Data Protection and Information Lifecycle Management

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Backup sets

Backup windows     defined     purpose of Backups 2nd 3rd 4th [See also Restoration and recovery]     application-level 2nd 3rd 4th 5th 6th

     case study 2nd

    DAS

         external 2nd

         internal

     defined

     disk-based

     disk-to-disk 2nd 3rd 4th

     disk-to-disk-to-tape 2nd

     full and incremental 2nd

     home systems

     integrity of

     interrupted

     key points 2nd

     LAN-based 2nd 3rd     LAN-free 2nd 3rd 4th

     methods comparison 2nd

     NAS 2nd 3rd

     off-site 2nd

     performance of     problems with 2nd 3rd     remote copy with

     rotating 2nd     RTO and RPO in 2nd     SAN 2nd 3rd 4th 5th 6th     selective 2nd

     server-less 2nd     single-tape     software for 2nd 3rd     storage systems for 2nd 3rd     structured object constraints 2nd     tape 2nd 3rd 4th     vs. archives 2nd

     vs. remote copy and replication 2nd 3rd

Bad media in restore operations 2ndBandwidth     in network restore operations

     in remote copy 2nd 3rd

Basel Accords and Basel Accords II 2nd

Basics of SCSI

Behaviors and policies Bibliography

Bingham McCucthen case study 2nd Biodiversity 2nd

Biometrics Bits Blocks and block I/O 2nd     defined     deterministic behavior for

     in remote copy

Book resources 2nd

Bottom-up policy approach

Breaches

     data loss from 2nd

     DoS attacks from

     unintentional

Buffer overruns

Buffers in disk to disk to tape backups

Building Storage Networks

Bunkering 2nd 3rd

Business continuity

     availability for

     defined Business risk 2nd

Bytes

 < Day Day Up >   

Категории