دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: امنیت ویرایش: 2 نویسندگان: Preston de Guise سری: ISBN (شابک) : 0367256770, 9780367474102 ناشر: CRC Press/Taylor & Francis Group سال نشر: 2020 تعداد صفحات: 423 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 103 مگابایت
کلمات کلیدی مربوط به کتاب حفاظت از داده ها: اطمینان از در دسترس بودن داده ها: شبکه های کامپیوتری: اقدامات امنیتی، حفاظت از داده ها
در صورت تبدیل فایل کتاب Data Protection: Ensuring Data Availability به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب حفاظت از داده ها: اطمینان از در دسترس بودن داده ها نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
ویرایش دوم حفاظت از داده ها فراتر از موضوعات سنتی از جمله کپی برداری، در دسترس بودن مداوم، عکس های فوری، تکرار، پشتیبان گیری و بازیابی است و ملاحظات دیگری مانند مسائل حقوقی، حریم خصوصی و اخلاقی را بررسی می کند. مدل جدیدی برای درک و برنامه ریزی جنبه های مختلف حفاظت از داده ها ارائه شده است که برای توسعه استراتژی های کل نگر ضروری است. نسخه دوم همچنین به Cloud و پذیرش رو به رشد نرم افزار و عملکرد به عنوان یک سرویس می پردازد و همچنین به طور موثر برای طول عمر یک حجم کاری برنامه ریزی می کند که بهترین ترکیبی از خدمات حفاظت از داده های سنتی و بومی ابری ممکن است باشد. مجازیسازی همچنان چالشهای جدیدی را برای حفاظت از دادهها ارائه میکند و تأثیر کانتینریسازی مورد بررسی قرار میگیرد. این کتاب رویکردی جامع و مبتنی بر کسبوکار برای حفاظت از دادهها دارد. این توضیح می دهد که چگونه حفاظت از داده ها ترکیبی از برنامه ریزی، فناوری و فعالیت های فعال و فعال است که امکان تداوم داده ها را فراهم می کند. سه فعالیت اساسی وجود دارد که خود را حفاظت از داده ها می نامند. در حالی که همه آنها از نظر دامنه و عملکرد با هم همپوشانی دارند، هر یک به عنوان زمینه های منطقی مستقل با متخصصان و نام دامنه خود عمل می کنند. این سه فعالیت عبارتند از: حفاظت از داده ها به عنوان یک فعالیت ذخیره سازی و بازیابی حفاظت از داده ها به عنوان یک فعالیت امنیتی حفاظت از داده ها به عنوان یک فعالیت حریم خصوصی این فعالیت ها به طور مفصل پوشش داده شده اند، با تمرکز بر اینکه چگونه سازمان ها می توانند از آنها برای افزایش سرمایه گذاری های فناوری اطلاعات خود و بهینه سازی هزینه ها استفاده کنند. این کتاب همچنین توضیح میدهد که چگونه حفاظت از دادهها به عاملی برای فرآیندهای جدید در مورد انتقال دادهها و پردازش داده تبدیل میشود. این کتاب خوانندگان را با اطلاعات حیاتی برای تصمیم گیری در مورد نحوه محافظت از داده ها در برابر از دست دادن در فضای ابری، در محل یا در ترکیبی از این دو، مسلح می کند. این تغییر چهره بازیابی در یک مرکز داده بسیار مجازی شده و تکنیک های مقابله با کلان داده را توضیح می دهد. علاوه بر این، مدلی را ارائه میکند که در آن فرآیندهای بازیابی دادهها را میتوان با مدیریت و مدیریت فناوری اطلاعات ادغام کرد تا تمرکز مناسبی بر قابلیت بازیابی در سراسر کسبوکار حاصل شود.
