How This Book Is Arranged

 < Day Day Up > 

This book takes a progressive approach to understanding data protection. Starting with the most basic topics, each chapter builds on the previous ones. Some chapters are overviews for those who are not well acquainted with important base technologies and practices. Others are more involved, presenting the major ideas, techniques, processes, and technology associated with data protection. Those chapters also end with a case study about real IT professionals and the techniques they have used to solve data protection problems. Finally, the book ends with several appendixes, a bibliography, and a glossary, all designed to enhance your understanding of other parts of the book.

The chapters of Data Protection and Information Lifecycle Management are:

Chapter 1: Introduction to Data Protection. This chapter lays the foundation for understanding data protection, introducing the major drivers and techniques behind data protection. It discusses the reasons that organizations spend time and money on data protection and presents a framework for understanding the ensuing topics.

Chapter 2: An Overview of Storage Technology. Chapter 2 provides the technological underpinnings of most data protection. Written for those who may not have a deep knowledge of storage technology, it contains something for everyone. The chapter discusses the basics of data storage necessary to understanding data protection. Furthermore, the chapter presents some of the new technology and practices that impact data protection strategies today.

Chapter 3: Backup and Restore. The classic data protection strategy just keeps getting better. Chapter 3 outlines the most common techniques, such as tape backup, as well as the more recent additions to the backup bag of tricks. The emphasis is on architecture and practices.

Chapter 4: Remote Copy and Replication: Moving Data to a Safe Location. Chapter 4 kicks it up a notch, exploring remote copy and replication ways of constantly duplicating data in a network. With data synchronized constantly, hot sites can be used that provide immediate failover in case of disaster.

Chapter 5: Basic Security Concepts. This chapter provides the necessary underpinnings for the next chapter, which deals with storage security. It is a quick reference to basic computer security concepts and strategies.

Chapter 6: Storage System security. Chapter 6 describes a new area of security: storage security. Until recently, the security of the storage system was ignored, since it was safe behind the server security screen. That's no longer true, and data protection demands a new focus on securing the storage infrastructure.

Chapter 7: Policy-Based Data Protection. This chapter outlines the emerging area of policy-driven data protection, especially Data Lifecycle Management (DLM). These techniques are some of the most powerful in the data protection toolbox.

Chapter 8: Information Lifecycle Management. This chapter explores how Information Lifecycle Management (ILM) can be used to enhance data protection. The book takes a detailed look at ILM and shows how it can be used to further information assurance and data protection.

Appendix A: XML Schemas and Document Type Definitions for Policy Statements. The XML schemas and DTDs for the policy examples in Chapters 7 and 8 are listed here, with some additional thoughts on how XML can be used to describe DLM and ILM policies.

Appendix B: Resources. This appendix lists other resources that are helpful to those entrusted with data protection plans: industry groups, conferences, books, and web sites. They provide additional insights into the technology and regulations that are important to data protection.

Appendix C: Acronyms. This appendix lists the acronyms used in the book. Data Protection and Information Lifecycle Management is chock full of acronyms. Acronyms are important shortcuts that save us from having to say the same thing over and over again, but they work only if you know what they are.

Glossary The glossary lists the major terms used throughout the book, along with their definitions.

Bibliography. The bibliography lists the books that provided references for the author while writing this book.

     < Day Day Up > 


    Data Protection and Information Lifecycle Management
    Data Protection and Information Lifecycle Management
    ISBN: 0131927574
    EAN: 2147483647
    Year: 2005
    Pages: 122

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net