Data Protection and Information Lifecycle Management
Tom Petrocelli
- 出版商: Prentice Hall
- 出版日期: 2005-09-01
- 售價: $2,010
- 貴賓價: 9.5 折 $1,910
- 語言: 英文
- 頁數: 288
- 裝訂: Paperback
- ISBN: 0131927574
- ISBN-13: 9780131927575
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$590$590 -
$600$510 -
$990$782 -
$890$703 -
$950$751 -
$1,615CCNA Cisco Certified Network Associate Study Guide, 5/e (640-801)
-
$580$452 -
$550$495 -
$690$587 -
$880$581 -
$490$417 -
$560$442 -
$800$760 -
$780$702 -
$650$507 -
$550$468 -
$620$558 -
$450$383 -
$780$616 -
$580$493 -
$1,400$1,330 -
$450$356 -
$880$616 -
$780$702 -
$620$527
相關主題
商品描述
Description:
The Definitive Guide to Protecting Enterprise Data
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecycle Management, leading industry consultant Tom Petrocelli presents a systematic, coherent approach to planning and implementing cost-effective data protection.
This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy.
Coverage includes
- A complete, unique framework for considering and planning data protection
- Understanding storage technology from the standpoint of data protection
- Architecting more effective backup/restore solutions
- Using remote copy and replication to keep data synchronized and support immediate failover to hot sites
- Leveraging core computer security concepts and strategies to protect your most critical data
- Securing your entire storage infrastructure, not just servers
- Using policy-driven data protection and Data Lifecycle Management (DLM) to improve security and reduce cost
- Using ILM to identify your highest-value data and choose the right ways to protect it
Data Protection and Information Lifecycle Management is an indispensable resource for IT executives who must plan and implement strategies for data protection; administrators who must protect data on a day-to-day basis; and product managers, consultants, and marketers responsible for crafting superior data-security solutions.
Table of Contents:
Acknowledgments.
About the Author.
Preface.
Who Is This Book For?
How This Book Is Arranged.
What You Will Take Away from This Book.
1. Introduction to Data Protection.
What Does Data Protection Mean?
A Model for Information, Data, and Storage.
Why Is Data Protection Important to the Enterprise?
Data Loss and Business Risk.
Connectivity: The Risk Multiplier.
Business Continuity: The Importance of Data Availability to Business Operations.
The Changing Face of Data Protection.
Key Points.
2. An Overview of Storage Technology.
A Quick History of Data Storage.
Storage I/O Basics.
The I/O Stack.
Direct Attach Storage.
Network Attached Storage (NAS).
Storage Area Networks.
Extending SANs over MAN and WAN.
Key Points.
3. Backup and Restore.
The First Line of Defense.
Designing Storage Systems for Backup and Recovery.
Recovering from Disaster: Restoring Data.
Things That Go Wrong with Restore Operations.
Tape Backup.
Disk-to-Disk Backup.
Disk-to-Disk to Tape.
Backup and Restore Practices.
Application-Level Backup and Recovery.
Case Study: Bingham McCutchen.
Key Points.
4. Remote Copy and Replication: Moving Data to a Safe Location.
How Remote Copy and Replication Are Different from Backup.
Remote Copy.
Design Considerations for Remote Copy.
Replication.
Case Study: PdMain.
Key Points.
5. Basic Security Concepts.
Least Privilege.
Defense in Depth.
Diversity of Defense.
Encryption.
Typical Attacks.
Key Points.
6. Storage System Security.
The Role of Storage Security in Enterprise Data Protection.
DAS Security.
SAN Security.
Internal and External Vectors.
Risk.
Security Practices for Storage.
Secure Fibre Channel Protocols: FC-SP and FCAP.
Case Study: Transend Services.
Key Points.
7. Policy-Based Data Protection.
Difficulties with Data Protection Strategies.
Data Lifecycle Management (DLM).
Key Points.
8. Information Lifecycle Management.
Information Assurance and Data Protection.
What Is Information Lifecycle Management?
Unstructured and Structured Information.
The Importance of Context.
Determining and Managing Information Context.
Location and the Information Perimeter.
The Information Lifecycle.
An ILM Schema.
Matching Information Value to Protection Options.
The Changing Value of Information.
Regulatory Concerns.
Protecting Information Using ILM Policies.
Controlling Information Protection Costs.
Automating ILM.
Case Study: MidAmerica Bank.
Key Points.
Appendix A: XML Schemas and Document Type Definitions for Policy Statements.
Appendix B: Resources.
Books Worth Reading.
Organizations and Conferences.
Web Sites Worth Visiting.
Government Documents and Resources.
Appendix C: Acronyms.
Glossary.
Bibliography.
Index.
商品描述(中文翻譯)
描述:
保護企業數據的權威指南
您的企業數據是最重要的資產。如果被破壞,您的業務可能會被摧毀。不要讓這種情況發生-利用當今最先進的策略、最佳實踐和技術,保護您的重要信息。在《數據保護和信息生命周期管理》中,領先的行業顧問Tom Petrocelli提出了一種系統性、一致性的方法,以規劃和實施成本效益的數據保護。
本書介紹了信息生命周期管理(ILM),這是一種基於信息價值隨時間變化的強大新策略,用於管理企業信息。作者解釋了保護存儲系統和存儲網絡的新技術,以及將存儲安全性整合到整體安全計劃中的方法。他還介紹了改進現有數據保護流程的新技術進展和機會,包括備份/還原、複製和遠程複製。
內容包括:
- 一個完整獨特的框架,用於考慮和規劃數據保護
- 從數據保護的角度理解存儲技術
- 設計更有效的備份/還原解決方案
- 使用遠程複製和複製來保持數據同步並支持即時故障轉移至熱站
- 利用核心計算機安全概念和策略來保護最重要的數據
- 保護整個存儲基礎設施,而不僅僅是服務器
- 使用基於策略的數據保護和數據生命周期管理(DLM)來提高安全性並降低成本
- 使用ILM識別您的最高價值數據並選擇適當的保護方式
《數據保護和信息生命周期管理》是IT高管必須規劃和實施數據保護策略的不可或缺的資源;它也適用於日常保護數據的管理員;以及負責打造優秀數據安全解決方案的產品經理、顧問和營銷人員。
目錄:
致謝。
關於作者。
前言。
這本書是為誰而寫的?
這本書的組織方式是怎樣的?
您將從這本書中獲得什麼?
1.
數據保護簡介。
數據保護是什麼意思?