Getting Started with z/OS Data Set Encryption
출판사 설명
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.
In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.
This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
System z Crypto and TKE Update
2011년
IBM System i Security: Protecting i5/OS Data with Encryption
2008년
Getting Started with Linux on Z Encryption for Data At-Rest
2019년
IBM System Storage Data Encryption
2010년
Data-at-rest Encryption for the IBM Spectrum Accelerate Family
2019년
Security on IBM z/VSE
2018년
Uppity
2011년
Intrepid
2008년
IBM z/OS V1R11 Communications Server TCP / IP Implementation Volume 3: High Availability, Scalability, and Performance
2010년
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
2017년
Getting Started with Linux on Z Encryption for Data At-Rest
2019년
IBM z13 and IBM z13s Technical Introduction
2017년