Wonder Club world wonders pyramid logo
×

Data Protection and Information Lifecycle Management Book

Data Protection and Information Lifecycle Management
Data Protection and Information Lifecycle Management, The Definitive Guide to Protecting Enterprise Data
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technol, Data Protection and Information Lifecycle Management has a rating of 2.5 stars
   2 Ratings
X
Data Protection and Information Lifecycle Management, The Definitive Guide to Protecting Enterprise Data Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technol, Data Protection and Information Lifecycle Management
2.5 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
50 %
2
50 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Data Protection and Information Lifecycle Management
  • Written by author Tom Petrocelli
  • Published by Prentice Hall, September 2005
  • The Definitive Guide to Protecting Enterprise Data Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technol
  • The Definitive Guide to Protecting Enterprise DataYour enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologie
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Acknowledgments.

About the Author.

Preface.

Who Is This Book For?

How This Book Is Arranged.

What You Will Take Away from This Book.

1. Introduction to Data Protection.

What Does Data Protection Mean?

A Model for Information, Data, and Storage.

Why Is Data Protection Important to the Enterprise?

Data Loss and Business Risk.

Connectivity: The Risk Multiplier.

Business Continuity: The Importance of Data Availability to Business Operations.

The Changing Face of Data Protection.

Key Points.

2. An Overview of Storage Technology.

A Quick History of Data Storage.

Storage I/O Basics.

The I/O Stack.

Direct Attach Storage.

Network Attached Storage (NAS).

Storage Area Networks.

Extending SANs over MAN and WAN.

Key Points.

3. Backup and Restore.

The First Line of Defense.

Designing Storage Systems for Backup and Recovery.

Recovering from Disaster: Restoring Data.

Things That Go Wrong with Restore Operations.

Tape Backup.

Disk-to-Disk Backup.

Disk-to-Disk to Tape.

Backup and Restore Practices.

Application-Level Backup and Recovery.

Case Study: Bingham McCutchen.

Key Points.

4. Remote Copy and Replication: Moving Data to a Safe Location.

How Remote Copy and Replication Are Different from Backup.

Remote Copy.

Design Considerations for Remote Copy.

Replication.

Case Study: PdMain.

Key Points.

5. Basic Security Concepts.

Least Privilege.

Defense in Depth.

Diversity of Defense.

Encryption.

Typical Attacks.

Key Points.

6. Storage System Security.

The Role of Storage Security inEnterprise Data Protection.

DAS Security.

SAN Security.

Internal and External Vectors.

Risk.

Security Practices for Storage.

Secure Fibre Channel Protocols: FC-SP and FCAP.

Case Study: Transend Services.

Key Points.

7. Policy-Based Data Protection.

Difficulties with Data Protection Strategies.

Data Lifecycle Management (DLM).

Key Points.

8. Information Lifecycle Management.

Information Assurance and Data Protection.

What Is Information Lifecycle Management?

Unstructured and Structured Information.

The Importance of Context.

Determining and Managing Information Context.

Location and the Information Perimeter.

The Information Lifecycle.

An ILM Schema.

Matching Information Value to Protection Options.

The Changing Value of Information.

Regulatory Concerns.

Protecting Information Using ILM Policies.

Controlling Information Protection Costs.

Automating ILM.

Case Study: MidAmerica Bank.

Key Points.

Appendix A:

Appendix B: Resources.

Books Worth Reading.

Organizations and Conferences.

Web Sites Worth Visiting.

Government Documents and Resources.

Appendix C: Acronyms.

Glossary.

Bibliography.

Index.

 


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Data Protection and Information Lifecycle Management, The Definitive Guide to Protecting Enterprise Data
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technol, Data Protection and Information Lifecycle Management

X
WonderClub Home

This item is in your Collection

Data Protection and Information Lifecycle Management, The Definitive Guide to Protecting Enterprise Data
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technol, Data Protection and Information Lifecycle Management

Data Protection and Information Lifecycle Management

X
WonderClub Home

This Item is in Your Inventory

Data Protection and Information Lifecycle Management, The Definitive Guide to Protecting Enterprise Data
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technol, Data Protection and Information Lifecycle Management

Data Protection and Information Lifecycle Management

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: