Table of Contents

 < Day Day Up > 

book cover
Data Protection and Information Lifecycle Management
By Tom Petrocelli
...............................................
Publisher: Pearson PTR
Pub Date: September 23, 2005
ISBN: 0-13-192757-4
Pages: 288
 

Table of Contents  | Index


   Copyright
   Acknowledgments
   About the Author
   Preface
      Who Is This Book For?
      How This Book Is Arranged
      What You Will Take Away from This Book
      Chapter 1.  Introduction to Data Protection
      What Does Data Protection Mean?
      A Model for Information, Data, and Storage
      Why Is Data Protection Important to the Enterprise?
      Data Loss and Business Risk
      Connectivity: The Risk Multiplier
      Business Continuity: The Importance of Data Availability to Business Operations
      The Changing Face of Data Protection
      Key Points
      Chapter 2.  An Overview of Storage Technology
      A Quick History of Data Storage
      Storage I/O Basics
      The I/O Stack
      Direct Attach Storage
      Network Attached Storage (NAS)
      Storage Area Networks
      Extending SANs over MAN and WAN
      Key Points
      Chapter 3.  Backup and Restore
      The First Line of Defense
      Designing Storage Systems for Backup and Recovery
      Recovering from Disaster: Restoring Data
      Things That Go Wrong with Restore Operations
      Tape Backup
      Disk-to-Disk Backup
      Disk-to-Disk to Tape
      Backup and Restore Practices
      Application-Level Backup and Recovery
      Case Study: Bingham McCutchen
      Key Points
      Chapter 4.  Remote Copy and Replication: Moving Data to a Safe Location
      How Remote Copy and Replication Are Different from Backup
      Remote Copy
      Design Considerations for Remote Copy
      Replication
      Case Study: PdMain
      Key Points
      Chapter 5.  Basic Security Concepts
      Least Privilege
      Security Posture
      Defense in Depth
      Diversity of Defense
      Encryption
      Typical Attacks
      Key Points
      Chapter 6.  Storage System Security
      The Role of Storage Security in Enterprise Data Protection
      DAS Security
      SAN Security
      Internal and External Vectors
      Risk
      Security Practices for Storage
      Secure Fibre Channel Protocols: FC-SP and FCAP
      Case Study: Transend Services
      Key Points
      Chapter 7.  Policy-Based Data Protection
      Difficulties with Data Protection Strategies
      Data Lifecycle Management (DLM)
      Key Points
      Chapter 8.  Information Lifecycle Management
      Information Assurance and Data Protection
      What Is Information Lifecycle Management?
      Unstructured and Structured Information
      The Importance of Context
      Determining and Managing Information Context
      Location and the Information Perimeter
      The Information Lifecycle
      An ILM Schema
      Matching Information Value to Protection Options
      The Changing Value of Information
      Regulatory Concerns
      Protecting Information Using ILM Policies
      Controlling Information Protection Costs
      Automating ILM
      Case Study: MidAmerica Bank
      Key Points
      Appendix A.  XML Schemas and Document Type Definitions for Policy Statements
      Appendix B.  Resources
      Books Worth Reading
      Organizations and Conferences
      Web Sites Worth Visiting
      Government Documents and Resources
      Appendix C.  Acronyms
   Glossary
   Bibliography
   Index
 < Day Day Up > 


Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net