Getting Started with z/OS Data Set Encryption

This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment....

Descripción completa

Detalles Bibliográficos
Autores Corporativos: O'Reilly for Higher Education (Firm), distributor (distributor), Safari, an O'Reilly Media Company (-)
Otros Autores: White, Bill, author (author), Lewis, Cecilia, author, Powers, Eysha, author, Rossi, David, author, Rossman, Eric, author, Coulsonr, Andy, author, Doll, Jacky, author, Habbershow, Brad, author, Liu, Thomas, author, McCarry, Ryan, author, Richard, Philippe, author, Santos, Romoaldo, author, Arnold, Isabel, author, Lindberg, Kasper, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: IBM Redbooks 2021.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009644266606719
Descripción
Sumario:This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Descripción Física:1 online resource (252 pages)
ISBN:9780738460222