Data protection and information lifecycle management

Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecyc...

Full description

Saved in:
Bibliographic Details
Main Author: Petrocelli, Thomas D.
Format: Unknown
Published: Upper Saddle River, NJ Prentice Hall Professional Technical Reference 2006
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000n a2200000 a 4501
001 wils-421304
005 2020320162326
020 # # |a 0131927574 
020 # # |a 9780131927575 
040 # # |a DLC  |d ITMB 
090 0 0 |a QA76.9.A25  |b P53 2006 
100 1 # |a Petrocelli, Thomas D. 
245 1 0 |a Data protection and information lifecycle management  |c Tom Petrocelli 
260 # # |a Upper Saddle River, NJ  |b Prentice Hall Professional Technical Reference  |c 2006 
300 # # |a xviii, 256 p.  |b ill.  |c 24 cm 
504 # # |a Includes bibliographical references (p. 239) and index 
520 # # |a Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecycle Management , leading industry consultant Tom Petrocelli presents a systematic, coherent approach to planning and implementing cost-effective data protection. This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy. 
650 # 0 |a Computer security 
650 # 0 |a Data protection 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=421304 
964 # # |c BOK  |d IM 
998 # # |a 00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2||