Description |
1 online resource (252 pages) |
|
text file |
|
40.00 |
Summary |
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. |
Subject |
z/OS.
|
|
z/OS |
|
Data encryption (Computer science)
|
|
Operating systems (Computers)
|
|
Computer security.
|
|
Computer Security |
|
Chiffrement (Informatique) |
|
Systèmes d'exploitation (Ordinateurs) |
|
Sécurité informatique. |
|
operating systems. |
|
Computer security |
|
Data encryption (Computer science) |
|
Operating systems (Computers) |
Added Author |
Lewis, Cecilia, author.
|
|
Powers, Eysha, author.
|
|
Rossi, David, author.
|
|
Rossman, Eric, author.
|
|
Coulsonr, Andy, author.
|
|
Doll, Jacky, author.
|
|
Habbershow, Brad, author.
|
|
Liu, Thomas, author.
|
|
McCarry, Ryan, author.
|
|
Richard, Philippe, author.
|
|
Santos, Romoaldo, author.
|
|
Arnold, Isabel, author.
|
|
Lindberg, Kasper, author.
|
|
O'Reilly for Higher Education (Firm), distributor.
|
|
Safari, an O'Reilly Media Company.
|
ISBN |
9780738460222 |
|
0738460222 |
Standard No. |
9780738460222 |
|