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the various aspects of data protection, which is essential to developing holistic strategies. The second edition also addresses the Cloud and the growing adoption of software and function as a service, as well as effectively planning over the lifespan of a workload what the best mix of traditional, and cloud native data protection services might be. Virtualization continues to present new challenges to data protection, and the impact of containerization is examined. The book takes a holistic, business-based approach to data protection. It explains how data protection is a mix of proactive and reactive planning, technology and activities that allow for data continuity. There are three essential activities that refer to themselves as data protection; while they all overlap in terms of scope and function, each operate as reasonably self-contained fields with their own specialists and domain nomenclature. These three activities are: Data protection as a storage and recovery activity Data protection as a security activity Data protection as a privacy activity These activities are covered in detail, with a focus on how organizations can use them to leverage their IT investments and optimize costs. The book also explains how data protection is becoming an enabler for new processes around data movement and data processing. This book arms readers with information critical for making decisions on how data can be protected against loss in the cloud, on-premises, or in a mix of the two. It explains the changing face of recovery in a highly virtualized data center and techniques for dealing with big data. Moreover, it presents a model for where data recovery processes can be integrated with IT governance and management in order to achieve the right focus on recoverability across the business.
Cover Half Title #2,0,-32767Title Page Copyright Page #5,0,-32767Dedication #6,0,-32767Table of Contents #8,0,-32767Preface #20,0,-32767Chapter 1 Introduction 1.1 The Value of Data 1.2 The Lay of the Land 1.3 What Are You Doing Here? 1.4 What’s Changed in the Datacenter? 1.5 What Is Data Protection? 1.5.1 Data Protection as a Security Activity 1.5.2 Data Protection as a Privacy Activity 1.5.3 Data Protection as a Storage/Recovery Activity 1.6 Key Challenges 1.6.1 The Rise of Unstructured Data 1.6.2 Big Data 1.6.3 Cloud 1.6.4 Virtualization 1.6.5 Containers and Functions 1.6.6 Data and Systems Complexity 1.6.7 The Law 1.6.8 Crime 1.7 A Brief History of Data Protection 1.8 The Miserly Hoarder 1.9 Summary 1.10 Self-Reflection Personal Data Business Data Chapter 2 Contextualizing Data Protection 2.1 Introduction 2.2 Data Classification 2.2.1 What Is the Data? 2.2.2 Where Is the Data? 2.2.3 Who Uses the Data? 2.2.4 When Is the Data Used? 2.2.5 How Is the Data Used? 2.2.6 Summarizing Data Classification 2.3 Protection Methodology 2.4 Protection vs Regeneration 2.5 Organizational Change 2.6 Summary 2.7 Self-Reflection Chapter 3 Data Lifecycle 3.1 Introduction 3.2 Understanding Copy Proliferation 3.3 Archiving and Deleting 3.4 Summary 3.5 Self-Reflection Chapter 4 Elements of a Protection System 4.1 Introduction 4.2 People 4.2.1 Designers 4.2.2 Operators 4.2.3 End Users 4.2.4 Data Protection Team 4.3 Training 4.4 Documentation and Processes 4.4.1 Design 4.4.2 Implementation 4.4.2.1 System Configuration Guide 4.4.2.2 System Map 4.5 Testing 4.5.1 