
Data Protection and Information Lifecycle Management
Storage Security - Information Assurance - Remote Data Movement - Archive and Backup
Tom Petrocelli - Collection Security
Résumé
The Definitive Guide to Protecting Enterprise Data
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecycle Management, leading industry consultant Tom Petrocelli presents a systematic, coherent approach to planning and implementing cost-effective data protection.
This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy.
Coverage includes
- A complete, unique framework for considering and planning data protection
- Understanding storage technology from the standpoint of data protection
- Architecting more effective backup/restore solutions
- Using remote copy and replication to keep data synchronized and support immediate failover to hot sites
- Leveraging core computer security concepts and strategies to protect your most critical data
- Securing your entire storage infrastructure, not just servers
- Using policy-driven data protection and Data Lifecycle Management (DLM) to improve security and reduce cost
- Using ILM to identify your highest-value data and choose the right ways to protect it
Data Protection and Information Lifecycle Management is an indispensable resource for IT executives who must plan and implement strategies for data protection; administrators who must protect data on a day-to-day basis; and product managers, consultants, and marketers responsible for crafting superior data-security solutions.
L'auteur - Tom Petrocelli
Tom Petrocelli is president and chief analyst at Technology Alignment Partners, Inc., and is a recognized expert in data protection issues, especially those involving data movement and security. He has published articles in nearly all of the major data storage industry publications and speaks frequently at major industry conferences and events, including Storage Networking World. A twenty-year veteran of the IT industries, he has held technical, marketing, product management, and business development responsibilities.
Sommaire
- Acknowledgments
- About the Author
- Preface
- Introduction to Data Protection
- An Overview of Storage Technology
- Backup and Restore
- Remote Copy and Replication: Moving Data to a Safe Location
- Basic Security Concepts
- Storage System Security
- Policy-Based Data Protection
- Information Lifecycle Management
- Appendix A: XML Schemas and Document Type Definitions for Policy Statements
- Appendix B: Resources
- Appendix C: Acronyms
- Glossary
- Bibliography
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Prentice Hall |
Auteur(s) | Tom Petrocelli |
Collection | Security |
Parution | 14/12/2005 |
Nb. de pages | 256 |
Format | 17,5 x 23,5 |
Couverture | Broché |
Poids | 552g |
Intérieur | Noir et Blanc |
EAN13 | 9780131927575 |
ISBN13 | 978-0-13-192757-5 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Bases de données Conception et modélisation UML
- Informatique Bases de données Conception et modélisation Merise
- Informatique Informatique d'entreprise Management des systèmes d'information
- Informatique Informatique d'entreprise Knowledge management
- Informatique Informatique d'entreprise Data warehouse et data mining
- Informatique Informatique d'entreprise Sécurité
- Informatique Développement d'applications Gestion de projets
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Protocoles et standards PKI
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet