Data lifecycles [[electronic resource] ] : managing data for strategic advantage / / Roger Reid, Gareth Fraser-King, W. David Schwaderer
| Data lifecycles [[electronic resource] ] : managing data for strategic advantage / / Roger Reid, Gareth Fraser-King, W. David Schwaderer |
| Autore | Reid Roger (Roger S.) |
| Pubbl/distr/stampa | Chichester, England ; ; Hoboken, NJ, : Wiley, c2007 |
| Descrizione fisica | 1 online resource (270 p.) |
| Disciplina |
005.7
651.8 |
| Altri autori (Persone) |
Fraser-KingGareth
SchwadererW. David <1947-> |
| Soggetto topico |
Database management
Product life cycle Information retrieval Information storage and retrieval systems - Management |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-280-73957-6
9786610739578 0-470-02872-6 0-470-02871-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Data Lifecycles; Contents; Preface; 1 Introducing Utility Computing; 1.1 Real problems and real solutions; 1.1.1 Real issues identified - regulation, legislation and the law; 1.1.2 More regulation, legislation and the law; 1.1.3 Current storage growth; 1.2 New storage management; 1.2.1 What are the things organisations need to consider?; 1.2.2 What does data lifecycle management mean?; 1.2.3 Why is IT lifecycle management important?; 1.2.4 Goals of data lifecycle management; 2 The Changing IT Imperative; 2.1 Introduction to utility computing; 2.2 General market highlights
2.2.1 Current storage growth2.2.2 Enterprises for which DLM is critical; 2.3 Real challenges and opportunities; 2.3.1 Real issues identified; 2.3.2 Data compliance; 2.3.3 Case study in ineffective storage reporting; 2.4 Summary; 3 Being Compliant; 3.1 So what are the regulations?; 3.2 Financial services companies; 3.2.1 Crime in the finance sector; 3.3 Telecommunications companies; 3.4 Utilities companies; 3.5 Public authorities and government; 3.6 Managing data for compliance is just a specialised form of data management; 3.7 Just plain junk data!; 3.8 The bottom line - what is mandated? 3.8.1 Record retention and retrieval3.8.2 Auditable process; 3.8.3 Reporting in real time; 3.8.4 Integrating data management from desktop to data centre to offsite vault; 3.8.5 Challenge - the data dilemma; 4 Data Taxonomy; 4.1 A new data management consciousness level; 4.1.1 De-mystifying data classification; 4.1.2 Defining data classification; 4.1.3 Classification objectives; 4.1.4 Various approaches to data classification; 4.2 Data personification; 4.2.1 Business infrastructure mapping analysis; 4.3 Classification model and framework; 4.4 Customer reporting; 4.4.1 Summary reports 4.4.2 Detailed reports4.4.3 Summary graphs; 4.5 Summary; 5 Email Retention; 5.1 Email management to achieve compliance; 5.2 What is archiving?; 5.2.1 Email archiving requirements; 5.3 How should organisations manage their email records?; 5.4 Email retention policies are for life - not just for Christmas; 5.5 How companies can gain competitive advantage using compliance; 5.5.1 Compliance makes good business sense; 5.6 What laws govern email retention?; 5.6.1 How long do we have to keep email records?; 5.7 Write once, secure against tampering; 5.8 Storage recommendations for email 5.9 Conclusion6 Security; 6.1 Alerting organisations to threats; 6.1.1 Vulnerability identified and early warnings; 6.1.2 Early awareness of vulnerabilities and threats in the wild; 6.1.3 Listening posts; 6.2 Protecting data and IT systems; 6.2.1 Threats blocked using vulnerability signatures to prevent propagation; 6.2.2 Preventing and detecting attacks; 6.2.3 Managing security in a data centre; 6.2.4 Monitoring and identification of systems versus vulnerabilities and policies; 6.2.5 Responding to threats and replicating across the infrastructure 6.2.6 Patches and updates implemented across infrastructure |
| Record Nr. | UNINA-9910143721403321 |
Reid Roger (Roger S.)
