IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller security feature checklist:
IBM® Storage Virtualize based storage systems are secure storage platforms that implement various security-related features, in terms of system-level access controls and data-level security features. This document outlines the available security features and options of IBM Storage Virtualize based s...
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Poughkeepsie, New York]
IBM Redbooks
[2023]
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780738461243/?ar |
Zusammenfassung: | IBM® Storage Virtualize based storage systems are secure storage platforms that implement various security-related features, in terms of system-level access controls and data-level security features. This document outlines the available security features and options of IBM Storage Virtualize based storage systems. It is not intended as a "how to" or best practice document. Instead, it is a checklist of features that can be reviewed by a user security team to aid in the definition of a policy to be followed when implementing IBM FlashSystem®, IBM SAN Volume Controller, and IBM Storage Virtualize for Public Cloud. |
Umfang: | 1 Online-Ressource (36 Seiten) |
ISBN: | 9780738461243 0738461245 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-094103615 | ||
003 | DE-627-1 | ||
005 | 20240228122023.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230802s2023 xx |||||o 00| ||eng c | ||
020 | |a 9780738461243 |c electronic bk. |9 978-0-7384-6124-3 | ||
020 | |a 0738461245 |c electronic bk. |9 0-7384-6124-5 | ||
035 | |a (DE-627-1)094103615 | ||
035 | |a (DE-599)KEP094103615 | ||
035 | |a (ORHE)9780738461243 | ||
035 | |a (DE-627-1)094103615 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 004.6/87 |2 23/eng/20230711 | |
100 | 1 | |a Scales, Bill |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller security feature checklist |c Bill Scales, Barry Whyte, James Whitaker |
250 | |a [First edition]. | ||
264 | 1 | |a [Poughkeepsie, New York] |b IBM Redbooks |c [2023] | |
300 | |a 1 Online-Ressource (36 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a IBM® Storage Virtualize based storage systems are secure storage platforms that implement various security-related features, in terms of system-level access controls and data-level security features. This document outlines the available security features and options of IBM Storage Virtualize based storage systems. It is not intended as a "how to" or best practice document. Instead, it is a checklist of features that can be reviewed by a user security team to aid in the definition of a policy to be followed when implementing IBM FlashSystem®, IBM SAN Volume Controller, and IBM Storage Virtualize for Public Cloud. | ||
650 | 0 | |a Storage area networks (Computer networks) | |
650 | 0 | |a Virtual storage (Computer science) | |
650 | 0 | |a IBM computers | |
650 | 4 | |a Réseaux de stockage (Informatique) | |
650 | 4 | |a Ordinateurs ; Mémoires virtuelles | |
650 | 4 | |a IBM (Ordinateurs) | |
650 | 4 | |a IBM computers | |
650 | 4 | |a Storage area networks (Computer networks) | |
650 | 4 | |a Virtual storage (Computer science) | |
700 | 1 | |a Whyte, Barry |e VerfasserIn |4 aut | |
700 | 1 | |a Whitaker, James |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738461243/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-094103615 |
---|---|
_version_ | 1821494939216773120 |
adam_text | |
any_adam_object | |
author | Scales, Bill Whyte, Barry Whitaker, James |
author_facet | Scales, Bill Whyte, Barry Whitaker, James |
author_role | aut aut aut |
author_sort | Scales, Bill |
author_variant | b s bs b w bw j w jw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)094103615 (DE-599)KEP094103615 (ORHE)9780738461243 |
dewey-full | 004.6/87 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6/87 |
dewey-search | 004.6/87 |
dewey-sort | 14.6 287 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02347cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-094103615</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228122023.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230802s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738461243</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-7384-6124-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738461245</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-7384-6124-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)094103615</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP094103615</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738461243</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)094103615</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6/87</subfield><subfield code="2">23/eng/20230711</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Scales, Bill</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller security feature checklist</subfield><subfield code="c">Bill Scales, Barry Whyte, James Whitaker</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Poughkeepsie, New York]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (36 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">IBM® Storage Virtualize based storage systems are secure storage platforms that implement various security-related features, in terms of system-level access controls and data-level security features. This document outlines the available security features and options of IBM Storage Virtualize based storage systems. It is not intended as a "how to" or best practice document. Instead, it is a checklist of features that can be reviewed by a user security team to aid in the definition of a policy to be followed when implementing IBM FlashSystem®, IBM SAN Volume Controller, and IBM Storage Virtualize for Public Cloud.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Storage area networks (Computer networks)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Virtual storage (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">IBM computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux de stockage (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs ; Mémoires virtuelles</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IBM (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IBM computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Storage area networks (Computer networks)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Virtual storage (Computer science)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Whyte, Barry</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Whitaker, James</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738461243/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-094103615 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:20Z |
institution | BVB |
isbn | 9780738461243 0738461245 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (36 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IBM Redbooks |
record_format | marc |
spelling | Scales, Bill VerfasserIn aut IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller security feature checklist Bill Scales, Barry Whyte, James Whitaker [First edition]. [Poughkeepsie, New York] IBM Redbooks [2023] 1 Online-Ressource (36 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier IBM® Storage Virtualize based storage systems are secure storage platforms that implement various security-related features, in terms of system-level access controls and data-level security features. This document outlines the available security features and options of IBM Storage Virtualize based storage systems. It is not intended as a "how to" or best practice document. Instead, it is a checklist of features that can be reviewed by a user security team to aid in the definition of a policy to be followed when implementing IBM FlashSystem®, IBM SAN Volume Controller, and IBM Storage Virtualize for Public Cloud. Storage area networks (Computer networks) Virtual storage (Computer science) IBM computers Réseaux de stockage (Informatique) Ordinateurs ; Mémoires virtuelles IBM (Ordinateurs) Whyte, Barry VerfasserIn aut Whitaker, James VerfasserIn aut |
spellingShingle | Scales, Bill Whyte, Barry Whitaker, James IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller security feature checklist Storage area networks (Computer networks) Virtual storage (Computer science) IBM computers Réseaux de stockage (Informatique) Ordinateurs ; Mémoires virtuelles IBM (Ordinateurs) |
title | IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller security feature checklist |
title_auth | IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller security feature checklist |
title_exact_search | IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller security feature checklist |
title_full | IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller security feature checklist Bill Scales, Barry Whyte, James Whitaker |
title_fullStr | IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller security feature checklist Bill Scales, Barry Whyte, James Whitaker |
title_full_unstemmed | IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller security feature checklist Bill Scales, Barry Whyte, James Whitaker |
title_short | IBM Storage Virtualize, IBM Storage FlashSystem, and IBM SAN Volume Controller security feature checklist |
title_sort | ibm storage virtualize ibm storage flashsystem and ibm san volume controller security feature checklist |
topic | Storage area networks (Computer networks) Virtual storage (Computer science) IBM computers Réseaux de stockage (Informatique) Ordinateurs ; Mémoires virtuelles IBM (Ordinateurs) |
topic_facet | Storage area networks (Computer networks) Virtual storage (Computer science) IBM computers Réseaux de stockage (Informatique) Ordinateurs ; Mémoires virtuelles IBM (Ordinateurs) |
work_keys_str_mv | AT scalesbill ibmstoragevirtualizeibmstorageflashsystemandibmsanvolumecontrollersecurityfeaturechecklist AT whytebarry ibmstoragevirtualizeibmstorageflashsystemandibmsanvolumecontrollersecurityfeaturechecklist AT whitakerjames ibmstoragevirtualizeibmstorageflashsystemandibmsanvolumecontrollersecurityfeaturechecklist |