Getting started with Linux on Z Encryption for data at-rest:
This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption envi...
Gespeichert in:
Beteilige Person: | |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Poughkeepsie, NY
IBM Corporation, International Technical Support Organization
2019
|
Ausgabe: | First edition (April 2019). |
Schriftenreihe: | IBM redbooks
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780738457468/?ar |
Zusammenfassung: | This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. |
Beschreibung: | "Security, IBM Z.". - Number on back cover: SG24-8436-00. - Includes bibliographical references. - Online resource; title from cover (Safari, viewed September 26, 2019) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-048550787 | ||
003 | DE-627-1 | ||
005 | 20240228120858.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2019 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)048550787 | ||
035 | |a (DE-599)KEP048550787 | ||
035 | |a (ORHE)9780738457468 | ||
035 | |a (DE-627-1)048550787 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a White, Bill |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Getting started with Linux on Z Encryption for data at-rest |c Bill White [and five others] |
250 | |a First edition (April 2019). | ||
264 | 1 | |a Poughkeepsie, NY |b IBM Corporation, International Technical Support Organization |c 2019 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a IBM redbooks | |
500 | |a "Security, IBM Z.". - Number on back cover: SG24-8436-00. - Includes bibliographical references. - Online resource; title from cover (Safari, viewed September 26, 2019) | ||
520 | |a This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. | ||
630 | 2 | 0 | |a Linux |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Operating systems (Computers) | |
650 | 0 | |a Computer security | |
650 | 4 | |a Linux | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a operating systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Operating systems (Computers) | |
710 | 2 | |a International Business Machines Corporation. |b International Technical Support Organization, |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738457468/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-048550787 |
---|---|
_version_ | 1821494851625025536 |
adam_text | |
any_adam_object | |
author | White, Bill |
author_corporate | International Business Machines Corporation. International Technical Support Organization |
author_corporate_role | ctb |
author_facet | White, Bill International Business Machines Corporation. International Technical Support Organization |
author_role | aut |
author_sort | White, Bill |
author_variant | b w bw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)048550787 (DE-599)KEP048550787 (ORHE)9780738457468 |
edition | First edition (April 2019). |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02673cam a22004932 4500</leader><controlfield tag="001">ZDB-30-ORH-048550787</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120858.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048550787</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048550787</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738457468</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048550787</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">White, Bill</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Getting started with Linux on Z Encryption for data at-rest</subfield><subfield code="c">Bill White [and five others]</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition (April 2019).</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Poughkeepsie, NY</subfield><subfield code="b">IBM Corporation, International Technical Support Organization</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IBM redbooks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Security, IBM Z.". - Number on back cover: SG24-8436-00. - Includes bibliographical references. - Online resource; title from cover (Safari, viewed September 26, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Business Machines Corporation.</subfield><subfield code="b">International Technical Support Organization,</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738457468/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-048550787 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:57Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IBM Corporation, International Technical Support Organization |
record_format | marc |
series2 | IBM redbooks |
spelling | White, Bill VerfasserIn aut Getting started with Linux on Z Encryption for data at-rest Bill White [and five others] First edition (April 2019). Poughkeepsie, NY IBM Corporation, International Technical Support Organization 2019 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier IBM redbooks "Security, IBM Z.". - Number on back cover: SG24-8436-00. - Includes bibliographical references. - Online resource; title from cover (Safari, viewed September 26, 2019) This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. Linux Data encryption (Computer science) Operating systems (Computers) Computer security Chiffrement (Informatique) Systèmes d'exploitation (Ordinateurs) Sécurité informatique operating systems International Business Machines Corporation. International Technical Support Organization, MitwirkendeR ctb |
spellingShingle | White, Bill Getting started with Linux on Z Encryption for data at-rest Linux Data encryption (Computer science) Operating systems (Computers) Computer security Chiffrement (Informatique) Systèmes d'exploitation (Ordinateurs) Sécurité informatique operating systems |
title | Getting started with Linux on Z Encryption for data at-rest |
title_auth | Getting started with Linux on Z Encryption for data at-rest |
title_exact_search | Getting started with Linux on Z Encryption for data at-rest |
title_full | Getting started with Linux on Z Encryption for data at-rest Bill White [and five others] |
title_fullStr | Getting started with Linux on Z Encryption for data at-rest Bill White [and five others] |
title_full_unstemmed | Getting started with Linux on Z Encryption for data at-rest Bill White [and five others] |
title_short | Getting started with Linux on Z Encryption for data at-rest |
title_sort | getting started with linux on z encryption for data at rest |
topic | Linux Data encryption (Computer science) Operating systems (Computers) Computer security Chiffrement (Informatique) Systèmes d'exploitation (Ordinateurs) Sécurité informatique operating systems |
topic_facet | Linux Data encryption (Computer science) Operating systems (Computers) Computer security Chiffrement (Informatique) Systèmes d'exploitation (Ordinateurs) Sécurité informatique operating systems |
work_keys_str_mv | AT whitebill gettingstartedwithlinuxonzencryptionfordataatrest AT internationalbusinessmachinescorporationinternationaltechnicalsupportorganization gettingstartedwithlinuxonzencryptionfordataatrest |