Getting Started with z/OS Data Set Encryption Getting Started with z/OS Data Set Encryption

Getting Started with z/OS Data Set Encryption

Bill White and Others

Publisher Description

This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.

In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.

This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

GENRE
Computing & Internet
RELEASED
2021
10 December
LANGUAGE
EN
English
LENGTH
252
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
4.1
MB
IBM z13 and IBM z13s Technical Introduction IBM z13 and IBM z13s Technical Introduction
2017
Transitioning to Quantum-Safe Cryptography on IBM Z Transitioning to Quantum-Safe Cryptography on IBM Z
2023
IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 1: Base Functions, Connectivity, and Routing IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 1: Base Functions, Connectivity, and Routing
2016
IBM z15 Configuration Setup IBM z15 Configuration Setup
2020
Getting Started with Linux on Z Encryption for Data At-Rest Getting Started with Linux on Z Encryption for Data At-Rest
2019
IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment
2024