| | Copyright |
| | Acknowledgments |
| | About the Author |
| | Preface |
| | | Who Is This Book For? |
| | | How This Book Is Arranged |
| | | What You Will Take Away from This Book |
| | Chapter 1. Introduction to Data Protection |
| | | What Does Data Protection Mean? |
| | | A Model for Information, Data, and Storage |
| | | Why Is Data Protection Important to the Enterprise? |
| | | Data Loss and Business Risk |
| | | Connectivity: The Risk Multiplier |
| | | Business Continuity: The Importance of Data Availability to Business Operations |
| | | The Changing Face of Data Protection |
| | | Key Points |
| | Chapter 2. An Overview of Storage Technology |
| | | A Quick History of Data Storage |
| | | Storage I/O Basics |
| | | The I/O Stack |
| | | Direct Attach Storage |
| | | Network Attached Storage (NAS) |
| | | Storage Area Networks |
| | | Extending SANs over MAN and WAN |
| | | Key Points |
| | Chapter 3. Backup and Restore |
| | | The First Line of Defense |
| | | Designing Storage Systems for Backup and Recovery |
| | | Recovering from Disaster: Restoring Data |
| | | Things That Go Wrong with Restore Operations |
| | | Tape Backup |
| | | Disk-to-Disk Backup |
| | | Disk-to-Disk to Tape |
| | | Backup and Restore Practices |
| | | Application-Level Backup and Recovery |
| | | Case Study: Bingham McCutchen |
| | | Key Points |
| | Chapter 4. Remote Copy and Replication: Moving Data to a Safe Location |
| | | How Remote Copy and Replication Are Different from Backup |
| | | Remote Copy |
| | | Design Considerations for Remote Copy |
| | | Replication |
| | | Case Study: PdMain |
| | | Key Points |
| | Chapter 5. Basic Security Concepts |
| | | Least Privilege |
| | | Security Posture |
| | | Defense in Depth |
| | | Diversity of Defense |
| | | Encryption |
| | | Typical Attacks |
| | | Key Points |
| | Chapter 6. Storage System Security |
| | | The Role of Storage Security in Enterprise Data Protection |
| | | DAS Security |
| | | SAN Security |
| | | Internal and External Vectors |
| | | Risk |
| | | Security Practices for Storage |
| | | Secure Fibre Channel Protocols: FC-SP and FCAP |
| | | Case Study: Transend Services |
| | | Key Points |
| | Chapter 7. Policy-Based Data Protection |
| | | Difficulties with Data Protection Strategies |
| | | Data Lifecycle Management (DLM) |
| | | Key Points |
| | Chapter 8. Information Lifecycle Management |
| | | Information Assurance and Data Protection |
| | | What Is Information Lifecycle Management? |
| | | Unstructured and Structured Information |
| | | The Importance of Context |
| | | Determining and Managing Information Context |
| | | Location and the Information Perimeter |
| | | The Information Lifecycle |
| | | An ILM Schema |
| | | Matching Information Value to Protection Options |
| | | The Changing Value of Information |
| | | Regulatory Concerns |
| | | Protecting Information Using ILM Policies |
| | | Controlling Information Protection Costs |
| | | Automating ILM |
| | | Case Study: MidAmerica Bank |
| | | Key Points |
| | Appendix A. XML Schemas and Document Type Definitions for Policy Statements |
| | Appendix B. Resources |
| | | Books Worth Reading |
| | | Organizations and Conferences |
| | | Web Sites Worth Visiting |
| | | Government Documents and Resources |
| | Appendix C. Acronyms |
| | Glossary |
| | Bibliography |
| | Index |