Related Books
Language: en
Pages: 332
Pages: 332
Type: BOOK - Published: 2016-03-22 - Publisher: IBM Redbooks
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasi
Language: en
Pages: 200
Pages: 200
Type: BOOK - Published: 2015-11-02 - Publisher: IBM Redbooks
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increas
Language: en
Pages: 188
Pages: 188
Type: BOOK - Published: 2015-09-25 - Publisher: IBM Redbooks
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this bo
Language: en
Pages: 494
Pages: 494
Type: BOOK - Published: 2011-08-18 - Publisher: IBM Redbooks
Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastr
Language: en
Pages: 274
Pages: 274
Type: BOOK - Published: 2019-08-01 - Publisher: IBM Redbooks
As workloads are being offloaded to IBM® LinuxONE based cloud environments, it is important to ensure that these workloads and environments are secure. This IB