Flylib.com
Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122
Authors:
Tom Petrocelli
BUY ON AMAZON
Data Protection and Information Lifecycle Management
Table of Contents
Copyright
Acknowledgments
About the Author
Preface
Who Is This Book For?
How This Book Is Arranged
What You Will Take Away from This Book
Chapter 1. Introduction to Data Protection
What Does Data Protection Mean?
A Model for Information, Data, and Storage
Why Is Data Protection Important to the Enterprise?
Data Loss and Business Risk
Connectivity: The Risk Multiplier
Business Continuity: The Importance of Data Availability to Business Operations
The Changing Face of Data Protection
Key Points
Chapter 2. An Overview of Storage Technology
A Quick History of Data Storage
Storage IO Basics
The IO Stack
Direct Attach Storage
Network Attached Storage (NAS)
Storage Area Networks
Extending SANs over MAN and WAN
Key Points
Chapter 3. Backup and Restore
The First Line of Defense
Designing Storage Systems for Backup and Recovery
Recovering from Disaster: Restoring Data
Things That Go Wrong with Restore Operations
Tape Backup
Disk-to-Disk Backup
Disk-to-Disk to Tape
Backup and Restore Practices
Application-Level Backup and Recovery
Case Study: Bingham McCutchen
Key Points
Chapter 4. Remote Copy and Replication: Moving Data to a Safe Location
How Remote Copy and Replication Are Different from Backup
Remote Copy
Design Considerations for Remote Copy
Replication
Case Study: PdMain
Key Points
Chapter 5. Basic Security Concepts
Least Privilege
Security Posture
Defense in Depth
Diversity of Defense
Encryption
Typical Attacks
Key Points
Chapter 6. Storage System Security
The Role of Storage Security in Enterprise Data Protection
DAS Security
SAN Security
Internal and External Vectors
Risk
Security Practices for Storage
Secure Fibre Channel Protocols: FC-SP and FCAP
Case Study: Transend Services
Key Points
Chapter 7. Policy-Based Data Protection
Difficulties with Data Protection Strategies
Data Lifecycle Management (DLM)
Key Points
Chapter 8. Information Lifecycle Management
Information Assurance and Data Protection
What Is Information Lifecycle Management?
Unstructured and Structured Information
The Importance of Context
Determining and Managing Information Context
Location and the Information Perimeter
The Information Lifecycle
An ILM Schema
Matching Information Value to Protection Options
The Changing Value of Information
Regulatory Concerns
Protecting Information Using ILM Policies
Controlling Information Protection Costs
Automating ILM
Case Study: MidAmerica Bank
Key Points
Appendix A. XML Schemas and Document Type Definitions for Policy Statements
Appendix B. Resources
Books Worth Reading
Organizations and Conferences
Web Sites Worth Visiting
Government Documents and Resources
Appendix C. Acronyms
Glossary
Bibliography
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Z
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122
Authors:
Tom Petrocelli
BUY ON AMAZON
Network Security Architectures
Good Network Security Is Predictable
Device Hardening
Layer 2 Security Considerations
Site-to-Site Deployment Examples
Cisco CallManager Fundamentals (2nd Edition)
Case Studies
Troubleshooting
Station Devices
Monitoring Tools
Client Solutions
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Two Principles
Chapter Four Precall Planning and Research
Chapter Seven Diagnose Before You Prescribe
Chapter Eleven Gaining Access to People with Power
Chapter Sixteen Creating and Sustaining High-Performance Sales Cultures
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity I
NFR Security
Policy and Procedures
Laws, Standards, and Organizations
Security Business Issues
An Introduction to Design Patterns in C++ with Qt 4
Derivation from an Abstract Base Class
Point of Departure
Regions and QDockWidgets
Chapter Summary
Edit Form View for FileTagger
GO! with Microsoft Office 2003 Brief (2nd Edition)
Objective 2. Resize, Move, and Scroll Windows
Key Terms
Summary
Objective 2. Use a Form to Add and Delete Records
Objective 5. Move and Copy Text
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies