skip to content
Data protection and information lifecycle management Preview this item
ClosePreview this item

Data protection and information lifecycle management

Author: Thomas D Petrocelli; Safari Tech Books Online.
Publisher: Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, 2005.
Edition/Format:   Computer file : EnglishView all editions and formats

A guide to protecting enterprise data. It presents a systematic approach to planning and implementing cost-effective data protection. It introduces Information Lifecycle Management (ILM), a powerful  Read more...


(not yet rated) 0 with reviews - Be the first.

More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Material Type: Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Thomas D Petrocelli; Safari Tech Books Online.
OCLC Number: 873802506
Notes: Made available through: Safari Books Online, LLC.
Mode of access: World Wide Web.
Reproduction Notes: Electronic reproduction Available via World Wide Web Boston, MA : Safari.
Description: p. cm S.
Contents: Acknowledgments.About the Author.Preface. Who Is This Book For? How This Book Is Arranged. What You Will Take Away from This Book.1. Introduction to Data Protection. What Does Data Protection Mean? A Model for Information, Data, and Storage. Why Is Data Protection Important to the Enterprise? Data Loss and Business Risk. Connectivity: The Risk Multiplier. Business Continuity: The Importance of Data Availability to Business Operations. The Changing Face of Data Protection. Key Points.2. An Overview of Storage Technology. A Quick History of Data Storage. Storage I/O Basics. The I/O Stack. Direct Attach Storage. Network Attached Storage (NAS). Storage Area Networks. Extending SANs over MAN and WAN. Key Points.3. Backup and Restore. The First Line of Defense. Designing Storage Systems for Backup and Recovery. Recovering from Disaster: Restoring Data. Things That Go Wrong with Restore Operations. Tape Backup. Disk-to-Disk Backup. Disk-to-Disk to Tape. Backup and Restore Practices. Application-Level Backup and Recovery. Case Study: Bingham McCutchen. Key Points.4. Remote Copy and Replication: Moving Data to a Safe Location. How Remote Copy and Replication Are Different from Backup. Remote Copy. Design Considerations for Remote Copy. Replication. Case Study: PdMain. Key Points.5. Basic Security Concepts. Least Privilege. Defense in Depth. Diversity of Defense. Encryption. Typical Attacks. Key Points.6. Storage System Security. The Role of Storage Security in Enterprise Data Protection. DAS Security. SAN Security. Internal and External Vectors. Risk. Security Practices for Storage. Secure Fibre Channel Protocols: FC-SP and FCAP. Case Study: Transend Services. Key Points.7. Policy-Based Data Protection. Difficulties with Data Protection Strategies. Data Lifecycle Management (DLM). Key Points.8. Information Lifecycle Management. Information Assurance and Data Protection. What Is Information Lifecycle Management? Unstructured and Structured Information. The Importance of Context. Determining and Managing Information Context. Location and the Information Perimeter. The Information Lifecycle. An ILM Schema. Matching Information Value to Protection Options. The Changing Value of Information. Regulatory Concerns. Protecting Information Using ILM Policies. Controlling Information Protection Costs. Automating ILM. Case Study: MidAmerica Bank. Key Points.Appendix A: XML Schemas and Document Type Definitions for Policy Statements.Appendix B: Resources. Books Worth Reading. Organizations and Conferences. Web Sites Worth Visiting. Government Documents and Resources.Appendix C: Acronyms.Glossary.Bibliography.Index.
Responsibility: Thomas D. Petrocelli.


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Data protection and information lifecycle management
    a schema:CreativeWork, bgn:ComputerFile ;
   library:oclcnum "873802506" ;
   library:placeOfPublication <> ;
   library:placeOfPublication <> ; # Upper Saddle River, NJ
   schema:about <> ; # Informationsmanagement
   schema:about <> ; # Datensicherung
   schema:about <> ;
   schema:about <> ; # Electronic books / local
   schema:about <> ; # Computer security
   schema:about <> ; # Data protection
   schema:contributor <> ; # Safari Tech Books Online.
   schema:creator <> ; # Thomas D. Petrocelli
   schema:datePublished "2005" ;
   schema:exampleOfWork <> ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <> ;
   schema:name "Data protection and information lifecycle management" ;
   schema:productID "873802506" ;
   schema:publication <> ;
   schema:publisher <> ; # Prentice Hall Professional Technical Reference
   schema:url <> ;
   schema:url <> ;
   wdrs:describedby <> ;

Related Entities

<> # Prentice Hall Professional Technical Reference
    a bgn:Agent ;
   schema:name "Prentice Hall Professional Technical Reference" ;

<> # Safari Tech Books Online.
    a schema:Organization ;
   schema:name "Safari Tech Books Online." ;

<> # Thomas D. Petrocelli
    a schema:Person ;
   schema:familyName "Petrocelli" ;
   schema:givenName "Thomas D." ;
   schema:name "Thomas D. Petrocelli" ;

<> # Upper Saddle River, NJ
    a schema:Place ;
   schema:name "Upper Saddle River, NJ" ;

<> # Electronic books / local
    a schema:Thing ;
   schema:name "Electronic books / local" ;

<> # Computer security
    a schema:Intangible ;
   schema:name "Computer security" ;

<> # Informationsmanagement
    a schema:Intangible ;
   schema:name "Informationsmanagement" ;

    a schema:CreativeWork ;
   schema:isSimilarTo <> ; # Data protection and information lifecycle management

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.