Data Protection and Information Lifecycle Management

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Packet filtering

Parallel ATA 2nd Parallel SCSI 2nd 3rd 4thPasswords     in authentication 2nd     in encryption

Path width in parallel SCSI

Paths of information 2nd 3rd

PdMain case study

Peer to Peer Remote Copy (PPRC) 2nd

Performance

     cost of

     of backups

     of restoring data

Perimeter defense 2nd

Persistent storage

PGP (Pretty Good Privacy) 2nd

Photographs, ILM for

Point-in-time backups 2nd

Point-to-point FC topology 2ndPolicies

     defined

     in ILM 2nd

Policy engines

     defined     in DLM     in ILM

Policy-based data protection 2nd     characteristics of 2nd     DLM 2nd 3rd 4th 5th 6th 7th     failures in 2nd

     guidelines for 2nd 3rd     key points     languages for     sample policy 2nd 3rd 4th Policy-driven managementPort blocking     in FC

     in packet filtering

Port zoning in FC 2nd Port-level access controlPostures

     access control

     security 2nd 3rd

PPRC (Peer to Peer Remote Copy) 2nd

Pretty Good Privacy (PGP) 2nd Privacy, ILM for

Private keys Processes, policies for 2nd

Productivity, data protection forProgramming errors     exploited 2nd     in SCSI 2nd Propagation delay

Provisioning in SANs

Proxies

Public Company Accounting Board

Public keys

 < Day Day Up >   

Категории