Home > General > IBM System Storage Data Encryption
22%
IBM System Storage Data Encryption

IBM System Storage Data Encryption

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Strong security is not a luxury anymore in today's round-the-clock, global business environment. It is a requirement. Ensuring the protection and security of an organization's information is the foundation of any successful business. Encrypting data is a key element when addressing these concerns. IBM® provides a wide range of IBM storage hardware products that are capable of encrypting the data that is written on them. This product line includes a variety of disk systems and tape drives. Several IBM storage products support encryption.

Data can be encrypted by means of special software programs, hardware adapters, facilities, or outside of the device where the data is stored. Encrypting data with software programs takes away processor power, and encrypting data with hardware requires additional investment in hardware for the computers. In addition to hardware encryption facilities, IBM disk systems and tape drives provide data encryption capabilities. This IBM Redbooks® publication explores the IBM solutions to encrypt data in the enterprise, as well as key management using the Tivoli® Key Lifecycle Manager.

This book describes IBM System Storage® data encryption. This book is intended for anyone who needs to learn more about the concepts of data encryption and the IBM storage hardware and software that enable data encryption.

About the Author
Alex Osuna is a Project Leader at the International Technical Support Organization, Tucson Center. He writes extensively and teaches IBM classes worldwide on all areas of storage. Before joining the ITSO five years ago, Alex was a Tivoli Principal Systems Engineer in storage. Alex has over 31 years experience in the IT industry with over 29 of them spent in the storage arena. He holds certification from IBM, Red Hat, and Microsoft.

David Crowther has over 30 years experience in the IT industry, the last 24 working for IBM. During his IBM career, he has worked in Technical Pre-sales, Services and Support, and currently works in IBM BetaWorks where he manages early beta programs for Tivoli Security and Provisioning products. In addition, he creates and runs enablement workshops, authors technical cookbooks and manuals, and provides technical support, presents, and acts as a subject matter expert for the new products. He also has wide experience in running beta programs on and supporting products from many of the other IBM brands, including Large Systems, Networking, Pervasive, Lotus, Voice, and WebSphere. He is a Consulting IT Specialist, Chartered IT Professional, and Chartered Engineer, and he holds a Master's degree in Electrical Sciences from Cambridge University.

Reimar Pflieger is an IT Specialist from Germany working at the IBM Global Technology Services Organization. He provides post-sales support as a Product Field Engineer for RMSS products in Mainz. He joined IBM in 1998 and worked for many years as a Process Support and Manufacturing Engineer in Disk and Wafer Production. In his current job role as an RMSS Product Field Engineer, he supports Open Systems Tape, Tape Libraries from entry level to high-end level and Tape Encryption solutions. His experience with Operating Systems includes Linux, Windows and AIX platforms.

Esha Seth is a Software Engineer working at the IBM Systems and Technology Labs in Pune, India. She graduated in 2006 with a Bachelor of Engineering degree in Computer Science from Pune University. She joined IBM after graduation and has worked as a Systems Software developer for the Systems and Storage Management group. During her tenure at IBM, she has contributed to all phases of the software development life cycle and collaborated with global teams in various projects for the IBM Systems Director product. Her areas of technical expertise include understanding storage and systems Management, IBM Systems Management solutions, service-oriented architecture (SOA), JAVA and Eclipse and OSGi plug-in development. Currently, she is a part of the IBM Systems Director Network Manager team and is involved in its development efforts.

Ferenc Toth is a Test Engineer working for DS8000 Storage Server manufacturing in Vac, Hungary. He has four years of experience in high-end disk subsystem testing, test process optimization, and new product implementation. He holds a Masters of Science degree in Electrical Engineering, with a specialization in embedded systems, from the Budapest University of Technology and Economics, Hungary. His focus is hardware and software qualification for all the supported DS8000 releases in the manufacturing environment.

Table Of Contents.

