Information Storage and Management: Storing, Managing, and Protecting Digital Information / Edition 1

Hardcover (Print)
Rent from
(Save 59%)
Est. Return Date: 06/20/2015
Buy New
Buy New from
Buy Used
Buy Used from
(Save 40%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Hardcover)
  • All (9) from $1.99   
  • New (1) from $21.00   
  • Used (8) from $1.99   


The spiraling growth of digital information makes the ISM book a "must have" addition to your IT reference library. This exponential growth has driven information management technology to new levels of sophistication and complexity, exposing a skills gap that challenge IT managers and professionals alike. The ISM book, written by storage professionals from EMC Corporation, takes an ‘open’ approach to teaching information storage and management, focusing on concepts and principles – rather that product specifics – that can be applied in all IT environments

The book enables existing and aspiring IT professionals, students, faculty, and those simply wishing to gain deeper insight to this emerging pillar of IT infrastructure to achieve a comprehensive understanding of all segments of information storage technology.

Sixteen chapters are organized into four sections. Advanced topics build upon the topics learned in previous chapters.

Section 1, "Information Storage and Management for Today’s World": Four chapters cover information growth and challenges, define a storage system and its environment, review the evolution of storage technology, and introduce intelligent storage systems.

Section 2, "Storage Options and Protocols": Six chapters cover the SCSI and Fibre channel architecture, direct-attached storage (DAS), storage area networks (SANs), network-attached storage (NAS), Internet Protocol SAN (IP-SAN), content-addressed storage (CAS), and storage virtualization.

Section 3, "Business Continuity and Replication": Four chapters introduce business continuity, backup and recovery, local data replication, and remote data replication.

Section 4, "Security and Administration": Two chapters cover storage security and storage infrastructure monitoring and management.

The book’s supplementary web site provides up-to-date information on additional learning aids and storage certification opportunities.

Read More Show Less

Product Details

  • ISBN-13: 9780470294215
  • Publisher: Wiley, John & Sons, Incorporated
  • Publication date: 4/6/2009
  • Edition description: Older Edition
  • Edition number: 1
  • Pages: 480
  • Product dimensions: 7.60 (w) x 9.30 (h) x 1.30 (d)

Meet the Author

EMC Corporation (NYSE: EMC) is the world's leading developer and provider of information infrastructure technology and solutions that enable organizations of all sizes to transform the way they compete and create value from their information. Information about EMC's products and services can be found at
Read More Show Less

Table of Contents



Section I Storage System.

Chapter 1 Introduction to Information Storage and Management.

1.1 Information Storage.

1.2 Evolution of Storage Technology and Architecture.

1.3 Data Center Infrastructure.

1.4 Key Challenges in Managing Information.

1.5 Information Lifecycle.


Chapter 2 Storage System Environment.

2.1 Components of a Storage System Environment.

2.2 Disk Drive Components.

2.3 Disk Drive Performance.

2.4 Fundamental Laws Governing Disk Performance.

2.5 Logical Components of the Host.

2.6 Application Requirements and Disk Performance.


Chapter 3 Data Protection: RAID.

3.1 Implementation of RAID.

3.2 RAID Array Components.

3.3 RAID Levels.

3.4 RAID Comparison.

3.5 RAID Impact on Disk Performance.

3.6 Hot Spares.


Chapter 4 Intelligent Storage System.

4.1 Components of an Intelligent Storage System.

4.2 Intelligent Storage Array.

4.3 Concepts in Practice: EMC CLARiiON and Symmetrix.


Section II Storage Networking Technologies and Virtualization.

Chapter 5 Direct-Attached Storage and Introduction to SCSI.

5.1 Types of DAS.

5.2 DAS Benefits and Limitations.

5.3 Disk Drive Interfaces .

5.4 Introduction to Parallel SCSI.

5.5 SCSI Command Model.


Chapter 6 Storage Area Networks.

6.1 Fibre Channel: Overview.

6.2 The SAN and Its Evolution.

6.3 Components of SAN.

6.4 FC Connectivity.

6.5 Fibre Channel Ports.

6.6 Fibre Channel Architecture.

6.7 Zoning.

6.8 Fibre Channel Login Types.

6.9 FC Topologies.

6.10 Concepts in Practice: EMC Connectrix.


Chapter 7 Network-Attached Storage.

7.1 General-Purpose Servers vs. NAS Devices.

7.2 Benefits of NAS.

7.3 NAS File I/O.

7.4 Components of NAS.

7.5 NAS Implementations.

7.6 NAS File-Sharing Protocols.

7.7 NAS I/O Operations.

7.8 Factors Affecting NAS Performance and Availability.

7.9 Concepts in Practice: EMC Celerra.


Chapter 8 IP SAN.

8.1 iSCSI.

8.2 FCIP.


Chapter 9 Content-Addressed Storage.

9.1 Fixed Content and Archives.

9.2 Types of Archives.

9.3 Features and Benefits of CAS.

9.4 CAS Architecture.

9.5 Object Storage and Retrieval in CAS.

9.6 CAS Examples.

9.7 Concepts in Practice: EMC Centera.

Chapter 10 Storage Virtualization.

10.1 Forms of Virtualization.

10.2 SNIA Storage Virtualization Taxonomy.

10.3 Storage Virtualization Configurations.

10.4 Storage Virtualization Challenges.

10.5 Types of Storage Virtualization.

10.6 Concepts in Practice.

Section III Business Continuity.

Chapter 11 Introduction to Business Continuity.

11.1 Information Availability.

11.2 BC Terminology.

11.3 BC Planning Lifecycle.

11.4 Failure Analysis.

11.5 Business Impact Analysis.

11.6 BC Technology Solutions.

11.7 Concept in Practice: EMC PowerPath.


Chapter 12 Backup and Recovery.

12.1 Backup Purpose.

12.2 Backup Considerations.

12.3 Backup Granularity.

12.4 Recovery Considerations.

12.5 Backup Methods.

12.6 Backup Process.

12.7 Backup and Restore Operations.

12.8 Backup Topologies.

12.9 Backup in NAS Environments.

12.10 Backup Technologies.

12.11 Concepts in Practice: EMC NetWorker.

Chapter 13 Local Replication.

13.1 Source and Target.

13.2 Uses of Local Replicas.

13.3 Data Consistency.

13.4 Local Replication Technologies.

13.5 Restore and Restart Considerations.

13.6 Creating Multiple Replicas.

13.7 Management Interface.

13.8 Concepts in Practice: EMC TimeFinder and  EMC SnapView.

Chapter 14 Remote Replication.

14.1 Modes of Remote Replication.

14.2 Remote Replication Technologies.

14.3 Network Infrastructure.

14.4 Concepts in Practice: EMC SRDF, EMC SAN Copy,  and EMC MirrorView.


Section IV Storage Security and Management.

Chapter 15 Securing the Storage Infrastructure.

15.1 Storage Security Framework.

15.2 Risk Triad.

15.3 Storage Security Domains.

15.4 Security Implementations in Storage Networking.


Chapter 16 Managing the Storage Infrastructure.

16.1 Monitoring the Storage Infrastructure.

16.2 Storage Management Activities.

16.3 Storage Infrastructure Management Challenges.

16.4 Developing an Ideal Solution.

16.5 Concepts in Practice: EMC ControlCenter.





Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted September 3, 2011

    No text was provided for this review.

Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)