Cargando…

Getting started with Linux on Z Encryption for data at-rest /

This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption envi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: White, Bill (Telecommunications engineer) (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Poughkeepsie, NY : IBM Corporation, International Technical Support Organization, 2019.
Edición:First edition (April 2019).
Colección:IBM redbooks.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1121200598
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 190930s2019 nyua ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d TOH  |d OCLCO  |d CZL  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 1126184681 
020 |z 0738457469 
035 |a (OCoLC)1121200598  |z (OCoLC)1126184681 
037 |a CL0501000073  |b Safari Books Online 
050 4 |a QA76.9.D335 
049 |a UAMI 
100 1 |a White, Bill  |c (Telecommunications engineer),  |e author. 
245 1 0 |a Getting started with Linux on Z Encryption for data at-rest /  |c Bill White [and five others]. 
250 |a First edition (April 2019). 
264 1 |a Poughkeepsie, NY :  |b IBM Corporation, International Technical Support Organization,  |c 2019. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a IBM redbooks 
588 0 |a Online resource; title from cover (Safari, viewed September 26, 2019). 
500 |a "Security, IBM Z." 
500 |a Number on back cover: SG24-8436-00. 
504 |a Includes bibliographical references. 
520 |a This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Linux. 
630 0 7 |a Linux.  |2 fast  |0 (OCoLC)fst01382136 
650 0 |a Data encryption (Computer science) 
650 0 |a Operating systems (Computers) 
650 0 |a Computer security. 
650 6 |a Chiffrement (Informatique) 
650 6 |a Systèmes d'exploitation (Ordinateurs) 
650 6 |a Sécurité informatique. 
650 7 |a operating systems.  |2 aat 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Operating systems (Computers)  |2 fast  |0 (OCoLC)fst01046280 
710 2 |a International Business Machines Corporation.  |b International Technical Support Organization,  |e issuing body. 
830 0 |a IBM redbooks. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738457468/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP