Getting started with IBM Hyper Protect Data Controller:
IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes--security policies are k...
Gespeichert in:
Beteiligte Personen: | , , , , , , , |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
IBM Redbooks
2022
|
Ausgabe: | 1st edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780738460031/?ar |
Zusammenfassung: | IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes--security policies are kept and honored whenever the data is accessed and future data access can be revoked even after data leaves the system of record. This IBM Redbooks® publication can assist you with determining how to get started with IBM Hyper Protect Data Controller through a use case approach. It will help you plan for, install, tailor and configure the Hyper Protect Data Controller. It includes information about the following topics: Concepts and reference architecture Common use cases with implementation guidance and advice Implementation and policy examples Typical operational tasks for creating policies and preparing for audits Monitoring user activity and events This IBM Redbooks publication is written for IT Managers, IT Architects, Security Administrators, data owners, and data consumers. |
Beschreibung: | Online resource; Title from title page (viewed January 4, 2022) |
Umfang: | 1 Online-Ressource (268 Seiten) |
ISBN: | 9780738460031 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-072484950 | ||
003 | DE-627-1 | ||
005 | 20240228121541.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220112s2022 xx |||||o 00| ||eng c | ||
020 | |a 9780738460031 |9 978-0-7384-6003-1 | ||
035 | |a (DE-627-1)072484950 | ||
035 | |a (DE-599)KEP072484950 | ||
035 | |a (ORHE)9780738460031 | ||
035 | |a (DE-627-1)072484950 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a White, Bill |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Getting started with IBM Hyper Protect Data Controller |c White, Bill |
250 | |a 1st edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b IBM Redbooks |c 2022 | |
300 | |a 1 Online-Ressource (268 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; Title from title page (viewed January 4, 2022) | ||
520 | |a IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes--security policies are kept and honored whenever the data is accessed and future data access can be revoked even after data leaves the system of record. This IBM Redbooks® publication can assist you with determining how to get started with IBM Hyper Protect Data Controller through a use case approach. It will help you plan for, install, tailor and configure the Hyper Protect Data Controller. It includes information about the following topics: Concepts and reference architecture Common use cases with implementation guidance and advice Implementation and policy examples Typical operational tasks for creating policies and preparing for audits Monitoring user activity and events This IBM Redbooks publication is written for IT Managers, IT Architects, Security Administrators, data owners, and data consumers. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 0 | |a Cloud computing |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Infonuagique ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Coulson, Andy |e VerfasserIn |4 aut | |
700 | 1 | |a Hoareau, Guillaume |e VerfasserIn |4 aut | |
700 | 1 | |a Katonica, Jason |e VerfasserIn |4 aut | |
700 | 1 | |a Panting, Roy |e VerfasserIn |4 aut | |
700 | 1 | |a Richard, Philippe |e VerfasserIn |4 aut | |
700 | 1 | |a Weiss, Maxwell |e VerfasserIn |4 aut | |
700 | 1 | |a Yan, Eva |e VerfasserIn |4 aut | |
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738460031/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-072484950 |
---|---|
_version_ | 1829007739738652672 |
adam_text | |
any_adam_object | |
author | White, Bill Coulson, Andy Hoareau, Guillaume Katonica, Jason Panting, Roy Richard, Philippe Weiss, Maxwell Yan, Eva |
author_corporate | Safari, an O'Reilly Media Company |
author_corporate_role | ctb |
author_facet | White, Bill Coulson, Andy Hoareau, Guillaume Katonica, Jason Panting, Roy Richard, Philippe Weiss, Maxwell Yan, Eva Safari, an O'Reilly Media Company |
author_role | aut aut aut aut aut aut aut aut |
author_sort | White, Bill |
author_variant | b w bw a c ac g h gh j k jk r p rp p r pr m w mw e y ey |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)072484950 (DE-599)KEP072484950 (ORHE)9780738460031 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03079cam a22005532c 4500</leader><controlfield tag="001">ZDB-30-ORH-072484950</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121541.