Transitioning to quantum-safe cryptography on IBM Z:
As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break cl...
Gespeichert in:
Beteiligte Personen: | , , , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Poughkeepsie, NY
IBM Redbooks
[2022]
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780738460680/?ar |
Zusammenfassung: | As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography. This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities. This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. |
Umfang: | 1 Online-Ressource (190 Seiten) illustrations |
ISBN: | 9780738460680 0738460680 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-081846843 | ||
003 | DE-627-1 | ||
005 | 20240228121741.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220906s2022 xx |||||o 00| ||eng c | ||
020 | |a 9780738460680 |c electronic bk. |9 978-0-7384-6068-0 | ||
020 | |a 0738460680 |c electronic bk. |9 0-7384-6068-0 | ||
035 | |a (DE-627-1)081846843 | ||
035 | |a (DE-599)KEP081846843 | ||
035 | |a (ORHE)9780738460680 | ||
035 | |a (DE-627-1)081846843 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20220728 | |
100 | 1 | |a White, Bill |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Transitioning to quantum-safe cryptography on IBM Z |c Bill White, Didier Andre, Gregg Arquero, Ritu Bajaj, Joe Cronin, Anne Dames, Henrik Lyksborg, Alexandra Miranda, Maxwell Weiss |
250 | |a [First edition]. | ||
264 | 1 | |a Poughkeepsie, NY |b IBM Redbooks |c [2022] | |
300 | |a 1 Online-Ressource (190 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography. This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities. This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. | ||
650 | 0 | |a Information technology |x Security measures | |
650 | 0 | |a Computer security |x Management | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Data protection | |
650 | 4 | |a Technologie de l'information ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique ; Gestion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security ; Management | |
650 | 4 | |a Data protection | |
650 | 4 | |a Information technology ; Security measures | |
700 | 1 | |a Andre, Didier |e VerfasserIn |4 aut | |
700 | 1 | |a Arquero, Gregg |e VerfasserIn |4 aut | |
700 | 1 | |a Bajaj, Ritu |e VerfasserIn |4 aut | |
700 | 1 | |a Cronin, Joe |e VerfasserIn |4 aut | |
700 | 1 | |a Dames, Anne |e VerfasserIn |4 aut | |
700 | 1 | |a Lyksborg, Henrik |e VerfasserIn |4 aut | |
700 | 1 | |a Miranda, Alexandra |e VerfasserIn |4 aut | |
700 | 1 | |a Weiss, Maxwell |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738460680/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-081846843 |
---|---|
_version_ | 1821494819602563072 |
adam_text | |
any_adam_object | |
author | White, Bill Andre, Didier Arquero, Gregg Bajaj, Ritu Cronin, Joe Dames, Anne Lyksborg, Henrik Miranda, Alexandra Weiss, Maxwell |
author_facet | White, Bill Andre, Didier Arquero, Gregg Bajaj, Ritu Cronin, Joe Dames, Anne Lyksborg, Henrik Miranda, Alexandra Weiss, Maxwell |
author_role | aut aut aut aut aut aut aut aut aut |
author_sort | White, Bill |
author_variant | b w bw d a da g a ga r b rb j c jc a d ad h l hl a m am m w mw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)081846843 (DE-599)KEP081846843 (ORHE)9780738460680 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03408cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-081846843</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121741.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220906s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738460680</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-7384-6068-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738460680</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-7384-6068-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)081846843</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP081846843</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738460680</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)081846843</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20220728</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">White, Bill</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Transitioning to quantum-safe cryptography on IBM Z</subfield><subfield code="c">Bill White, Didier Andre, Gregg Arquero, Ritu Bajaj, Joe Cronin, Anne Dames, Henrik Lyksborg, Alexandra Miranda, Maxwell Weiss</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Poughkeepsie, NY</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (190 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography. This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities. This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Andre, Didier</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Arquero, Gregg</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bajaj, Ritu</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cronin, Joe</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dames, Anne</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lyksborg, Henrik</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miranda, Alexandra</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Weiss, Maxwell</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738460680/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-081846843 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:26Z |
institution | BVB |
isbn | 9780738460680 0738460680 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (190 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IBM Redbooks |
record_format | marc |
spelling | White, Bill VerfasserIn aut Transitioning to quantum-safe cryptography on IBM Z Bill White, Didier Andre, Gregg Arquero, Ritu Bajaj, Joe Cronin, Anne Dames, Henrik Lyksborg, Alexandra Miranda, Maxwell Weiss [First edition]. Poughkeepsie, NY IBM Redbooks [2022] 1 Online-Ressource (190 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography. This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities. This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures Andre, Didier VerfasserIn aut Arquero, Gregg VerfasserIn aut Bajaj, Ritu VerfasserIn aut Cronin, Joe VerfasserIn aut Dames, Anne VerfasserIn aut Lyksborg, Henrik VerfasserIn aut Miranda, Alexandra VerfasserIn aut Weiss, Maxwell VerfasserIn aut |
spellingShingle | White, Bill Andre, Didier Arquero, Gregg Bajaj, Ritu Cronin, Joe Dames, Anne Lyksborg, Henrik Miranda, Alexandra Weiss, Maxwell Transitioning to quantum-safe cryptography on IBM Z Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
title | Transitioning to quantum-safe cryptography on IBM Z |
title_auth | Transitioning to quantum-safe cryptography on IBM Z |
title_exact_search | Transitioning to quantum-safe cryptography on IBM Z |
title_full | Transitioning to quantum-safe cryptography on IBM Z Bill White, Didier Andre, Gregg Arquero, Ritu Bajaj, Joe Cronin, Anne Dames, Henrik Lyksborg, Alexandra Miranda, Maxwell Weiss |
title_fullStr | Transitioning to quantum-safe cryptography on IBM Z Bill White, Didier Andre, Gregg Arquero, Ritu Bajaj, Joe Cronin, Anne Dames, Henrik Lyksborg, Alexandra Miranda, Maxwell Weiss |
title_full_unstemmed | Transitioning to quantum-safe cryptography on IBM Z Bill White, Didier Andre, Gregg Arquero, Ritu Bajaj, Joe Cronin, Anne Dames, Henrik Lyksborg, Alexandra Miranda, Maxwell Weiss |
title_short | Transitioning to quantum-safe cryptography on IBM Z |
title_sort | transitioning to quantum safe cryptography on ibm z |
topic | Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
topic_facet | Information technology Security measures Computer security Management Computer networks Security measures Data protection Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Réseaux d'ordinateurs ; Sécurité ; Mesures Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
work_keys_str_mv | AT whitebill transitioningtoquantumsafecryptographyonibmz AT andredidier transitioningtoquantumsafecryptographyonibmz AT arquerogregg transitioningtoquantumsafecryptographyonibmz AT bajajritu transitioningtoquantumsafecryptographyonibmz AT croninjoe transitioningtoquantumsafecryptographyonibmz AT damesanne transitioningtoquantumsafecryptographyonibmz AT lyksborghenrik transitioningtoquantumsafecryptographyonibmz AT mirandaalexandra transitioningtoquantumsafecryptographyonibmz AT weissmaxwell transitioningtoquantumsafecryptographyonibmz |