Flylib.com
Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122
Authors:
Tom Petrocelli
BUY ON AMAZON
Data Protection and Information Lifecycle Management
Table of Contents
Copyright
Acknowledgments
About the Author
Preface
Who Is This Book For?
How This Book Is Arranged
What You Will Take Away from This Book
Chapter 1. Introduction to Data Protection
What Does Data Protection Mean?
A Model for Information, Data, and Storage
Why Is Data Protection Important to the Enterprise?
Data Loss and Business Risk
Connectivity: The Risk Multiplier
Business Continuity: The Importance of Data Availability to Business Operations
The Changing Face of Data Protection
Key Points
Chapter 2. An Overview of Storage Technology
A Quick History of Data Storage
Storage IO Basics
The IO Stack
Direct Attach Storage
Network Attached Storage (NAS)
Storage Area Networks
Extending SANs over MAN and WAN
Key Points
Chapter 3. Backup and Restore
The First Line of Defense
Designing Storage Systems for Backup and Recovery
Recovering from Disaster: Restoring Data
Things That Go Wrong with Restore Operations
Tape Backup
Disk-to-Disk Backup
Disk-to-Disk to Tape
Backup and Restore Practices
Application-Level Backup and Recovery
Case Study: Bingham McCutchen
Key Points
Chapter 4. Remote Copy and Replication: Moving Data to a Safe Location
How Remote Copy and Replication Are Different from Backup
Remote Copy
Design Considerations for Remote Copy
Replication
Case Study: PdMain
Key Points
Chapter 5. Basic Security Concepts
Least Privilege
Security Posture
Defense in Depth
Diversity of Defense
Encryption
Typical Attacks
Key Points
Chapter 6. Storage System Security
The Role of Storage Security in Enterprise Data Protection
DAS Security
SAN Security
Internal and External Vectors
Risk
Security Practices for Storage
Secure Fibre Channel Protocols: FC-SP and FCAP
Case Study: Transend Services
Key Points
Chapter 7. Policy-Based Data Protection
Difficulties with Data Protection Strategies
Data Lifecycle Management (DLM)
Key Points
Chapter 8. Information Lifecycle Management
Information Assurance and Data Protection
What Is Information Lifecycle Management?
Unstructured and Structured Information
The Importance of Context
Determining and Managing Information Context
Location and the Information Perimeter
The Information Lifecycle
An ILM Schema
Matching Information Value to Protection Options
The Changing Value of Information
Regulatory Concerns
Protecting Information Using ILM Policies
Controlling Information Protection Costs
Automating ILM
Case Study: MidAmerica Bank
Key Points
Appendix A. XML Schemas and Document Type Definitions for Policy Statements
Appendix B. Resources
Books Worth Reading
Organizations and Conferences
Web Sites Worth Visiting
Government Documents and Resources
Appendix C. Acronyms
Glossary
Bibliography
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Z
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122
Authors:
Tom Petrocelli
BUY ON AMAZON
Snort Cookbook
Installing Snort Binaries on Linux
Invisibly Sniffing Between Two Network Points
Logging Only Alerts
Detecting IDS Evasion
Snort and Investigations
SQL Hacks
Hack 1. Run SQL from the Command Line
Hack 20. Uncover Trends in Your Data
Hack 34. Calculate the Median
Hack 55. Import Someone Elses Data
Hack 80. Play Six Degrees of Kevin Bacon
The Java Tutorial: A Short Course on the Basics, 4th Edition
What Is Inheritance?
What Is an Exception?
Summary of Exceptions
Object Serialization
Swing-Based Applets
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
The Web services framework
Service Layers
WSDL-related XML Schema language basics
SOAP language basics
Service-Oriented Design (Part II: SOA Composition Guidelines)
DNS & BIND Cookbook
Using a Single Data File for Multiple Zones
Initiating a Zone Transfer
Setting Prerequisites in a Dynamic Update
Running the Name Server as a User Other than Root
Handling Active Directory with a Name Server
FileMaker 8 Functions and Scripts Desk Reference
Design Functions
Get(HighContrastState)
Get(RecordNumber)
GetNthRecord()
IsValidExpression()
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies