Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author White, Bill (Telecommunications engineer), author.

Title Transitioning to quantum-safe cryptography on IBM Z / Bill White, Didier Andre, Gregg Arquero, Ritu Bajaj, Joe Cronin, Anne Dames, Henrik Lyksborg, Alexandra Miranda, Maxwell Weiss. [O'Reilly electronic resource]

Edition [First edition].
Publication Info. Poughkeepsie, NY : IBM Redbooks, [2022]
QR Code
Description 1 online resource (190 pages) : illustrations
Summary As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography. This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities. This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Subject Information technology -- Security measures.
Computer security -- Management.
Computer networks -- Security measures.
Data protection.
Technologie de l'information -- Sécurité -- Mesures.
Sécurité informatique -- Gestion.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Protection de l'information (Informatique)
Computer networks -- Security measures
Computer security -- Management
Data protection
Information technology -- Security measures
Added Author Andre, Didier, author.
Arquero, Gregg, author.
Bajaj, Ritu, author.
Cronin, Joe, author.
Dames, Anne, author.
Lyksborg, Henrik, author.
Miranda, Alexandra, author.
Weiss, Maxwell, author.
ISBN 9780738460680 (electronic bk.)
0738460680 (electronic bk.)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information