This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.
In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments.
This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Explore Getting Started with z/OS Data Set Encryption by Bill White, Cecilia Carranza Lewis, Eysha Shirrine Powers, David Rossi, Eric Rossman, Andy Coulsonr, Jacky Doll, Brad Habbershow, Thomas Liu, Ryan McCarry, Philippe Richard, Romoaldo Santos, Isabel Arnold & Kasper Lindberg on eBooksStore by Arnlweb. Discover book details, reader ratings, reviews, release information, genres, and related digital books available through the iTunes Store.
This book is part of our growing collection of bestselling eBooks, popular digital reading materials, and trending author releases. Readers can explore similar books, discover new authors, and browse related genres including fiction, romance, mystery, fantasy, business, self-help, educational books, and more.
Our platform helps readers discover highly rated digital books optimized for smartphones, tablets, laptops, and desktop devices. Browse fast-loading book pages, reader reviews, and popular recommendations from bestselling authors worldwide.