Related Books
Language: en
Pages: 332
Pages: 332
Type: BOOK - Published: 2016-03-22 - Publisher: IBM Redbooks
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasi
Language: en
Pages: 200
Pages: 200
Type: BOOK - Published: 2015-11-02 - Publisher: IBM Redbooks
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increas
Language: en
Pages: 188
Pages: 188
Type: BOOK - Published: 2015-09-25 - Publisher: IBM Redbooks
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this bo
Language: en
Pages: 494
Pages: 494
Type: BOOK - Published: 2011-08-18 - Publisher: IBM Redbooks
Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastr
Language: en
Pages: 550
Pages: 550
Type: BOOK - Published: 2007-04-26 - Publisher: IBM Redbooks
This book provides students of information systems with the background knowledge and skills necessary to begin using the basic security facilities of IBM System