Transitioning to quantum-safe cryptography on IBM Z
Description
More Details
Notes
Also in this Series
Reviews from GoodReads
Citations
White, B. (. e., Andre, D., Arquero, G., Bajaj, R., Cronin, J., Dames, A., Lyksborg, H., Miranda, A., & Weiss, M. (2022). Transitioning to quantum-safe cryptography on IBM Z ([First edition].). IBM Redbooks.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Bill (Telecommunications engineer), White et al.. 2022. Transitioning to Quantum-safe Cryptography On IBM Z. Poughkeepsie, NY: IBM Redbooks.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Bill (Telecommunications engineer), White et al.. Transitioning to Quantum-safe Cryptography On IBM Z Poughkeepsie, NY: IBM Redbooks, 2022.
Harvard Citation (style guide)White, B. (. e., Andre, D., Arquero, G., Bajaj, R., Cronin, J., Dames, A. and Lyksborg, H. et al (2022). Transitioning to quantum-safe cryptography on IBM Z. [First edn]. Poughkeepsie, NY: IBM Redbooks.
MLA Citation, 9th Edition (style guide)White, Bill (Telecommunications engineer),, et al. Transitioning to Quantum-safe Cryptography On IBM Z [First edition]., IBM Redbooks, 2022.
Staff View
Grouping Information
Grouped Work ID | 9693c14c-2a51-fc8c-2a63-ba2c7dfa2571-eng |
---|---|
Full title | transitioning to quantum safe cryptography on ibm z |
Author | white bill |
Grouping Category | book |
Last Update | 2025-01-24 12:33:29PM |
Last Indexed | 2025-02-07 03:21:58AM |
Book Cover Information
Image Source | default |
---|---|
First Loaded | Aug 5, 2023 |
Last Used | Jan 25, 2025 |
Marc Record
First Detected | Mar 20, 2023 10:19:26 AM |
---|---|
Last File Modification Time | Dec 17, 2024 08:21:34 AM |
Suppressed | Record had no items |
MARC Record
LEADER | 03112cam a22004937i 4500 | ||
---|---|---|---|
001 | on1337560974 | ||
003 | OCoLC | ||
005 | 20241217081931.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 220728s2022 nyua o 000 0 eng d | ||
020 | |a 9780738460680|q (electronic bk.) | ||
020 | |a 0738460680|q (electronic bk.) | ||
035 | |a (OCoLC)1337560974 | ||
037 | |a 9780738460680|b O'Reilly Media | ||
040 | |a ORMDA|b eng|e rda|e pn|c ORMDA|d OCLCF|d OCLCQ|d OCLCO|d OCLCL | ||
049 | |a MAIN | ||
050 | 4 | |a QA76.9.A25 | |
082 | 0 | 4 | |a 005.8|2 23/eng/20220728 |
100 | 1 | |a White, Bill|c (Telecommunications engineer),|e author.|1 https://id.oclc.org/worldcat/entity/E39PCjKWWXgRjmB7hQHYPW9Q4q | |
245 | 1 | 0 | |a Transitioning to quantum-safe cryptography on IBM Z /|c Bill White, Didier Andre, Gregg Arquero, Ritu Bajaj, Joe Cronin, Anne Dames, Henrik Lyksborg, Alexandra Miranda, Maxwell Weiss. |
250 | |a [First edition]. | ||
264 | 1 | |a Poughkeepsie, NY :|b IBM Redbooks,|c [2022] | |
300 | |a 1 online resource (190 pages) :|b illustrations | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
520 | |a As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography. This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities. This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts. | ||
590 | |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Information technology|x Security measures.|9 95210 | |
650 | 0 | |a Computer security|x Management.|9 93489 | |
650 | 0 | |a Computer networks|x Security measures.|9 68848 | |
650 | 0 | |a Data protection.|9 35538 | |
700 | 1 | |a Andre, Didier,|e author. | |
700 | 1 | |a Arquero, Gregg,|e author. | |
700 | 1 | |a Bajaj, Ritu,|e author. | |
700 | 1 | |a Cronin, Joe,|e author. | |
700 | 1 | |a Dames, Anne,|e author. | |
700 | 1 | |a Lyksborg, Henrik,|e author. | |
700 | 1 | |a Miranda, Alexandra,|e author. | |
700 | 1 | |a Weiss, Maxwell,|e author. | |
856 | 4 | 0 | |u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9780738460680/?ar|x O'Reilly|z eBook |
994 | |a 92|b VIA | ||
999 | |c 284051|d 284051 |