Data Protection and Information Lifecycle Management
暫譯: 資料保護與資訊生命週期管理
Tom Petrocelli
- 出版商: Prentice Hall
- 出版日期: 2005-09-01
- 售價: $2,040
- 貴賓價: 9.5 折 $1,938
- 語言: 英文
- 頁數: 288
- 裝訂: Paperback
- ISBN: 0131927574
- ISBN-13: 9780131927575
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$590$590 -
$600$510 -
$990$782 -
$890$703 -
$950$751 -
$1,615CCNA Cisco Certified Network Associate Study Guide, 5/e (640-801)
-
$580$452 -
$550$468 -
$690$587 -
$880$695 -
$490$387 -
$560$442 -
$800$760 -
$780$663 -
$650$507 -
$550$435 -
$620$527 -
$450$356 -
$780$616 -
$580$458 -
$1,400$1,330 -
$450$356 -
$880$695 -
$780$663 -
$620$490
商品描述
Description:
The Definitive Guide to Protecting Enterprise Data
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecycle Management, leading industry consultant Tom Petrocelli presents a systematic, coherent approach to planning and implementing cost-effective data protection.
This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy.
Coverage includes
- A complete, unique framework for considering and planning data protection
- Understanding storage technology from the standpoint of data protection
- Architecting more effective backup/restore solutions
- Using remote copy and replication to keep data synchronized and support immediate failover to hot sites
- Leveraging core computer security concepts and strategies to protect your most critical data
- Securing your entire storage infrastructure, not just servers
- Using policy-driven data protection and Data Lifecycle Management (DLM) to improve security and reduce cost
- Using ILM to identify your highest-value data and choose the right ways to protect it
Data Protection and Information Lifecycle Management is an indispensable resource for IT executives who must plan and implement strategies for data protection; administrators who must protect data on a day-to-day basis; and product managers, consultants, and marketers responsible for crafting superior data-security solutions.
Table of Contents:
Acknowledgments.
About the Author.
Preface.
Who Is This Book For?
How This Book Is Arranged.
What You Will Take Away from This Book.
1. Introduction to Data Protection.
What Does Data Protection Mean?
A Model for Information, Data, and Storage.
Why Is Data Protection Important to the Enterprise?
Data Loss and Business Risk.
Connectivity: The Risk Multiplier.
Business Continuity: The Importance of Data Availability to Business Operations.
The Changing Face of Data Protection.
Key Points.
2. An Overview of Storage Technology.
A Quick History of Data Storage.
Storage I/O Basics.
The I/O Stack.
Direct Attach Storage.
Network Attached Storage (NAS).
Storage Area Networks.
Extending SANs over MAN and WAN.
Key Points.
3. Backup and Restore.
The First Line of Defense.
Designing Storage Systems for Backup and Recovery.
Recovering from Disaster: Restoring Data.
Things That Go Wrong with Restore Operations.
Tape Backup.
Disk-to-Disk Backup.
Disk-to-Disk to Tape.
Backup and Restore Practices.
Application-Level Backup and Recovery.
Case Study: Bingham McCutchen.
Key Points.
4. Remote Copy and Replication: Moving Data to a Safe Location.
How Remote Copy and Replication Are Different from Backup.
Remote Copy.
Design Considerations for Remote Copy.
Replication.
Case Study: PdMain.
Key Points.
5. Basic Security Concepts.
Least Privilege.
Defense in Depth.
Diversity of Defense.
Encryption.
Typical Attacks.
Key Points.
6. Storage System Security.
The Role of Storage Security in Enterprise Data Protection.
DAS Security.
SAN Security.
Internal and External Vectors.
Risk.
Security Practices for Storage.
Secure Fibre Channel Protocols: FC-SP and FCAP.
Case Study: Transend Services.
Key Points.
7. Policy-Based Data Protection.
Difficulties with Data Protection Strategies.
Data Lifecycle Management (DLM).
Key Points.
8. Information Lifecycle Management.
Information Assurance and Data Protection.
What Is Information Lifecycle Management?
Unstructured and Structured Information.
The Importance of Context.
Determining and Managing Information Context.
Location and the Information Perimeter.
The Information Lifecycle.
An ILM Schema.
Matching Information Value to Protection Options.
The Changing Value of Information.
Regulatory Concerns.
Protecting Information Using ILM Policies.
Controlling Information Protection Costs.
Automating ILM.
Case Study: MidAmerica Bank.
Key Points.
Appendix A: XML Schemas and Document Type Definitions for Policy Statements.
Appendix B: Resources.
Books Worth Reading.
Organizations and Conferences.
Web Sites Worth Visiting.
Government Documents and Resources.
Appendix C: Acronyms.
Glossary.
Bibliography.
Index.
商品描述(中文翻譯)
描述:
企業數據保護的權威指南
您的企業數據是您最關鍵的資產。如果它受到損害,您的業務可能會遭到摧毀。不要讓這種情況發生——利用當今最先進的策略、最佳實踐和技術來保護您的關鍵信息。在《數據保護與信息生命周期管理》中,業界領先的顧問 Tom Petrocelli 提出了一種系統性、一致性的方法來規劃和實施具有成本效益的數據保護。
本書介紹了信息生命周期管理(ILM),這是一種基於企業信息隨時間變化的價值來管理的強大新策略。作者解釋了保護存儲系統和存儲網絡的新興技術,以及如何將存儲安全性整合到您的整體安全計劃中。他還介紹了改善現有數據保護流程的新技術進展和機會,包括備份/恢復、複製和遠程複製。
內容涵蓋:
- 一個完整、獨特的框架,用於考慮和規劃數據保護
- 從數據保護的角度理解存儲技術
- 設計更有效的備份/恢復解決方案
- 使用遠程複製和複製來保持數據同步並支持立即故障轉移到熱備份站點
- 利用核心計算機安全概念和策略來保護您最關鍵的數據
- 確保整個存儲基礎設施的安全,而不僅僅是伺服器
- 使用基於政策的數據保護和數據生命周期管理(DLM)來改善安全性並降低成本
- 使用 ILM 來識別您最高價值的數據並選擇正確的保護方式
《數據保護與信息生命周期管理》是 IT 高管必不可少的資源,他們必須規劃和實施數據保護策略;日常必須保護數據的管理員;以及負責制定優越數據安全解決方案的產品經理、顧問和市場營銷人員。
目錄:
- 致謝
- 關於作者
- 前言
- 本書適合誰?
- 本書的安排
- 您將從本書中獲得什麼
- 1. 數據保護介紹
- 數據保護的含義
- 信息、數據和存儲的模型
- 為什麼數據保護對企業重要?
- 數據丟失與商業風險
- 連接性:風險的倍增器
- 業務連續性:數據可用性對業務運營的重要性
- 數據保護的變化面貌
- 主要要點
- 2. 存儲技術概述
- 數據存儲的簡史
- 存儲 I/O 基礎
- I/O 堆疊
- 直接附加存儲
- 網絡附加存儲(NAS)
- 存儲區域網絡
- 通過 MAN 和 WAN 擴展 SAN
- 主要要點
- 3. 備份與恢復
- 第一防線
- 為備份和恢復設計存儲系統
- 災難恢復:數據恢復
- 恢復操作中可能出現的問題
- 磁帶備份
- 磁碟對磁碟備份
- 磁碟對磁碟到磁帶
- 備份和恢復實踐
- 應用級備份和恢復
- 案例研究:Bingham McCutchen
- 主要要點
- 4. 遠程複製與複製:將數據移動到安全位置
- 遠程複製和複製與備份的區別
- 遠程複製
- 遠程複製的設計考量
- 複製
- 案例研究:PdMain
- 主要要點
- 5. 基本安全概念
- 最小權限
- 深度防禦
- 防禦的多樣性
- 加密
- 典型攻擊
- 主要要點
- 6. 存儲系統安全
- 存儲安全在企業數據保護中的角色
- DAS 安全
- SAN 安全
- 內部和外部威脅
- 風險
- 存儲的安全實踐
- 安全的光纖通道協議:FC-SP 和 FCAP
- 案例研究:Transend Services
- 主要要點
- 7. 基於政策的數據保護
- 數據保護策略的困難
- 數據生命周期管理(DLM)
- 主要要點
- 8. 信息生命周期管理
- 信息保證與數據保護
- 什麼是信息生命周期管理?
- 非結構化和結構化信息
- 上下文的重要性
- 確定和管理信息上下文
- 位置與信息邊界
- 信息生命周期
- ILM 架構
- 將信息價值與保護選項相匹配