Maximizing Security with LinuxONE:
LinuxONE is a hardware system designed to support and exploit the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service a variety of needs. On LinuxONE, security i...
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
IBM Redbooks
2019
|
Links: | https://learning.oreilly.com/library/view/-/9780738458137/?ar |
Zusammenfassung: | LinuxONE is a hardware system designed to support and exploit the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service a variety of needs. On LinuxONE, security is built into both the hardware and software. This IBM® Redpaper publication gives a broad understanding of how to leverage the various security features that exploit and complement the LinuxONE hardware security features, such as these: Hardware accelerated encryption of data, delivered with near-zero overhead by the on-chip Central Processor Assist for Cryptographic Function (CPACF) and a dedicated Crypto Express adapter. Virtualization and industry leading isolation capabilities with PR/SM, EAL 5+ LPARs, DPM, KVM, and IBM z/VM®. The IBM Secure Service Container technology, which provides workload isolation, restricted administrator access, and tamper protection against internal threats, including from systems administrators. Other technologies that exploit LinuxONE security capabilities and deeper dives into practical use cases for these technologies. This IBM Redpaper publication was written for IT executives, architects, specialists, security administrators, and others who consider security when using LinuxONE. |
Beschreibung: | Title from content provider |
Umfang: | 1 Online-Ressource |
ISBN: | 9780738458137 0738458139 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-048577901 | ||
003 | DE-627-1 | ||
005 | 20240228121036.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2019 xx |||||o 00| ||eng c | ||
020 | |a 9780738458137 |9 978-0-7384-5813-7 | ||
020 | |a 0738458139 |9 0-7384-5813-9 | ||
035 | |a (DE-627-1)048577901 | ||
035 | |a (DE-599)KEP048577901 | ||
035 | |a (ORHE)9780738458137 | ||
035 | |a (DE-627-1)048577901 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
245 | 1 | 0 | |a Maximizing Security with LinuxONE |c Yongkook Kim [and others] |
264 | 1 | |a [Place of publication not identified] |b IBM Redbooks |c 2019 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Title from content provider | ||
520 | |a LinuxONE is a hardware system designed to support and exploit the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service a variety of needs. On LinuxONE, security is built into both the hardware and software. This IBM® Redpaper publication gives a broad understanding of how to leverage the various security features that exploit and complement the LinuxONE hardware security features, such as these: Hardware accelerated encryption of data, delivered with near-zero overhead by the on-chip Central Processor Assist for Cryptographic Function (CPACF) and a dedicated Crypto Express adapter. Virtualization and industry leading isolation capabilities with PR/SM, EAL 5+ LPARs, DPM, KVM, and IBM z/VM®. The IBM Secure Service Container technology, which provides workload isolation, restricted administrator access, and tamper protection against internal threats, including from systems administrators. Other technologies that exploit LinuxONE security capabilities and deeper dives into practical use cases for these technologies. This IBM Redpaper publication was written for IT executives, architects, specialists, security administrators, and others who consider security when using LinuxONE. | ||
700 | 1 | |a Kim, Yongkook |e MitwirkendeR |4 ctb | |
776 | 1 | |z 0738458139 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0738458139 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738458137/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-048577901 |
---|---|
_version_ | 1821494849082228736 |
adam_text | |
any_adam_object | |
author2 | Kim, Yongkook |
author2_role | ctb |
author2_variant | y k yk |
author_facet | Kim, Yongkook |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)048577901 (DE-599)KEP048577901 (ORHE)9780738458137 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02511cam a22003612 4500</leader><controlfield tag="001">ZDB-30-ORH-048577901</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121036.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738458137</subfield><subfield code="9">978-0-7384-5813-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738458139</subfield><subfield code="9">0-7384-5813-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048577901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048577901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738458137</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048577901</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Maximizing Security with LinuxONE</subfield><subfield code="c">Yongkook Kim [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from content provider</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">LinuxONE is a hardware system designed to support and exploit the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service a variety of needs. On LinuxONE, security is built into both the hardware and software. This IBM® Redpaper publication gives a broad understanding of how to leverage the various security features that exploit and complement the LinuxONE hardware security features, such as these: Hardware accelerated encryption of data, delivered with near-zero overhead by the on-chip Central Processor Assist for Cryptographic Function (CPACF) and a dedicated Crypto Express adapter. Virtualization and industry leading isolation capabilities with PR/SM, EAL 5+ LPARs, DPM, KVM, and IBM z/VM®. The IBM Secure Service Container technology, which provides workload isolation, restricted administrator access, and tamper protection against internal threats, including from systems administrators. Other technologies that exploit LinuxONE security capabilities and deeper dives into practical use cases for these technologies. This IBM Redpaper publication was written for IT executives, architects, specialists, security administrators, and others who consider security when using LinuxONE.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, Yongkook</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0738458139</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0738458139</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738458137/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-048577901 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:54Z |
institution | BVB |
isbn | 9780738458137 0738458139 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IBM Redbooks |
record_format | marc |
spelling | Maximizing Security with LinuxONE Yongkook Kim [and others] [Place of publication not identified] IBM Redbooks 2019 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Title from content provider LinuxONE is a hardware system designed to support and exploit the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service a variety of needs. On LinuxONE, security is built into both the hardware and software. This IBM® Redpaper publication gives a broad understanding of how to leverage the various security features that exploit and complement the LinuxONE hardware security features, such as these: Hardware accelerated encryption of data, delivered with near-zero overhead by the on-chip Central Processor Assist for Cryptographic Function (CPACF) and a dedicated Crypto Express adapter. Virtualization and industry leading isolation capabilities with PR/SM, EAL 5+ LPARs, DPM, KVM, and IBM z/VM®. The IBM Secure Service Container technology, which provides workload isolation, restricted administrator access, and tamper protection against internal threats, including from systems administrators. Other technologies that exploit LinuxONE security capabilities and deeper dives into practical use cases for these technologies. This IBM Redpaper publication was written for IT executives, architects, specialists, security administrators, and others who consider security when using LinuxONE. Kim, Yongkook MitwirkendeR ctb 0738458139 Erscheint auch als Druck-Ausgabe 0738458139 |
spellingShingle | Maximizing Security with LinuxONE |
title | Maximizing Security with LinuxONE |
title_auth | Maximizing Security with LinuxONE |
title_exact_search | Maximizing Security with LinuxONE |
title_full | Maximizing Security with LinuxONE Yongkook Kim [and others] |
title_fullStr | Maximizing Security with LinuxONE Yongkook Kim [and others] |
title_full_unstemmed | Maximizing Security with LinuxONE Yongkook Kim [and others] |
title_short | Maximizing Security with LinuxONE |
title_sort | maximizing security with linuxone |
work_keys_str_mv | AT kimyongkook maximizingsecuritywithlinuxone |