< Day Day Up > |
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Backup sets Backup windows defined purpose of Backups 2nd 3rd 4th [See also Restoration and recovery] application-level 2nd 3rd 4th 5th 6th case study 2nd DAS external 2nd internal defined disk-based disk-to-disk 2nd 3rd 4th disk-to-disk-to-tape 2nd full and incremental 2nd home systems integrity of interrupted key points 2nd LAN-based 2nd 3rd LAN-free 2nd 3rd 4th methods comparison 2nd NAS 2nd 3rd off-site 2nd performance of problems with 2nd 3rd remote copy with rotating 2nd RTO and RPO in 2nd SAN 2nd 3rd 4th 5th 6th selective 2nd server-less 2nd single-tape software for 2nd 3rd storage systems for 2nd 3rd structured object constraints 2nd tape 2nd 3rd 4th vs. archives 2nd vs. remote copy and replication 2nd 3rd Bad media in restore operations 2nd Bandwidth in network restore operations in remote copy 2nd 3rd Basel Accords and Basel Accords II 2nd Basics of SCSI Behaviors and policies Bibliography Bingham McCucthen case study 2nd Biodiversity 2nd Biometrics Bits Blocks and block I/O 2nd defined deterministic behavior for in remote copy Book resources 2nd Bottom-up policy approach Breaches data loss from 2nd DoS attacks from unintentional Buffer overruns Buffers in disk to disk to tape backups Building Storage Networks Bunkering 2nd 3rd Business continuity availability for defined Business risk 2nd Bytes |
< Day Day Up > |