|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1337560974 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
220728s2022 nyua o 000 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d OCLCQ
|
020 |
|
|
|a 9780738460680
|q (electronic bk.)
|
020 |
|
|
|a 0738460680
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000072329715
|
035 |
|
|
|a (OCoLC)1337560974
|
037 |
|
|
|a 9780738460680
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20220728
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a White, Bill
|c (Telecommunications engineer),
|e author.
|
245 |
1 |
0 |
|a Transitioning to quantum-safe cryptography on IBM Z /
|c Bill White, Didier Andre, Gregg Arquero, Ritu Bajaj, Joe Cronin, Anne Dames, Henrik Lyksborg, Alexandra Miranda, Maxwell Weiss.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a Poughkeepsie, NY :
|b IBM Redbooks,
|c [2022]
|
300 |
|
|
|a 1 online resource (190 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography. This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities. This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security
|x Management.
|2 fast
|0 (OCoLC)fst00872493
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Information technology
|x Security measures.
|2 fast
|0 (OCoLC)fst00973129
|
700 |
1 |
|
|a Andre, Didier,
|e author.
|
700 |
1 |
|
|a Arquero, Gregg,
|e author.
|
700 |
1 |
|
|a Bajaj, Ritu,
|e author.
|
700 |
1 |
|
|a Cronin, Joe,
|e author.
|
700 |
1 |
|
|a Dames, Anne,
|e author.
|
700 |
1 |
|
|a Lyksborg, Henrik,
|e author.
|
700 |
1 |
|
|a Miranda, Alexandra,
|e author.
|
700 |
1 |
|
|a Weiss, Maxwell,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780738460680/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|