Getting Started with z/OS Data Set Encryption
Publisher Description
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.
In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.
This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Getting Started with Linux on Z Encryption for Data At-Rest
2019
Data-at-rest Encryption for the IBM Spectrum Accelerate Family
2019
Security on IBM z/VSE
2018
Designing Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33
2022
Network Security with OpenSSL
2002
Security and Linux on z Systems
2018
Transitioning to Quantum-Safe Cryptography on IBM Z
2023
IBM z15 Technical Introduction
2021
IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment
2024
Keeping Up With Security and Compliance on IBM Z
2023
IBM Z Functional Matrix
2024
IBM z15 Configuration Setup
2020