Language:
English
Pages:
1 online resource (1 volume)
,
illustrations.
Edition:
First edition (June 2018).
Series Statement:
IBM redbooks
Keywords:
z/OS
;
Data encryption (Computer science)
;
Operating systems (Computers)
;
Computer security
;
Electronic books
;
Electronic books ; local
Abstract:
Abstract This IBM® Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Note:
Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed July 11, 2018)
URL:
https://learning.oreilly.com/library/view/-/9780738456874/?ar