  • Part 1. Introduction to data encryption
  • Chapter 1. Encryption concepts and terminology
  • Chapter 2. Introduction to storage data encryption
  • Chapter 3. IBM storage encryption methods
  • Chapter 4. IBM System Storage tape automation for encryption
  • Chapter 5. Full Disk Encryption technology in disk subsystems
  • Part 2. IBM System Storage DS5000
  • Chapter 6. Understanding Full Disk Encryption in DS5000
  • Chapter 7. Configuring encryption on DS5000 with Full Disk Encryption drives
  • Chapter 8. DS5000 Full Disk Encryption best practices
  • Chapter 9. Frequently asked questions
  • Part 3. Implementing tape data encryption
  • Chapter 10. Planning for software and hardware to support tape drives
  • Chapter 11. Planning for Tivoli Key Lifecycle Manager and its keystores
  • Chapter 12. Implementing Tivoli Key Lifecycle Manager
  • Chapter 13. Tivoli Key Lifecycle Manager operational considerations
  • Chapter 14. Planning for Encryption Key Manager and its keystores
  • Chapter 15. Implementing the Encryption Key Manager
  • Chapter 16. Planning and managing your keys with Encryption Key Manager
  • Chapter 17. Encryption Key Manager operational considerations
  • Chapter 18. Implementing TS1100 series encryption in System z
  • Chapter 19. Implementing TS7700 tape encryption
  • Chapter 20. Implementing TS1120 and TS1130 encryption in an open systems environment
  • Chapter 21. Tape data encryption with i5/OS
  • Part 4. DS8000 encryption features
  • Chapter 22. IBM System Storage DS8000 encryption preparation
  • Chapter 23. DS8000 encryption features and implementation
  • Chapter 24. DS8700 advanced encryption features and implementation
  • Chapter 25. Best practices and guidelines for DS8000 encryption
  • Appendix A. z/OS planning and implementation checklists
  • Appendix B. DS8700 encryption-related system reference codes
  • Appendix C. z/OS Java and Open Edition tips
  • Appendix D. Asymmetric and Symmetric Master Key change procedures
  • Appendix E. z/OS tape data encryption diagnostics
  • Appendix F. IEHINITT exits and messages for rekeying
  • Appendix G. TS1100 and LTO4/LTO5 SECURE key Encryption Key Manager on z/OS
  • Appendix H. Encryption testing in an open systems environment

  • Best Sellers



    Product Details
    • ISBN-13: 9789350230749
    • Publisher: IBM Redbooks
    • Publisher Imprint: IBM Redbooks
    • Language: English
    • ISBN-10: 9350230747
    • Publisher Date: 08 Jan 2010
    • Binding: Paperback
    • No of Pages: 1036

    Related Categories

    Similar Products

    How would you rate your experience shopping for books on Bookswagon?

    Add Photo
    Add Photo

    Customer Reviews

    REVIEWS           
    Click Here To Be The First to Review this Product
    IBM System Storage Data Encryption
    IBM Redbooks -
    IBM System Storage Data Encryption
    Writing guidlines
    We want to publish your review, so please:
    • keep your review on the product. Review's that defame author's character will be rejected.
    • Keep your review focused on the product.
    • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
    • Refrain from mentioning competitors or the specific price you paid for the product.
    • Do not include any personally identifiable information, such as full names.

    IBM System Storage Data Encryption

    Required fields are marked with *

    Review Title*
    Review
      Add Photo Add up to 6 photos
      Would you recommend this product to a friend?
      Tag this Book
      Read more
      Does your review contain spoilers?
      What type of reader best describes you?
      I agree to the terms & conditions
      You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

      CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

      These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


      By submitting any content to Bookswagon, you guarantee that:
      • You are the sole author and owner of the intellectual property rights in the content;
      • All "moral rights" that you may have in such content have been voluntarily waived by you;
      • All content that you post is accurate;
      • You are at least 13 years old;
      • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
      You further agree that you may not submit any content:
      • That is known by you to be false, inaccurate or misleading;
      • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
      • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
      • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
      • For which you were compensated or granted any consideration by any unapproved third party;
      • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
      • That contains any computer viruses, worms or other potentially damaging computer programs or files.
      You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


      For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


      All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

      Accept

      New Arrivals



      Inspired by your browsing history


      Your review has been submitted!

      You've already reviewed this product!