Flylib.com
Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122
Authors:
Tom Petrocelli
BUY ON AMAZON
Data Protection and Information Lifecycle Management
Table of Contents
Copyright
Acknowledgments
About the Author
Preface
Who Is This Book For?
How This Book Is Arranged
What You Will Take Away from This Book
Chapter 1. Introduction to Data Protection
What Does Data Protection Mean?
A Model for Information, Data, and Storage
Why Is Data Protection Important to the Enterprise?
Data Loss and Business Risk
Connectivity: The Risk Multiplier
Business Continuity: The Importance of Data Availability to Business Operations
The Changing Face of Data Protection
Key Points
Chapter 2. An Overview of Storage Technology
A Quick History of Data Storage
Storage IO Basics
The IO Stack
Direct Attach Storage
Network Attached Storage (NAS)
Storage Area Networks
Extending SANs over MAN and WAN
Key Points
Chapter 3. Backup and Restore
The First Line of Defense
Designing Storage Systems for Backup and Recovery
Recovering from Disaster: Restoring Data
Things That Go Wrong with Restore Operations
Tape Backup
Disk-to-Disk Backup
Disk-to-Disk to Tape
Backup and Restore Practices
Application-Level Backup and Recovery
Case Study: Bingham McCutchen
Key Points
Chapter 4. Remote Copy and Replication: Moving Data to a Safe Location
How Remote Copy and Replication Are Different from Backup
Remote Copy
Design Considerations for Remote Copy
Replication
Case Study: PdMain
Key Points
Chapter 5. Basic Security Concepts
Least Privilege
Security Posture
Defense in Depth
Diversity of Defense
Encryption
Typical Attacks
Key Points
Chapter 6. Storage System Security
The Role of Storage Security in Enterprise Data Protection
DAS Security
SAN Security
Internal and External Vectors
Risk
Security Practices for Storage
Secure Fibre Channel Protocols: FC-SP and FCAP
Case Study: Transend Services
Key Points
Chapter 7. Policy-Based Data Protection
Difficulties with Data Protection Strategies
Data Lifecycle Management (DLM)
Key Points
Chapter 8. Information Lifecycle Management
Information Assurance and Data Protection
What Is Information Lifecycle Management?
Unstructured and Structured Information
The Importance of Context
Determining and Managing Information Context
Location and the Information Perimeter
The Information Lifecycle
An ILM Schema
Matching Information Value to Protection Options
The Changing Value of Information
Regulatory Concerns
Protecting Information Using ILM Policies
Controlling Information Protection Costs
Automating ILM
Case Study: MidAmerica Bank
Key Points
Appendix A. XML Schemas and Document Type Definitions for Policy Statements
Appendix B. Resources
Books Worth Reading
Organizations and Conferences
Web Sites Worth Visiting
Government Documents and Resources
Appendix C. Acronyms
Glossary
Bibliography
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Z
Data Protection and Information Lifecycle Management
ISBN: 0131927574
EAN: 2147483647
Year: 2005
Pages: 122
Authors:
Tom Petrocelli
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
The Goals and Objectives of a Risk Assessment
Compiling the Needed Documentation
What Do Attackers Do?
Appendix C. Security Assessment Sample Report
Appendix E. SIRT Team Report Format Template
Visual C# 2005 How to Program (2nd Edition)
Self-Review Exercises
Wrap-Up
Summary
Summary
C.2. Breakpoints and the Continue Command
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 210 Branch Circuits
Article 396 Messenger Supported Wiring
Article 504 Intrinsically Safe Systems
Article 701 Legally Required Standby Systems
Example No. D5(b) Optional Calculation for Multifamily Dwelling Served at 208Y/120 Volts, Three Phase
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Wire and Cable Basics
Planning a Structured Wiring Installation
Designing and Installing Distributed Audio Systems
Troubleshooting Audio Systems
Installing a Home Security System
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Handling WMI Events
The WMI Schema
WMI Providers
WMI Security
GDI+ Programming with C#
Your First GDI+ Application
The GDI+Painter Application
Manipulating Images
Printing
Printing Multiple Pages
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies