|
|
|
|
LEADER |
02370nmm a2200445 u 4500 |
001 |
EB002008781 |
003 |
EBX01000000000000001171681 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
220121 ||| eng |
020 |
|
|
|a 9780738460222
|
050 |
|
4 |
|a QA76.9.D335
|
100 |
1 |
|
|a White, Bill
|
245 |
0 |
0 |
|a Getting Started with z/OS Data Set Encryption
|c White, Bill
|
250 |
|
|
|a 1st edition
|
260 |
|
|
|b IBM Redbooks
|c 2021
|
300 |
|
|
|a 252 pages
|
653 |
|
|
|a Data encryption (Computer science) / fast
|
653 |
|
|
|a Chiffrement (Informatique)
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Systèmes d'exploitation (Ordinateurs)
|
653 |
|
|
|a z/OS. / http://id.loc.gov/authorities/names/n2002065831
|
653 |
|
|
|a Operating systems (Computers) / http://id.loc.gov/authorities/subjects/sh85094982
|
653 |
|
|
|a Data encryption (Computer science) / http://id.loc.gov/authorities/subjects/sh94001524
|
653 |
|
|
|a z/OS / fast
|
653 |
|
|
|a operating systems / aat
|
653 |
|
|
|a Computer security / http://id.loc.gov/authorities/subjects/sh90001862
|
653 |
|
|
|a Operating systems (Computers) / fast
|
653 |
|
|
|a Computer security / fast
|
653 |
|
|
|a Computer Security
|
700 |
1 |
|
|a Lewis, Cecilia
|e author
|
700 |
1 |
|
|a Powers, Eysha
|e author
|
700 |
1 |
|
|a Rossi, David
|e author
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
500 |
|
|
|a Made available through: Safari, an O'Reilly Media Company
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780738460222/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 005.8/24
|
520 |
|
|
|a This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts
|