Data Protection and Information Lifecycle Management

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

I/O (Input/Output)

     access time     basics 2nd     data access     defined I/O stack 2nd 3rd

     block I/O

     file I/O

     raid 2nd 3rd 4th

IDE/ATA storage protocols 2nd

IDSs (Intrusion Detection Systems)

iFCP (Internet Fibre Channel Protocol)

ILM [See Information life cycle management (ILM)]

ILM Summit

Image copies 2nd

Images, ILM for

Implicit context

INCITS (International Committee on Information Technology Standards)

Incremental backups 2nd 3rd

Inference engines 2ndInformation

     defined

     location paths of 2nd 3rd

     models 2nd

     transformations Information assurance 2nd 3rd 4th Information life cycle management (ILM) 2nd 3rd 4th

     automating 2nd         auditing and tracking in         content addressed storage in 2nd         information movers in

         policy engines for         search and classification engines for     benefits of     case study 2nd    context in [See Context]     defined     general model for 2nd 3rd

     information perimeter 2nd

     information protection costs 2nd     information value in 2nd         changes 2nd 3rd

         matching 2nd

     key points 2nd

     life and death of information in 2nd

     misconceptions 2nd     paths in 2nd 3rd

     policies in 2nd     purpose of 2nd 3rd

     regulatory concerns 2nd 3rd     schema 2nd 3rd     unstructured and structured information in 2nd Information Lifecycle Management Initiative Information management layer

Information movers

Information value in ILM 2nd

Initiators in SCSI 2nd

Inside intruders

Integrity

     of backups

     of data

Intelligent storage switches

Internal DAS backups

Internal vectors in storage system security 2nd 3rd

International Committee on Information Technology Standards (INCITS)

Internet Fibre Channel Protocol (iFCP)

Interrupted backups

Intruders Intrusion Detection Systems (IDSs)

Intrusion Response Systems (IRSs)

IP

     connection management in 2nd

     FC over 2nd IP SANs: An Introduction to iSCSI, iFCP, and FCIP Protocols for Storage Area NetworksIP-based SANS

     extending     vulnerabilities 2nd 3rd 4th 5th     working with 2nd IPSEC

IRSs (Intrusion Response Systems) iSCSI     authentication in     defined     firewalls with 2nd Isolation in FC 2nd IT (information technology)

 < Day Day Up >   

Категории