Type Testing 4.5.2 Informal vs Formal 4.5.2.1 Test Procedure 4.5.2.2 Test Register 4.5.2.3 Test Schedule 4.5.3 Performance Testing 4.5.4 Test Risks 4.5.5 Automated Testing 4.5.6 What Is a Test? 4.6 Service Level Agreements 4.7 Technology 4.8 Summary 4.9 Self-Reflection Chapter 5 IT Governance and Data Protection 5.1 Introduction 5.2 Architecture 5.2.1 The FARR Model of Data Protection 5.2.1.1 Fault Tolerance 5.2.1.2 Availability 5.2.1.3 Redundancy 5.2.1.4 Recoverability 5.2.1.5 Tying the FARR Model Together 5.2.2 Data Protection Architect (DPA) 5.3 Service Transition 5.4 Change Management 5.5 Summary 5.6 Self-Reflection Chapter 6 Monitoring and Reporting 6.1 Introduction 6.2 Monitoring 6.2.1 Security and Privacy 6.2.2 Health 6.2.2.1 Drive Failures and Recovery Time 6.2.2.2 Broader Uses of MTBF and MTTR 6.2.3 Capacity 6.2.3.1 RAID/Data Storage 6.2.3.2 Snapshots 6.2.3.3 Replication 6.2.3.4 Backup and Recovery 6.2.4 Performance 6.2.5 Notifications versus Dashboards 6.3 Reporting 6.3.1 Reporting via Aggregation of Monitoring 6.3.2 Reporting for Trending and Predictive Planning 6.3.3 Automated Reporting 6.4 Summary 6.5 Self-Reflection Chapter 7 Business Continuity 7.1 Introduction 7.2 Business versus IT Functions 7.3 Risk versus Cost 7.4 Planning Data Protection Strategies and Service Level Agreements 7.5 Summary 7.6 Self-Reflection Chapter 8 Data Discovery 8.1 Introduction 8.2 What Will Be Protected? 8.3 Data Gravity 8.4 Shades of Data 8.5 Indexing 8.6 Summary 8.7 Self-Reflection Chapter 9 Security, Privacy, Ethical, and Legal Considerations 9.1 Introduction 9.2 Security and Privacy 9.2.1 Logging 9.2.2 Encryption 9.2.3 Access Controls 9.2.3.1 Multi-tenancy 9.2.3.2 General User Controls 9.2.3.3 Security Officers versus Service Administrator 9.2.3.4 Do You Trust Trusted Access? 9.2.4 Standard Security Controls 9.2.4.1 Hardening Protocols 9.2.4.2 Secure Physical Access 9.2.4.3 Physical Data transport 9.2.5 Secure Erasure 9.2.6 Privacy Considerations 9.3 Ethical Considerations 9.3.1 Performance of Duties 9.3.2 Custodians of Data 9.3.3 Implications of Non-Protection 9.3.4 Why Do We Care about Ethical Obligations? 9.4 Legal Considerations 9.4.1 Knowing Your Retention Requirements 9.4.1.1 Overview 9.4.1.2 Sarbanes–Oxley Act 2002 9.4.1.3 Mandatory Records Retention 9.4.2 European Union GDPR 9.4.3 PCI DSS 9.4.4 US Sheltered Harbor 9.4.5 Data Separation 9.4.6 In-Flight and At-Rest Encryption 9.4.7 Mandatory Breach Reporting 9.5 Summary 9.6 Self-Reflection Chapter 10 Continuous Availability, Replication, and CDP 10.1 Introduction 10.1.1 What’s a Few Nines between Friends? 10.1.2 Data Protection and Reliability 10.2 Continuous Availability 10.2.1 Clustering 10.2.2 Continuous Availability as a Virtualization Function 10.2.3 Continuous Availability as a Storage Function 10.2.4 A Combined Approach to Continuous Availability 10.3 Replication 10.3.1 Synchronous Replication 10.3.2 Asynchronous Replication 10.4 Continuous Data Protection 10.4.1 CDP as a Storage Function 10.4.2 CDP as a Virtualization Function 10.4.3 File Versioning 10.5 Summary 10.6 Self-Reflection Chapter 11 Snapshots 11.1 Introduction 11.2 Snapshot Techniques 11.2.1 Copy on First Write 11.2.2 Copy on First Access 11.2.3 Redirect on Write 11.3 Crash-Consistent versus Application-Consistent Snapshots 11.4 Read-Only Versus Read/Write Snapshots 11.5 Integration Points in Holistic Data Protection 11.6 Operational versus