index_B

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Backup sets
Backup windows
     defined
     purpose of
Backups 2nd 3rd 4th [See also Restoration and recovery]
     application-level 2nd 3rd 4th 5th 6th
     case study 2nd
    DAS
         external 2nd
         internal
     defined
     disk-based
     disk-to-disk 2nd 3rd 4th
     disk-to-disk-to-tape 2nd
     full and incremental 2nd
     home systems
     integrity of
     interrupted
     key points 2nd
     LAN-based 2nd 3rd
     LAN-free 2nd 3rd 4th
     methods comparison 2nd
     NAS 2nd 3rd
     off-site 2nd
     performance of
     problems with 2nd 3rd
     remote copy with
     rotating 2nd
     RTO and RPO in 2nd
     SAN 2nd 3rd 4th 5th 6th
     selective 2nd
     server-less 2nd
     single-tape
     software for 2nd 3rd
     storage systems for 2nd 3rd
     structured object constraints 2nd
     tape 2nd 3rd 4th
     vs. archives 2nd
     vs. remote copy and replication 2nd 3rd
Bad media in restore operations 2nd
Bandwidth
     in network restore operations
     in remote copy 2nd 3rd
Basel Accords and Basel Accords II 2nd
Basics of SCSI
Behaviors and policies
Bibliography
Bingham McCucthen case study 2nd
Biodiversity 2nd
Biometrics
Bits
Blocks and block I/O 2nd
     defined
     deterministic behavior for
     in remote copy
Book resources 2nd
Bottom-up policy approach
Breaches
     data loss from 2nd
     DoS attacks from
     unintentional
Buffer overruns
Buffers in disk to disk to tape backups
Building Storage Networks
Bunkering 2nd 3rd
Business continuity
     availability for
     defined
Business risk 2nd
Bytes

 < Day Day Up >   


Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net