Cargando…

Getting started with IBM Hyper Protect Data Controller /

IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes--security policies are k...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: White, Bill (Autor), Coulson, Andy (Autor), Hoareau, Guillaume (Autor), Katonica, Jason (Autor), Panting, Roy (Autor), Richard, Philippe (Autor), Weiss, Maxwell (Autor), Yan, Eva (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: IBM Redbooks, 2022.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1291869137
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 040122s2022 xx o 000 0 eng d
040 |a AU@  |b eng  |c AU@  |d ORMDA  |d OCLCO  |d OCLCF  |d OCLCQ  |d TOH  |d OCLCQ  |d OCLCO 
020 |z 9780738460031 
020 |z 0738460036 
024 8 |a 9780738460031 
029 0 |a AU@  |b 000070439290 
035 |a (OCoLC)1291869137 
037 |a 9780738460031  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a White, Bill,  |e author. 
245 1 0 |a Getting started with IBM Hyper Protect Data Controller /  |c White, Bill. 
250 |a 1st edition. 
264 1 |b IBM Redbooks,  |c 2022. 
300 |a 1 online resource (268 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes--security policies are kept and honored whenever the data is accessed and future data access can be revoked even after data leaves the system of record. This IBM Redbooks® publication can assist you with determining how to get started with IBM Hyper Protect Data Controller through a use case approach. It will help you plan for, install, tailor and configure the Hyper Protect Data Controller. It includes information about the following topics: Concepts and reference architecture Common use cases with implementation guidance and advice Implementation and policy examples Typical operational tasks for creating policies and preparing for audits Monitoring user activity and events This IBM Redbooks publication is written for IT Managers, IT Architects, Security Administrators, data owners, and data consumers. 
542 |f Copyright 2022 © IBM  |g 2022 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title page (viewed January 4, 2022) 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Cloud computing  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Coulson, Andy,  |e author. 
700 1 |a Hoareau, Guillaume,  |e author. 
700 1 |a Katonica, Jason,  |e author. 
700 1 |a Panting, Roy,  |e author. 
700 1 |a Richard, Philippe,  |e author. 
700 1 |a Weiss, Maxwell,  |e author. 
700 1 |a Yan, Eva,  |e author. 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738460031/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP