Saved in:
Main Authors: | , , , , , , , , , , , , , |
---|---|
Corporate Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
[Erscheinungsort nicht ermittelbar]
IBM Redbooks
2021
|
Edition: | 1st edition. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9780738460222/?ar |
Summary: | This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. |
Item Description: | Online resource; Title from title page (viewed December 10, 2021) |
Physical Description: | 1 Online-Ressource (252 pages) |
ISBN: | 9780738460222 0738460222 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-072484993 | ||
003 | DE-627-1 | ||
005 | 20240228121533.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220112s2021 xx |||||o 00| ||eng c | ||
020 | |a 9780738460222 |9 978-0-7384-6022-2 | ||
020 | |a 0738460222 |9 0-7384-6022-2 | ||
035 | |a (DE-627-1)072484993 | ||
035 | |a (DE-599)KEP072484993 | ||
035 | |a (ORHE)9780738460222 | ||
035 | |a (DE-627-1)072484993 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8/24 |2 23 | |
100 | 1 | |a White, Bill |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Getting Started with z/OS Data Set Encryption |c White, Bill |
250 | |a 1st edition. | ||
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b IBM Redbooks |c 2021 | |
300 | |a 1 Online-Ressource (252 pages) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; Title from title page (viewed December 10, 2021) | ||
520 | |a This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. | ||
630 | 2 | 0 | |a z/OS |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Operating systems (Computers) | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a z/OS | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a operating systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Operating systems (Computers) | |
700 | 1 | |a Lewis, Cecilia |e VerfasserIn |4 aut | |
700 | 1 | |a Powers, Eysha |e VerfasserIn |4 aut | |
700 | 1 | |a Rossi, David |e VerfasserIn |4 aut | |
700 | 1 | |a Rossman, Eric |e VerfasserIn |4 aut | |
700 | 1 | |a Coulsonr, Andy |e VerfasserIn |4 aut | |
700 | 1 | |a Doll, Jacky |e VerfasserIn |4 aut | |
700 | 1 | |a Habbershow, Brad |e VerfasserIn |4 aut | |
700 | 1 | |a Liu, Thomas |e VerfasserIn |4 aut | |
700 | 1 | |a McCarry, Ryan |e VerfasserIn |4 aut | |
700 | 1 | |a Richard, Philippe |e VerfasserIn |4 aut | |
700 | 1 | |a Santos, Romoaldo |e VerfasserIn |4 aut | |
700 | 1 | |a Arnold, Isabel |e VerfasserIn |4 aut | |
700 | 1 | |a Lindberg, Kasper |e VerfasserIn |4 aut | |
710 | 2 | |a O'Reilly for Higher Education (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738460222/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-072484993 |
---|---|
_version_ | 1835903142830538752 |
adam_text | |
any_adam_object | |
author | White, Bill Lewis, Cecilia Powers, Eysha Rossi, David Rossman, Eric Coulsonr, Andy Doll, Jacky Habbershow, Brad Liu, Thomas McCarry, Ryan Richard, Philippe Santos, Romoaldo Arnold, Isabel Lindberg, Kasper |
author_corporate | O'Reilly for Higher Education (Firm) Safari, an O'Reilly Media Company |
author_corporate_role | ctb ctb |
author_facet | White, Bill Lewis, Cecilia Powers, Eysha Rossi, David Rossman, Eric Coulsonr, Andy Doll, Jacky Habbershow, Brad Liu, Thomas McCarry, Ryan Richard, Philippe Santos, Romoaldo Arnold, Isabel Lindberg, Kasper O'Reilly for Higher Education (Firm) Safari, an O'Reilly Media Company |
author_role | aut aut aut aut aut aut aut aut aut aut aut aut aut aut |
author_sort | White, Bill |
author_variant | b w bw c l cl e p ep d r dr e r er a c ac j d jd b h bh t l tl r m rm p r pr r s rs i a ia k l kl |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)072484993 (DE-599)KEP072484993 (ORHE)9780738460222 |
dewey-full | 005.8/24 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/24 |
dewey-search | 005.8/24 |
dewey-sort | 15.8 224 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03234cam a22006972c 4500</leader><controlfield tag="001">ZDB-30-ORH-072484993</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121533.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220112s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738460222</subfield><subfield code="9">978-0-7384-6022-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738460222</subfield><subfield code="9">0-7384-6022-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)072484993</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP072484993</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738460222</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)072484993</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/24</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">White, Bill</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Getting Started with z/OS Data Set Encryption</subfield><subfield code="c">White, Bill</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (252 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title page (viewed December 10, 2021)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">z/OS</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">z/OS</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lewis, Cecilia</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Powers, Eysha</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rossi, David</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rossman, Eric</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Coulsonr, Andy</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Doll, Jacky</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Habbershow, Brad</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Thomas</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McCarry, Ryan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Richard, Philippe</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Santos, Romoaldo</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Arnold, Isabel</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lindberg, Kasper</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">O'Reilly for Higher Education (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738460222/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-072484993 |
illustrated | Not Illustrated |
indexdate | 2025-06-25T12:14:34Z |
institution | BVB |
isbn | 9780738460222 0738460222 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (252 pages) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | IBM Redbooks |
record_format | marc |
spelling | White, Bill VerfasserIn aut Getting Started with z/OS Data Set Encryption White, Bill 1st edition. [Erscheinungsort nicht ermittelbar] IBM Redbooks 2021 1 Online-Ressource (252 pages) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; Title from title page (viewed December 10, 2021) This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. z/OS Data encryption (Computer science) Operating systems (Computers) Computer security Computer Security Chiffrement (Informatique) Systèmes d'exploitation (Ordinateurs) Sécurité informatique operating systems Lewis, Cecilia VerfasserIn aut Powers, Eysha VerfasserIn aut Rossi, David VerfasserIn aut Rossman, Eric VerfasserIn aut Coulsonr, Andy VerfasserIn aut Doll, Jacky VerfasserIn aut Habbershow, Brad VerfasserIn aut Liu, Thomas VerfasserIn aut McCarry, Ryan VerfasserIn aut Richard, Philippe VerfasserIn aut Santos, Romoaldo VerfasserIn aut Arnold, Isabel VerfasserIn aut Lindberg, Kasper VerfasserIn aut O'Reilly for Higher Education (Firm), MitwirkendeR ctb Safari, an O'Reilly Media Company. MitwirkendeR ctb |
spellingShingle | White, Bill Lewis, Cecilia Powers, Eysha Rossi, David Rossman, Eric Coulsonr, Andy Doll, Jacky Habbershow, Brad Liu, Thomas McCarry, Ryan Richard, Philippe Santos, Romoaldo Arnold, Isabel Lindberg, Kasper Getting Started with z/OS Data Set Encryption z/OS Data encryption (Computer science) Operating systems (Computers) Computer security Computer Security Chiffrement (Informatique) Systèmes d'exploitation (Ordinateurs) Sécurité informatique operating systems |
title | Getting Started with z/OS Data Set Encryption |
title_auth | Getting Started with z/OS Data Set Encryption |
title_exact_search | Getting Started with z/OS Data Set Encryption |
title_full | Getting Started with z/OS Data Set Encryption White, Bill |
title_fullStr | Getting Started with z/OS Data Set Encryption White, Bill |
title_full_unstemmed | Getting Started with z/OS Data Set Encryption White, Bill |
title_short | Getting Started with z/OS Data Set Encryption |
title_sort | getting started with z os data set encryption |
topic | z/OS Data encryption (Computer science) Operating systems (Computers) Computer security Computer Security Chiffrement (Informatique) Systèmes d'exploitation (Ordinateurs) Sécurité informatique operating systems |
topic_facet | z/OS Data encryption (Computer science) Operating systems (Computers) Computer security Computer Security Chiffrement (Informatique) Systèmes d'exploitation (Ordinateurs) Sécurité informatique operating systems |
work_keys_str_mv | AT whitebill gettingstartedwithzosdatasetencryption AT lewiscecilia gettingstartedwithzosdatasetencryption AT powerseysha gettingstartedwithzosdatasetencryption AT rossidavid gettingstartedwithzosdatasetencryption AT rossmaneric gettingstartedwithzosdatasetencryption AT coulsonrandy gettingstartedwithzosdatasetencryption AT dolljacky gettingstartedwithzosdatasetencryption AT habbershowbrad gettingstartedwithzosdatasetencryption AT liuthomas gettingstartedwithzosdatasetencryption AT mccarryryan gettingstartedwithzosdatasetencryption AT richardphilippe gettingstartedwithzosdatasetencryption AT santosromoaldo gettingstartedwithzosdatasetencryption AT arnoldisabel gettingstartedwithzosdatasetencryption AT lindbergkasper gettingstartedwithzosdatasetencryption AT oreillyforhighereducationfirm gettingstartedwithzosdatasetencryption AT safarianoreillymediacompany gettingstartedwithzosdatasetencryption |