Getting Started with z/OS Data Set Encryption
Publisher Description
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.
In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.
This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
More Books Like This
System z Crypto and TKE Update
2011
IBM System i Security: Protecting i5/OS Data with Encryption
2008
Getting Started with Linux on Z Encryption for Data At-Rest
2019
IBM System Storage Data Encryption
2010
Data-at-rest Encryption for the IBM Spectrum Accelerate Family
2019
Security on IBM z/VSE
2018
More Books by Bill White, Cecilia Carranza Lewis, Eysha Shirrine Powers, David Rossi, Eric Rossman, Andy Coulsonr, Jacky Doll, Brad Habbershow, Thomas Liu, Ryan McCarry, Philippe Richard, Romoaldo Santos, Isabel Arnold & Kasper Lindberg
IBM z/OS V1R11 Communications Server TCP / IP Implementation Volume 3: High Availability, Scalability, and Performance
2010
IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment
2024
Keeping Up With Security and Compliance on IBM Z
2023
IBM Z Functional Matrix
2024
Transitioning to Quantum-Safe Cryptography on IBM Z
2023
IBM z15 Technical Introduction
2021