In this chapter, you will learn how to
• Control access to storage resources
• Explain how encryption is used to protect the confidentiality of data
• Manage the visibility of storage used on the network or fabric
Chapter 7 discussed how the widespread availability of networks, infrastructure, and applications has lulled us as consumers into a false sense of security. In fact, these systems are double-edged swords. On one hand, they are marvelous innovations that simplify our lives by allowing us to complete complex transactions from a ...