Long-Term Retention for Snapshots 11.7 Summary 11.8 Self-Reflection Chapter 12 Backup and Recovery 12.1 Introduction 12.2 Backup and Recovery Concepts 12.2.1 Host Nomenclature 12.2.2 Backup Topology 12.2.2.1 Decentralized 12.2.2.2 Centralized 12.2.2.3 Hybrid/Modular Topology 12.2.2.4 Embedded Topology 12.2.3 Backup Levels 12.2.3.1 Full Backups 12.2.3.2 Incremental Backups 12.2.3.3 Differential-Level Backups 12.2.3.4 Synthetic Full Backups 12.2.3.5 Virtual Synthetic Fulls 12.2.3.6 Manual Backups 12.2.3.7 Skipping Backups 12.2.3.8 Full Once, Incrementals Forever 12.2.4 Data Availability 12.2.4.1 Offline Backups 12.2.4.2 Online Backups 12.2.4.3 Snapshot Backups 12.2.5 Data Selection Types 12.2.5.1 Inclusive Backups 12.2.5.2 Exclusive Backups 12.2.6 Backup Retention Strategies 12.2.6.1 Dependency-Based Retention 12.2.6.2 Simple Retention Model 12.2.6.3 Manual Backups, Revisited 12.3 Recovery Approaches 12.3.1 Recovery Types 12.3.1.1 Aggregated Filesystem View 12.3.1.2 Last Filesystem View 12.3.1.3 Point in Time Recoveries 12.3.1.4 Destructive Recoveries 12.3.1.5 Non-Indexed Recovery 12.3.1.6 Incremental Recovery 12.3.2 Recovery Locality 12.3.2.1 Local Recovery 12.3.2.2 Server-Initiated Recovery 12.3.2.3 Directed Recovery 12.4 Client Impact 12.4.1 Server-Based Backups 12.4.2 Serverless Backups 12.4.3 Convergent Data Protection 12.5 Database Backups 12.5.1 Cold Database Backups 12.5.2 Hot and Online Backups 12.5.3 Database Export Backup 12.6 Backup Initiation Methods 12.7 Job Concurrency 12.7.1 Server Concurrency 12.7.2 Client Concurrency 12.7.3 Device Concurrency 12.8 Network Data Management Protocol 12.9 Miscellaneous Enterprise Features 12.9.1 Pre- and Post-Processing 12.9.2 Arbitrary Command Execution 12.9.3 Cluster Support 12.9.4 Client Collections 12.9.5 Backup Segregation 12.9.6 Granular Backup Control 12.9.7 Backup Schedule Overrides 12.9.8 Security 12.9.9 Duplication and Migration 12.9.10 Alerts 12.9.11 Command Line Interface and REST APIs 12.9.12 Backup Catalogs 12.10 Conflicting SLAs for Backup Systems Design 12.11 Summary 12.12 Self-Reflection Chapter 13 Deduplication 13.1 Introduction 13.2 Key Architectural Aspects of Deduplication 13.2.1 Inline versus Post-Processing 13.2.2 Variable versus Fixed Block Size Deduplication 13.2.3 Segment Size 13.2.4 Source versus Target Deduplication 13.2.5 Deduplication Pool Size 13.3 What Does and Doesn’t Deduplicate? 13.4 Cost Considerations 13.5 Deduplication Considerations for Data Protection in Primary Storage 13.6 Deduplication Considerations for Data Protection in Backup and Recovery Systems 13.6.1 The Case for Deduplication 13.6.2 Revisiting Source versus Target Deduplication 13.6.3 Advanced Deduplication Features 13.7 Deduplication Capacity Management 13.8 Cleaning Operations 13.9 Summary 13.10 Self-Reflection Chapter 14 The Cloud 14.1 Introduction 14.2 Data Protection Risks in the Public Cloud 14.2.1 Should the Workload Be There? 14.2.2 Is the Workload Secured? 14.2.3 Is the Workload Protected? 14.2.4 What Is the Exit Strategy? 14.3 The Rise of Shadow IT 14.4 Public Clouds and Availability 14.4.1 What’s a Few Nines between Friends (Redux)? 