Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Poughkeepsie, NY
IBM Corporation, International Technical Support Organization
2019
|
Ausgabe: | Second edition (September 2019). |
Schriftenreihe: | IBM redbooks
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780738457970/?ar |
Zusammenfassung: | This IBM® Redbooks® publication provides a security and compliance solution that is optimized for virtualized environments on IBM Power Systems"!servers, running IBM PowerVM® and IBM AIX®. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving new threats. The IBM business-driven approach to enterprise security that is used with solutions, such as IBM PowerSC"! makes IBM the premier security vendor in the market today. The book explores, tests, and documents scenarios using IBM PowerSC that leverage IBM Power Systems servers architecture and software solutions from IBM to help defend the virtualized data center and cloud infrastructure against ever evolving new threats. This publication helps IT and Security managers, architects, and consultants to strengthen their security and compliance posture in a virtualized environment running IBM PowerVM |
Beschreibung: | "This edition applies to: IBM PowerSC v1.2, IBM PowerSC Trusted Network Connect and Patch Management v1.2.0.0; IBM AIX v7.2, Red Hat Enterprise Linux Server release v7.4"--Page 2 of cover. - Number on back cover: SG24-8082-01. - Includes bibliographical references. - Online resource; title from cover (Safari, viewed October 4, 2019) |
Umfang: | 1 online resource (1 volume) illustrations |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-048600970 | ||
003 | DE-627-1 | ||
005 | 20240228120901.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2019 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)048600970 | ||
035 | |a (DE-599)KEP048600970 | ||
035 | |a (ORHE)9780738457970 | ||
035 | |a (DE-627-1)048600970 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Quintero, Dino |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments |c Dino Quintero [and four others] |
250 | |a Second edition (September 2019). | ||
264 | 1 | |a Poughkeepsie, NY |b IBM Corporation, International Technical Support Organization |c 2019 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a IBM redbooks | |
500 | |a "This edition applies to: IBM PowerSC v1.2, IBM PowerSC Trusted Network Connect and Patch Management v1.2.0.0; IBM AIX v7.2, Red Hat Enterprise Linux Server release v7.4"--Page 2 of cover. - Number on back cover: SG24-8082-01. - Includes bibliographical references. - Online resource; title from cover (Safari, viewed October 4, 2019) | ||
520 | |a This IBM® Redbooks® publication provides a security and compliance solution that is optimized for virtualized environments on IBM Power Systems"!servers, running IBM PowerVM® and IBM AIX®. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving new threats. The IBM business-driven approach to enterprise security that is used with solutions, such as IBM PowerSC"! makes IBM the premier security vendor in the market today. The book explores, tests, and documents scenarios using IBM PowerSC that leverage IBM Power Systems servers architecture and software solutions from IBM to help defend the virtualized data center and cloud infrastructure against ever evolving new threats. This publication helps IT and Security managers, architects, and consultants to strengthen their security and compliance posture in a virtualized environment running IBM PowerVM | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Information technology |x Management | |
650 | 0 | |a Computer security | |
650 | 0 | |a Virtual computer systems |x Security measures | |
650 | 0 | |a Data protection | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Technologie de l'information ; Gestion | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Systèmes virtuels (Informatique) ; Sécurité ; Mesures | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Information technology ; Management | |
710 | 2 | |a International Business Machines Corporation. |b International Technical Support Organization, |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738457970/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-048600970 |
---|---|
_version_ | 1833357054721392640 |
adam_text | |
any_adam_object | |
author | Quintero, Dino |
author_facet | Quintero, Dino |
author_role | aut |
author_sort | Quintero, Dino |
author_variant | d q dq |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)048600970 (DE-599)KEP048600970 (ORHE)9780738457970 |
edition | Second edition (September 2019). |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03300cam a22005172c 4500</leader><controlfield tag="001">ZDB-30-ORH-048600970</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120901.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048600970</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048600970</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738457970</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048600970</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Quintero, Dino</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments</subfield><subfield code="c">Dino Quintero [and four others]</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition (September 2019).</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Poughkeepsie, NY</subfield><subfield code="b">IBM Corporation, International Technical Support Organization</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IBM redbooks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This edition applies to: IBM PowerSC v1.2, IBM PowerSC Trusted Network Connect and Patch Management v1.2.0.0; IBM AIX v7.2, Red Hat Enterprise Linux Server release v7.4"--Page 2 of cover. - Number on back cover: SG24-8082-01. - Includes bibliographical references. - Online resource; title from cover (Safari, viewed October 4, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This IBM® Redbooks® publication provides a security and compliance solution that is optimized for virtualized environments on IBM Power Systems"!servers, running IBM PowerVM® and IBM AIX®. