< Day Day Up > |
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Access control authentication 2nd defined in ILM automation in SANs 2nd 3rd Access control lists (ACLs) Access time controller defined Accidental data loss ACLs (access control lists) Acronyms 2nd Actuator assemblies Addressing in FC 2nd in SCSI Age in information lifecycle 2nd American National Standards Institute (ANSI) standard Analyzers, FC Angle brackets (<>) in XML Appliances in remote copy 2nd SAN Application independence in information Application security 2nd Application-level backup and recovery 2nd 3rd 4th 5th 6th Arbitrated loops defined FC 2nd Archives defined vs. backups 2nd Arrays backing up benefits of 2nd defined RAID RAID [See RAID (Redundant Array of Independent Disks)] Association of Storage Networking Professionals (ASNP) Asymmetrical encryption 2nd Asynchronous processes Asynchronous remote copy 2nd 3rd ATA (AT Attachment) specification 2nd 3rd Attacks denial of service man-in-the-middle programmer error exploits 2nd viruses and Trojan horses 2nd Auditing in ILM automation 2nd Authentication 2nd defined in iSCSI in NFS in SANs 2nd two-factor and multifactor user vs. host Autoloaders 2nd Automation CAS 2nd information movers policy engines for search and classification engines for DLM 2nd ILM 2nd auditing and tracking SAN encryption Availability defined for business continuity in DLM in protection costs |
< Day Day Up > |