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220112s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738460031</subfield><subfield code="9">978-0-7384-6003-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)072484950</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP072484950</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738460031</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)072484950</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">White, Bill</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Getting started with IBM Hyper Protect Data Controller</subfield><subfield code="c">White, Bill</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (268 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title page (viewed January 4, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes--security policies are kept and honored whenever the data is accessed and future data access can be revoked even after data leaves the system of record. This IBM Redbooks® publication can assist you with determining how to get started with IBM Hyper Protect Data Controller through a use case approach. It will help you plan for, install, tailor and configure the Hyper Protect Data Controller. It includes information about the following topics: Concepts and reference architecture Common use cases with implementation guidance and advice Implementation and policy examples Typical operational tasks for creating policies and preparing for audits Monitoring user activity and events This IBM Redbooks publication is written for IT Managers, IT Architects, Security Administrators, data owners, and data consumers.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infonuagique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Coulson, Andy</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hoareau, Guillaume</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katonica, Jason</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Panting, Roy</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Richard, Philippe</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Weiss, Maxwell</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Eva</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738460031/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-072484950 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:05Z |
institution | BVB |
isbn | 9780738460031 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (268 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IBM Redbooks |
record_format | marc |
spelling | White, Bill VerfasserIn aut Getting started with IBM Hyper Protect Data Controller White, Bill 1st edition. [Erscheinungsort nicht ermittelbar] IBM Redbooks 2022 1 Online-Ressource (268 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; Title from title page (viewed January 4, 2022) IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes--security policies are kept and honored whenever the data is accessed and future data access can be revoked even after data leaves the system of record. This IBM Redbooks® publication can assist you with determining how to get started with IBM Hyper Protect Data Controller through a use case approach. It will help you plan for, install, tailor and configure the Hyper Protect Data Controller. It includes information about the following topics: Concepts and reference architecture Common use cases with implementation guidance and advice Implementation and policy examples Typical operational tasks for creating policies and preparing for audits Monitoring user activity and events This IBM Redbooks publication is written for IT Managers, IT Architects, Security Administrators, data owners, and data consumers. Computer networks Security measures Computer security Cloud computing Security measures Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Infonuagique ; Sécurité ; Mesures Computer networks ; Security measures Coulson, Andy VerfasserIn aut Hoareau, Guillaume VerfasserIn aut Katonica, Jason VerfasserIn aut Panting, Roy VerfasserIn aut Richard, Philippe VerfasserIn aut Weiss, Maxwell VerfasserIn aut Yan, Eva VerfasserIn aut Safari, an O'Reilly Media Company. MitwirkendeR ctb |
spellingShingle | White, Bill Coulson, Andy Hoareau, Guillaume Katonica, Jason Panting, Roy Richard, Philippe Weiss, Maxwell Yan, Eva Getting started with IBM Hyper Protect Data Controller Computer networks Security measures Computer security Cloud computing Security measures Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Infonuagique ; Sécurité ; Mesures Computer networks ; Security measures |
title | Getting started with IBM Hyper Protect Data Controller |
title_auth | Getting started with IBM Hyper Protect Data Controller |
title_exact_search | Getting started with IBM Hyper Protect Data Controller |
title_full | Getting started with IBM Hyper Protect Data Controller White, Bill |
title_fullStr | Getting started with IBM Hyper Protect Data Controller White, Bill |
title_full_unstemmed | Getting started with IBM Hyper Protect Data Controller White, Bill |
title_short | Getting started with IBM Hyper Protect Data Controller |
title_sort | getting started with ibm hyper protect data controller |
topic | Computer networks Security measures Computer security Cloud computing Security measures Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Infonuagique ; Sécurité ; Mesures Computer networks ; Security measures |
topic_facet | Computer networks Security measures Computer security Cloud computing Security measures Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Infonuagique ; Sécurité ; Mesures Computer networks ; Security measures |
work_keys_str_mv | AT whitebill gettingstartedwithibmhyperprotectdatacontroller AT coulsonandy gettingstartedwithibmhyperprotectdatacontroller AT hoareauguillaume gettingstartedwithibmhyperprotectdatacontroller AT katonicajason gettingstartedwithibmhyperprotectdatacontroller AT pantingroy gettingstartedwithibmhyperprotectdatacontroller AT richardphilippe gettingstartedwithibmhyperprotectdatacontroller AT weissmaxwell gettingstartedwithibmhyperprotectdatacontroller AT yaneva gettingstartedwithibmhyperprotectdatacontroller AT safarianoreillymediacompany gettingstartedwithibmhyperprotectdatacontroller |