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving new threats. The IBM business-driven approach to enterprise security that is used with solutions, such as IBM PowerSC"! makes IBM the premier security vendor in the market today. The book explores, tests, and documents scenarios using IBM PowerSC that leverage IBM Power Systems servers architecture and software solutions from IBM to help defend the virtualized data center and cloud infrastructure against ever evolving new threats. This publication helps IT and Security managers, architects, and consultants to strengthen their security and compliance posture in a virtualized environment running IBM PowerVM</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Virtual computer systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes virtuels (Informatique) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Management</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Business Machines Corporation.</subfield><subfield code="b">International Technical Support Organization,</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738457970/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-048600970 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:45:35Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IBM Corporation, International Technical Support Organization |
record_format | marc |
series2 | IBM redbooks |
spelling | Quintero, Dino VerfasserIn aut Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments Dino Quintero [and four others] Second edition (September 2019). Poughkeepsie, NY IBM Corporation, International Technical Support Organization 2019 1 online resource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier IBM redbooks "This edition applies to: IBM PowerSC v1.2, IBM PowerSC Trusted Network Connect and Patch Management v1.2.0.0; IBM AIX v7.2, Red Hat Enterprise Linux Server release v7.4"--Page 2 of cover. - Number on back cover: SG24-8082-01. - Includes bibliographical references. - Online resource; title from cover (Safari, viewed October 4, 2019) This IBM® Redbooks® publication provides a security and compliance solution that is optimized for virtualized environments on IBM Power Systems"!servers, running IBM PowerVM® and IBM AIX®. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving new threats. The IBM business-driven approach to enterprise security that is used with solutions, such as IBM PowerSC"! makes IBM the premier security vendor in the market today. The book explores, tests, and documents scenarios using IBM PowerSC that leverage IBM Power Systems servers architecture and software solutions from IBM to help defend the virtualized data center and cloud infrastructure against ever evolving new threats. This publication helps IT and Security managers, architects, and consultants to strengthen their security and compliance posture in a virtualized environment running IBM PowerVM Computer networks Security measures Information technology Management Computer security Virtual computer systems Security measures Data protection Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Gestion Sécurité informatique Systèmes virtuels (Informatique) ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Information technology ; Management International Business Machines Corporation. International Technical Support Organization, Verlag pbl |
spellingShingle | Quintero, Dino Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments Computer networks Security measures Information technology Management Computer security Virtual computer systems Security measures Data protection Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Gestion Sécurité informatique Systèmes virtuels (Informatique) ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Information technology ; Management |
title | Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments |
title_auth | Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments |
title_exact_search | Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments |
title_full | Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments Dino Quintero [and four others] |
title_fullStr | Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments Dino Quintero [and four others] |
title_full_unstemmed | Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments Dino Quintero [and four others] |
title_short | Simplify management of security and compliance with IBM PowerSC in cloud and virtualized environments |
title_sort | simplify management of security and compliance with ibm powersc in cloud and virtualized environments |
topic | Computer networks Security measures Information technology Management Computer security Virtual computer systems Security measures Data protection Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Gestion Sécurité informatique Systèmes virtuels (Informatique) ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Information technology ; Management |
topic_facet | Computer networks Security measures Information technology Management Computer security Virtual computer systems Security measures Data protection Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Gestion Sécurité informatique Systèmes virtuels (Informatique) ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Information technology ; Management |
work_keys_str_mv | AT quinterodino simplifymanagementofsecurityandcompliancewithibmpowerscincloudandvirtualizedenvironments AT internationalbusinessmachinescorporationinternationaltechnicalsupportorganization simplifymanagementofsecurityandcompliancewithibmpowerscincloudandvirtualizedenvironments |