|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1043906474 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180711s2018 nyua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d STF
|d TOH
|d DEBBG
|d CEF
|d OCLCA
|d G3B
|d S9I
|d UAB
|d OCLCO
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 073845687X
|
020 |
|
|
|a 9780738456874
|
020 |
|
|
|z 9780738456874
|
029 |
1 |
|
|a GBVCP
|b 1029872880
|
035 |
|
|
|a (OCoLC)1043906474
|
037 |
|
|
|a CL0500000978
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.D335
|
082 |
0 |
4 |
|a 005.8/24
|q OCoLC
|2 23/eng/20230216
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a White, Bill
|c (Telecommunications engineer),
|e author.
|
245 |
1 |
0 |
|a Getting started with z/OS data set encryption /
|c Bill White [and nine others].
|
250 |
|
|
|a First edition (June 2018).
|
264 |
|
1 |
|a Poughkeepsie, NY :
|b IBM Corporation, International Technical Support Organization,
|c 2018.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a IBM redbooks
|
588 |
0 |
|
|a Online resource; title from cover (Safari, viewed July 11, 2018).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a Abstract This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a z/OS.
|
630 |
0 |
7 |
|a Z/OS.
|2 fast
|0 (OCoLC)fst01396763
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Operating systems (Computers)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Systèmes d'exploitation (Ordinateurs)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a operating systems.
|2 aat
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
650 |
|
7 |
|a Operating systems (Computers)
|2 fast
|0 (OCoLC)fst01046280
|
710 |
2 |
|
|a International Business Machines Corporation.
|b International Technical Support Organization.
|
830 |
|
0 |
|a IBM redbooks.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780738456874/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|