|
||
| Chichester, England ; ; Hoboken, NJ, : Wiley, c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Data lifecycles : managing data for strategic advantage / / Roger Reid, Gareth Fraser-King, W. David Schwaderer
| Data lifecycles : managing data for strategic advantage / / Roger Reid, Gareth Fraser-King, W. David Schwaderer |
| Autore | Reid Roger (Roger S.) |
| Pubbl/distr/stampa | Chichester, England ; ; Hoboken, NJ, : Wiley, c2007 |
| Descrizione fisica | 1 online resource (270 p.) |
| Disciplina | 005.74 |
| Altri autori (Persone) |
Fraser-KingGareth
SchwadererW. David <1947-> |
| Soggetto topico |
Database management
Product life cycle Information retrieval Information storage and retrieval systems - Management |
| ISBN |
9786610739578
9781280739576 1280739576 9780470028728 0470028726 9780470028711 0470028718 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Data Lifecycles; Contents; Preface; 1 Introducing Utility Computing; 1.1 Real problems and real solutions; 1.1.1 Real issues identified - regulation, legislation and the law; 1.1.2 More regulation, legislation and the law; 1.1.3 Current storage growth; 1.2 New storage management; 1.2.1 What are the things organisations need to consider?; 1.2.2 What does data lifecycle management mean?; 1.2.3 Why is IT lifecycle management important?; 1.2.4 Goals of data lifecycle management; 2 The Changing IT Imperative; 2.1 Introduction to utility computing; 2.2 General market highlights
2.2.1 Current storage growth2.2.2 Enterprises for which DLM is critical; 2.3 Real challenges and opportunities; 2.3.1 Real issues identified; 2.3.2 Data compliance; 2.3.3 Case study in ineffective storage reporting; 2.4 Summary; 3 Being Compliant; 3.1 So what are the regulations?; 3.2 Financial services companies; 3.2.1 Crime in the finance sector; 3.3 Telecommunications companies; 3.4 Utilities companies; 3.5 Public authorities and government; 3.6 Managing data for compliance is just a specialised form of data management; 3.7 Just plain junk data!; 3.8 The bottom line - what is mandated? 3.8.1 Record retention and retrieval3.8.2 Auditable process; 3.8.3 Reporting in real time; 3.8.4 Integrating data management from desktop to data centre to offsite vault; 3.8.5 Challenge - the data dilemma; 4 Data Taxonomy; 4.1 A new data management consciousness level; 4.1.1 De-mystifying data classification; 4.1.2 Defining data classification; 4.1.3 Classification objectives; 4.1.4 Various approaches to data classification; 4.2 Data personification; 4.2.1 Business infrastructure mapping analysis; 4.3 Classification model and framework; 4.4 Customer reporting; 4.4.1 Summary reports 4.4.2 Detailed reports4.4.3 Summary graphs; 4.5 Summary; 5 Email Retention; 5.1 Email management to achieve compliance; 5.2 What is archiving?; 5.2.1 Email archiving requirements; 5.3 How should organisations manage their email records?; 5.4 Email retention policies are for life - not just for Christmas; 5.5 How companies can gain competitive advantage using compliance; 5.5.1 Compliance makes good business sense; 5.6 What laws govern email retention?; 5.6.1 How long do we have to keep email records?; 5.7 Write once, secure against tampering; 5.8 Storage recommendations for email 5.9 Conclusion6 Security; 6.1 Alerting organisations to threats; 6.1.1 Vulnerability identified and early warnings; 6.1.2 Early awareness of vulnerabilities and threats in the wild; 6.1.3 Listening posts; 6.2 Protecting data and IT systems; 6.2.1 Threats blocked using vulnerability signatures to prevent propagation; 6.2.2 Preventing and detecting attacks; 6.2.3 Managing security in a data centre; 6.2.4 Monitoring and identification of systems versus vulnerabilities and policies; 6.2.5 Responding to threats and replicating across the infrastructure 6.2.6 Patches and updates implemented across infrastructure |
| Record Nr. | UNINA-9911019873903321 |
Reid Roger (Roger S.)
|
||
| Chichester, England ; ; Hoboken, NJ, : Wiley, c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||