Getting Started with z/OS Data Set Encryption

This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment....

Full description

Bibliographic Details
Main Authors: White, Bill, Lewis, Cecilia (Author), Powers, Eysha (Author), Rossi, David (Author)
Format: eBook
Language:English
Published: IBM Redbooks 2021
Edition:1st edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02370nmm a2200445 u 4500
001 EB002008781
003 EBX01000000000000001171681
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220121 ||| eng
020 |a 9780738460222 
050 4 |a QA76.9.D335 
100 1 |a White, Bill 
245 0 0 |a Getting Started with z/OS Data Set Encryption  |c White, Bill 
250 |a 1st edition 
260 |b IBM Redbooks  |c 2021 
300 |a 252 pages 
653 |a Data encryption (Computer science) / fast 
653 |a Chiffrement (Informatique) 
653 |a Sécurité informatique 
653 |a Systèmes d'exploitation (Ordinateurs) 
653 |a z/OS. / http://id.loc.gov/authorities/names/n2002065831 
653 |a Operating systems (Computers) / http://id.loc.gov/authorities/subjects/sh85094982 
653 |a Data encryption (Computer science) / http://id.loc.gov/authorities/subjects/sh94001524 
653 |a z/OS / fast 
653 |a operating systems / aat 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
653 |a Operating systems (Computers) / fast 
653 |a Computer security / fast 
653 |a Computer Security 
700 1 |a Lewis, Cecilia  |e author 
700 1 |a Powers, Eysha  |e author 
700 1 |a Rossi, David  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Made available through: Safari, an O'Reilly Media Company 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738460222/?ar  |x Verlag  |3 Volltext 
082 0 |a 500 
082 0 |a 005.8/24 
520 |a This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts