Description |
1 online resource (100 pages) |
|
text file |
|
40.00 |
Summary |
This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. |
Reproduction |
Electronic reproduction. Boston, MA : Safari, Available via World Wide Web. 2019. |
System Details |
Mode of access: World Wide Web. |
Genre |
Electronic books.
|
Added Author |
Hampton, Megan, author.
|
|
Klotz, Benedikt, author.
|
|
Nogueira, Guilherme, author.
|
|
Oughton, Pat, author.
|
|
Reimer, Carlos, author.
|
|
Safari, an O’Reilly Media Company.
|
Standard No. |
9780738457468 |
|