Cargando…

Getting started with z/OS data set encryption /

Abstract This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment....

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: White, Bill (Telecommunications engineer) (Autor)
Autor Corporativo: International Business Machines Corporation. International Technical Support Organization
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Poughkeepsie, NY : IBM Corporation, International Technical Support Organization, 2018.
Edición:First edition (June 2018).
Colección:IBM redbooks.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1043906474
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 180711s2018 nyua ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d STF  |d TOH  |d DEBBG  |d CEF  |d OCLCA  |d G3B  |d S9I  |d UAB  |d OCLCO  |d CZL  |d OCLCQ  |d OCLCO  |d OCLCQ 
020 |a 073845687X 
020 |a 9780738456874 
020 |z 9780738456874 
029 1 |a GBVCP  |b 1029872880 
035 |a (OCoLC)1043906474 
037 |a CL0500000978  |b Safari Books Online 
050 4 |a QA76.9.D335 
082 0 4 |a 005.8/24  |q OCoLC  |2 23/eng/20230216 
049 |a UAMI 
100 1 |a White, Bill  |c (Telecommunications engineer),  |e author. 
245 1 0 |a Getting started with z/OS data set encryption /  |c Bill White [and nine others]. 
250 |a First edition (June 2018). 
264 1 |a Poughkeepsie, NY :  |b IBM Corporation, International Technical Support Organization,  |c 2018. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
490 1 |a IBM redbooks 
588 0 |a Online resource; title from cover (Safari, viewed July 11, 2018). 
504 |a Includes bibliographical references. 
520 |a Abstract This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a z/OS. 
630 0 7 |a Z/OS.  |2 fast  |0 (OCoLC)fst01396763 
650 0 |a Data encryption (Computer science) 
650 0 |a Operating systems (Computers) 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Chiffrement (Informatique) 
650 6 |a Systèmes d'exploitation (Ordinateurs) 
650 6 |a Sécurité informatique. 
650 7 |a operating systems.  |2 aat 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Operating systems (Computers)  |2 fast  |0 (OCoLC)fst01046280 
710 2 |a International Business Machines Corporation.  |b International Technical Support Organization. 
830 0 |a IBM redbooks. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738456874/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP