2006
DOI: 10.1109/tmag.2005.861773
|View full text |Cite
|
Sign up to set email alerts
|

Direct and reverse overwrite processes in perpendicular recording

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Data overwrite method is based on the U.S. Department of Defense DOD 5220.22-M [8] ("National Industrial Security Program Operating Manual"), a standard the most effective data method of destruction so far [9], its method of operation is write disordered meaningless binary character and to the storage medium, cover the original data, with data overwrite number increasing, the original data is the possibility of recovery will be reduced, so as to achieve the purpose of data destruction. The concrete realization of the process is: administrator control server through management orders, call the self-destruction mechanism, start the data overwrite.…”
Section: Data Overwritingmentioning
confidence: 99%
“…Data overwrite method is based on the U.S. Department of Defense DOD 5220.22-M [8] ("National Industrial Security Program Operating Manual"), a standard the most effective data method of destruction so far [9], its method of operation is write disordered meaningless binary character and to the storage medium, cover the original data, with data overwrite number increasing, the original data is the possibility of recovery will be reduced, so as to achieve the purpose of data destruction. The concrete realization of the process is: administrator control server through management orders, call the self-destruction mechanism, start the data overwrite.…”
Section: Data Overwritingmentioning
confidence: 99%