Showing documents 16 to 20 of 22  Previous  Next

Results per page: 5 | 10 | 20


cover image

IBM QRadar Version 7.3 Planning and Installation Guide
Security

Redbooks, published 4 Jan 2018

With the advances of technology and the reoccurrence of data leaks, cyber security is a bigger challenge than ever before. Cyber attacks evolve as quickly as the technology itself, and hackers are finding more innovative ways to break security controls to access confidential data and to interrupt services. Hackers reinvent themselves using new technology features as a tool to expose companies and individuals. Therefore, cyber security cannot be reactive but must go a step further by implementing proactive security controls that protect one of the most important assets of every organization: ... [more]


cover image

Leveraging Integrated Cryptographic Service Facility
Security

Redpaper, published 3 Jan 2018

Integrated Cryptographic Service Facility (ICSF) is a part of the IBM® z/OS® operating system that provides cryptographic functions for data security, data integrity, personal identification, digital signatures, and the management of cryptographic keys. Together with the cryptography features of the IBM Z family, it provides secure, high-performance cryptographic functions (such as the loading of master key values) that enable the hardware features to be used by applications. This IBM Redpaper™ publication briefly describes ICSF and the key elements of z/OS that address different security ... [more]


cover image

Zero to Blockchain
Security

Course, published 17 Nov 2017

Learn how to develop blockchain solutions using Hyperledger Composer on Hyperledger Fabric Version 1.0+. This 15 chapter tutorial takes you from no experience to building a complete blockchain application.


cover image

z/OS PKI Services: Quick Set-up for Multiple CAs
Security

Redbooks, published 20 Sep 2016, last updated 20 Jan 2017

If you are new to Public Key Infrastructure (PKI), this IBM® Redbooks® publication helps you install, tailor, and configure PKI Services on IBM z/OS®. The intention is to show you a simplified set-up in which the ITSO labs were created. You can choose a similar set-up for your site in a controlled test environment where you can gain skills and experience in PKI Services on z/OS, and then move on to plan and implement it across your site. This IBM Redbooks publication is written at the z/OS Version 2 Release 2 ... [more]


cover image

IBM MFA V1R1: TouchToken, PassTicket, and Application Bypass Support
Security

Redpaper, published 23 Dec 2016

What is IBM® Multi-Factor Authentication (MFA)? IBM MFA consists of the following elements: Something that you know, such as a Personal Identification Number (PIN) or a password. Something that you are, such as a finger print or retinal scan. Something that you have, such as a hard token (for example, a key fob or soft token), which is software-based).
This IBM Redpaper™ publication helps you install, customize, and configure IBM MFA for z/OS® V1.1.0. It also provides information that is based on our experience in a controlled ... [more]


 Previous  Next

The above is a list of IBM Redbooks and Redpapers on Security, showing most recently published first. IBM Redbooks publications are available for download in PDF and EPUB formats and most are also available on Google Play Books and Apple Books.



IBM Redbooks Badges
Redbooks Author Digital Badge

IBM Redbooks want technical practitioners to be recognized for their newly gained knowledge, experience and accomplishments.

Become an IBM certified Redbooks author

Follow IBM Redbooks

Follow IBM Redbooks