14.4.2 Data Loss versus Accessibility Loss 14.4.3 Objectives and Agreements 14.4.4 Cascaded Providers 14.4.5 Cloud as Another Datacenter 14.4.6 The FARR Model Applies to Cloud 14.5 Cloud Native Protection 14.5.1 Cloud Snapshots 14.5.2 Holistic Data Protection Services 14.5.3 Converting Snapshots to Backups 14.5.4 Long-Term Retention and Cloud Native 14.6 Protecting SaaS Systems 14.7 PaaS Protection 14.8 Data Protection for FaaS 14.9 Data Protection for IaaS 14.9.1 Built-in Approach 14.9.2 Self-Service Approach 14.10 Private and Hybrid Clouds 14.10.1 Private Clouds 14.11 Hybrid Cloud 14.12 Extending Data Protection into the Cloud 14.13 Backup as a Service 14.14 Disaster Recovery as a Service 14.15 Architectural Considerations for Cloud Service Providers 14.16 Summary 14.17 Self-Reflection Chapter 15 Protecting Virtual Infrastructure 15.1 Introduction 15.2 Snapshots 15.3 Replication 15.4 Backup and Recovery 15.4.1 Image-Level versus In-Guest Backup 15.4.2 Virtualized Database Backups 15.4.3 Recovery Options 15.4.4 The Long-Term Retention Conundrum 15.4.5 Virtualizing the Backup Infrastructure 15.5 Containers and Data Protection 15.6 Summary 15.7 Self-Reflection Chapter 16 Big Data 16.1 Introduction 16.2 Protecting within the Big Data Environment 16.3 Big Data That Isn’t Big Data 16.4 Using Data Protection Storage in a Big Data Environment 16.5 Summary 16.6 Self-Reflection Chapter 17 Protecting the Edge 17.1 Introduction 17.2 Laptop and Desktop Protection 17.2.1 Using Enterprise Backup and Recovery Systems 17.2.2 Local Systems Protection 17.2.3 Is Cloud Backup the Answer? 17.2.4 Is Cloud Storage the Answer? 17.2.5 Replicating to a Central Server 17.2.6 Summary of Laptop/Desktop Backup Options 17.3 Smartphones and Tablets 17.4 Protecting Internet of Things 17.5 The Branch Office/Remote Office Conundrum 17.6 Summary 17.7 Self-Reflection Chapter 18 Data Storage Fault Tolerance 18.1 Introduction 18.2 Traditional RAID 18.2.1 RAID-1 18.2.2 RAID-5 18.2.3 RAID-4 18.2.4 RAID-6 18.3 Nested RAID 18.4 Sub-drive RAID 18.4.1 Capacity-Optimized Sub-drive RAID 18.4.2 Scattered RAID 18.5 Object-Level Protection 18.5.1 Geo-Distribution 18.5.2 Erasure Coding 18.6 Summary 18.7 Self-Reflection Chapter 19 Tape 19.1 Introduction: The Historical Primacy of Tape 19.2 Hierarchical Storage Management and Archive 19.3 Backup and Recovery 19.3.1 Media Spanning 19.3.2 Rapid Data Access 19.3.3 Media Multiplexing 19.3.4 Twinning/Automated Replication 19.3.5 Library/SAN Sharing 19.3.6 Dynamic Drive Sharing 19.3.7 Library Partitioning 19.3.8 Physical Media Management 19.4 Decline of Tape 19.4.1 HSM and Archive 19.4.2 Backup and Recovery 19.4.2.1 Disk-to-Disk-to-Tape 19.4.2.2 Disk-to-Disk-to-Disk 19.4.2.3 Disk-to-Disk-to-Cloud 19.5 Do Unmanaged Tapes Provide Protection? 19.6 Is Tape a Ransomware Shield? 19.7 Legal Challenges for Tape 19.8 Considerations When Migrating Away from Tape 19.8.1 Cost-per-GB 19.8.2 Disk-to-Disk-to-Tape Isn’t Always an Efficient Start 19.8.3 Removing Tape Can Remove Complexity 19.8.4 Disk Will Wait 19.8.5 Disk Is Not a Silver Bullet 19.8.6 Disk Is Online 19.8.7 Deduplication Is Not Deduplication Is Not Deduplication 19.9 Summary 19.10 Self-Reflection Chapter 20 Converged Infrastructure 20.1 Introduction 20.2 Protecting Converged Systems 20.3 Protection Compatibility 20.4 What Will Be Protected? (Redux) 20.5 Converged Staff 20.6 Summary Chapter 21 Data Protection Service Catalogs 21.1 Introduction 21.2 Key Requirements for a Service Catalog 21.2.1 Utility 21.2.2 Measurable 21.2.3 Achievable 21.2.4 Distinct 21.2.5 Costed 21.2.6 Priced 21.2.7 Repeatable 21.3 Service Catalog Tiers and Options 21.3.1 Service Catalog Based on Application Type 21.3.2 Service