Data protection and information lifecycle management
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecyc...
Saved in:
Main Author: | |
---|---|
Format: | Unknown |
Published: |
Upper Saddle River, NJ
Prentice Hall Professional Technical Reference
2006
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000n a2200000 a 4501 | ||
---|---|---|---|
001 | wils-421304 | ||
005 | 2020320162326 | ||
020 | # | # | |a 0131927574 |
020 | # | # | |a 9780131927575 |
040 | # | # | |a DLC |d ITMB |
090 | 0 | 0 | |a QA76.9.A25 |b P53 2006 |
100 | 1 | # | |a Petrocelli, Thomas D. |
245 | 1 | 0 | |a Data protection and information lifecycle management |c Tom Petrocelli |
260 | # | # | |a Upper Saddle River, NJ |b Prentice Hall Professional Technical Reference |c 2006 |
300 | # | # | |a xviii, 256 p. |b ill. |c 24 cm |
504 | # | # | |a Includes bibliographical references (p. 239) and index |
520 | # | # | |a Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecycle Management , leading industry consultant Tom Petrocelli presents a systematic, coherent approach to planning and implementing cost-effective data protection. This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy. |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Data protection |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=421304 |
964 | # | # | |c BOK |d IM |
998 | # | # | |a 00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2|| |