Getting started with IBM Hyper Protect Data Controller /

IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes--security policies are k...

Full description

Saved in:
Bibliographic Details
Main Authors: White, Bill (Author), Coulson, Andy (Author), Hoareau, Guillaume (Author), Katonica, Jason (Author), Panting, Roy (Author), Richard, Philippe (Author), Weiss, Maxwell (Author), Yan, Eva (Author)
Corporate Author: Safari, an O'Reilly Media Company
Format: Electronic eBook
Language:English
Published: IBM Redbooks, 2022.
Edition:1st edition.
Subjects:
Online Access:CONNECT

MARC

LEADER 00000cam a22000007a 4500
001 in00006071757
006 m o d
007 cr cnu||||||||
008 040122s2022 xx o 000 0 eng d
005 20220712155521.9
035 |a 1WRLDSHRon1291869137 
040 |a AU@  |b eng  |c AU@  |d ORMDA  |d OCLCO  |d OCLCF 
020 |z 9780738460031 
020 |z 0738460036 
024 8 |a 9780738460031 
035 |a (OCoLC)1291869137 
037 |a 9780738460031  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a TXMM 
100 1 |a White, Bill,  |e author. 
245 1 0 |a Getting started with IBM Hyper Protect Data Controller /  |c White, Bill. 
250 |a 1st edition. 
264 1 |b IBM Redbooks,  |c 2022. 
300 |a 1 online resource (268 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and give ease of control and auditability. It can manage how data is shared securely through a central control. Hyper Protect Data Controller can protect data wherever it goes--security policies are kept and honored whenever the data is accessed and future data access can be revoked even after data leaves the system of record. This IBM Redbooks® publication can assist you with determining how to get started with IBM Hyper Protect Data Controller through a use case approach. It will help you plan for, install, tailor and configure the Hyper Protect Data Controller. It includes information about the following topics: Concepts and reference architecture Common use cases with implementation guidance and advice Implementation and policy examples Typical operational tasks for creating policies and preparing for audits Monitoring user activity and events This IBM Redbooks publication is written for IT Managers, IT Architects, Security Administrators, data owners, and data consumers. 
542 |f Copyright 2022 © IBM  |g 2022 
550 |a Made available through: Safari, an O'Reilly Media Company. 
590 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Cloud computing  |x Security measures. 
700 1 |a Coulson, Andy,  |e author. 
700 1 |a Hoareau, Guillaume,  |e author. 
700 1 |a Katonica, Jason,  |e author. 
700 1 |a Panting, Roy,  |e author. 
700 1 |a Richard, Philippe,  |e author. 
700 1 |a Weiss, Maxwell,  |e author. 
700 1 |a Yan, Eva,  |e author. 
710 2 |a Safari, an O'Reilly Media Company. 
730 0 |a WORLDSHARE SUB RECORDS 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780738460031/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s 00f851db-eca8-44c9-896e-ec8e333075b8  |i 356531c4-68f7-4f09-9cdb-c9d13839c76d  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e QA76.9.A25   |h Library of Congress classification 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780738460031/?ar  |z CONNECT