Catalog Independent of Application Type 21.3.3 Service Catalog Options per Data Protection Activity 21.4 Retention Multiplier 21.5 Including Service Level Agreements in Service Catalogs 21.6 Building a Data Protection Service Catalog 21.7 Summary 21.8 Self-Reflection Chapter 22 Holistic Data Protection Strategies 22.1 Introduction 22.2 Examples of Holistic Data Protection Strategies 22.2.1 Large NAS Protection 22.2.2 Virtual Machine Protection 22.2.3 Mission Critical Database Protection 22.3 Planning Holistic Data Protection Strategies 22.4 Summary 22.5 Self-Reflection Chapter 23 Making Data Protection Smarter 23.1 Introduction 23.2 Secondary Use Cases for Protected Data 23.3 Data Protection Overlap 23.4 Automated Processes 23.5 Adaptive Processes 23.6 Summary Chapter 24 Data Recovery 24.1 Introduction 24.2 Recovery versus Service Restoration 24.3 On-Platform versus Off-Platform Recovery 24.4 Context Aware Recoveries 24.5 Designing for Recovery 24.6 Recovery Facilitation 24.6.1 Automated versus Manual Recoveries 24.6.2 Who Performs the Recovery? 24.6.3 Frequency of Recovery 24.6.4 Recency of Data Protection 24.7 Recovery Procedures and Recommendations 24.7.1 Read the Documentation before Starting a Recovery 24.7.2 Choosing the Correct Recovery Location 24.7.3 Provide an Estimate of How Long the Recovery Will Take 24.7.4 Provide Updates during Recoveries 24.7.5 Don’t Assume a Recovery Can Be Done If It Hasn’t Been Tested 24.7.6 Run Recoveries from Sessions That Can Be Disconnected from/Reconnected To 24.7.7 Remember Quantum Physics 24.7.8 Be Patient 24.7.9 Document the Current Status of the Recovery 24.7.10 Note Errors, and What Led to Them 24.7.11 Don’t Assume the Recovery Is an Exam 24.7.12 Ensure the Recovery Is Performed by Those Trained to Do It 24.7.13 Write a Post-Recovery Report 24.7.14 Update Incorrect Instructions 24.7.15 Considerations Specific to Tape 24.8 Disaster Recovery Considerations 24.8.1 Maintenance Backups 24.8.2 Avoid Upgrades 24.8.3 Read the Documentation before Backups Are Performed 24.8.4 Disaster Recoveries Must Be Run by Administrators 24.8.5 Use Compatible Infrastructure 24.8.6 Know the System Dependencies 24.8.7 Keep Accurate System Documentation 24.8.8 Do You Know Where Your Licenses Are at 1am? 24.8.9 Disaster Recovery Exercises 24.9 Protecting the Protection Environment 24.10 Cyber-Recovery 24.11 Summary 24.12 Self-Reflection Chapter 25 Long-Term Retention Considerations 25.1 Introduction 25.2 Determining Long-term Retention Requirements 25.3 Why Is Archive Challenging? 25.4 Revisiting Storage Requirements for Long-term Retention 25.5 Format Considerations 25.6 Media Considerations 25.7 Data Protection Considerations 25.8 Summary 25.9 Self-Reflection Chapter 26 Choosing Protection Infrastructure 26.1 Introduction 26.2 It’s Never about the Technology 26.3 It’s Always about the Technology 26.4 Coverage 26.4.1 Value Products That Value Protection 26.4.2 Value Frameworks/Modular Composable Functions over Monoliths 26.4.3 Don’t Assume 26.4.4 Functionality Checklist 26.4.5 Don’t Tie a Legacy Anchor around Your Feet 26.4.6 Plan to Upgrade 26.4.7 Minimize Vendors, Not Products 26.4.8 Understand the Costs 26.5 You May Be Sizing Your Data Protection Solution Wrong 26.6 In Summary 26.7 Self-Reflection Chapter 27 The Impact of Flash on Data Protection 27.1 Introduction 27.2 How Does Flash Affect Data Protection? 27.3 In Summary Chapter 28 In Closing