Transitioning to quantum-safe cryptography on IBM Z /
As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break cl...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | White, Bill (Telecommunications engineer) (Autor), Andre, Didier (Autor), Arquero, Gregg (Autor), Bajaj, Ritu (Autor), Cronin, Joe (Autor), Dames, Anne (Autor), Lyksborg, Henrik (Autor), Miranda, Alexandra (Autor), Weiss, Maxwell (Autor) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Poughkeepsie, NY :
IBM Redbooks,
[2022]
|
Edición: | [First edition]. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Take Control of 1Password /
por: Kissell, Joe
Publicado: (2023) -
Inside the Security Mind : Making the Tough Decisions.
por: Day, Kevin, 1975-
Publicado: (2003) -
Secure operations and protections /
Publicado: (2021) -
Investigating the Cyber Breach : the digital forensics guide for the network engineer /
por: Muniz, Joseph, et al.
Publicado: (2018) -
Solving the Enigma : History of Cryptanalytic Bombe /
por: Wilcox, Jennifer
Publicado: (2006)