd
Point-to-point FC topology 2nd
Policies
     defined
     in ILM 2nd
Policy engines
     defined
     in DLM
     in ILM
Policy-based data protection 2nd
     characteristics of 2nd
     DLM 2nd 3rd 4th 5th 6th 7th
     failures in 2nd
     guidelines for 2nd 3rd
     key points
     languages for
     sample policy 2nd 3rd 4th
Policy-driven management
Port blocking
     in FC
     in packet filtering
Port zoning in FC 2nd
Port-level access control
Postures
     access control
     security 2nd 3rd
PPRC (Peer to Peer Remote Copy) 2nd
Pretty Good Privacy (PGP) 2nd
Privacy, ILM for
Private keys
Processes, policies for 2nd
Productivity, data protection for
Programming errors
     exploited 2nd
     in SCSI 2nd
Propagation delay
Provisioning in SANs
Proxies
Public Company Accounting Board
Public keys

 < Day Day Up >   


Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net