Cargando…

Transitioning to quantum-safe cryptography on IBM Z /

As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break cl...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: White, Bill (Telecommunications engineer) (Autor), Andre, Didier (Autor), Arquero, Gregg (Autor), Bajaj, Ritu (Autor), Cronin, Joe (Autor), Dames, Anne (Autor), Lyksborg, Henrik (Autor), Miranda, Alexandra (Autor), Weiss, Maxwell (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Poughkeepsie, NY : IBM Redbooks, [2022]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1337560974
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 220728s2022 nyua o 000 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d OCLCQ 
020 |a 9780738460680  |q (electronic bk.) 
020 |a 0738460680  |q (electronic bk.) 
029 1 |a AU@  |b 000072329715 
035 |a (OCoLC)1337560974 
037 |a 9780738460680  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20220728 
049 |a UAMI 
100 1 |a White, Bill  |c (Telecommunications engineer),  |e author. 
245 1 0 |a Transitioning to quantum-safe cryptography on IBM Z /  |c Bill White, Didier Andre, Gregg Arquero, Ritu Bajaj, Joe Cronin, Anne Dames, Henrik Lyksborg, Alexandra Miranda, Maxwell Weiss. 
250 |a [First edition]. 
264 1 |a Poughkeepsie, NY :  |b IBM Redbooks,  |c [2022] 
300 |a 1 online resource (190 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography. This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities. This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security  |x Management.  |2 fast  |0 (OCoLC)fst00872493 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Information technology  |x Security measures.  |2 fast  |0 (OCoLC)fst00973129 
700 1 |a Andre, Didier,  |e author. 
700 1 |a Arquero, Gregg,  |e author. 
700 1 |a Bajaj, Ritu,  |e author. 
700 1 |a Cronin, Joe,  |e author. 
700 1 |a Dames, Anne,  |e author. 
700 1 |a Lyksborg, Henrik,  |e author. 
700 1 |a Miranda, Alexandra,  |e author. 
700 1 |a Weiss, Maxwell,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738460680/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP