index_A

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Access control
     authentication 2nd
     defined
     in ILM automation
     in SANs 2nd 3rd
Access control lists (ACLs)
Access time
     controller
     defined
Accidental data loss
ACLs (access control lists)
Acronyms 2nd
Actuator assemblies
Addressing
     in FC 2nd
     in SCSI
Age in information lifecycle 2nd
American National Standards Institute (ANSI) standard
Analyzers, FC
Angle brackets (<>) in XML
Appliances
     in remote copy 2nd
     SAN
Application independence in information
Application security 2nd
Application-level backup and recovery 2nd 3rd 4th 5th 6th
Arbitrated loops
     defined
     FC 2nd
Archives
     defined
     vs. backups 2nd
Arrays
     backing up
     benefits of 2nd
     defined
     RAID
    RAID [See RAID (Redundant Array of Independent Disks)]
Association of Storage Networking Professionals (ASNP)
Asymmetrical encryption 2nd
Asynchronous processes
Asynchronous remote copy 2nd 3rd
ATA (AT Attachment) specification 2nd 3rd
Attacks
     denial of service
     man-in-the-middle
     programmer error exploits 2nd
     viruses and Trojan horses 2nd
Auditing in ILM automation 2nd
Authentication 2nd
     defined
     in iSCSI
     in NFS
     in SANs 2nd
     two-factor and multifactor
     user vs. host
Autoloaders 2nd
Automation
     CAS 2nd
         information movers
         policy engines for
         search and classification engines for
     DLM 2nd
     ILM 2nd
         auditing and tracking
     SAN encryption
Availability
     defined
     for business continuity
     in DLM
     in protection costs

 < Day Day Up >   


Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net