Search Results for - Narrowed by: Computer security. - International Business Machines Corporation. International Technical Support Organization, issuing body.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dAUTHOR$002509Author$002509International$002bBusiness$002bMachines$002bCorporation.$002bInternational$002bTechnical$002bSupport$002bOrganization$00252C$002bissuing$002bbody.$002509International$002bBusiness$002bMachines$002bCorporation.$002bInternational$002bTechnical$002bSupport$002bOrganization$00252C$002bissuing$002bbody.$0026ps$003d300?2024-06-08T17:09:47ZGetting started with Linux on Z Encryption for data at-restent://SD_ILS/0/SD_ILS:23219732024-06-08T17:09:47Z2024-06-08T17:09:47Zby White, Bill (Telecommunications engineer), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar">https://go.oreilly.com/library-access/library/view/-/9780738457468/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738457468/?ar">https://learning.oreilly.com/library/view/~/9780738457468/?ar</a><br/>Format: Electronic Resources<br/>Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your dataent://SD_ILS/0/SD_ILS:23222042024-06-08T17:09:47Z2024-06-08T17:09:47Zby Chakrabarty, Boudhayan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738458014/?ar">https://learning.oreilly.com/library/view/~/9780738458014/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738458014">https://learning.oreilly.com/library/view/~/9780738458014</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar">https://go.oreilly.com/library-access/library/view/-/9780738458014/?ar</a><br/>Format: Electronic Resources<br/>Reduce risk and improve security on IBM mainframes. Volume 2, Mainframe communication and networking securityent://SD_ILS/0/SD_ILS:23086222024-06-08T17:09:47Z2024-06-08T17:09:47Zby Bücker, Axel, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780738440941/?ar">https://learning.oreilly.com/library/view/~/9780738440941/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780738440941/?ar">https://go.oreilly.com/library-access/library/view/-/9780738440941/?ar</a><br/>Format: Electronic Resources<br/>Reduce risk and improve security on IBM mainframes. Volume 3, Mainframe subsystem and application securityent://SD_ILS/0/SD_ILS:23089712024-06-08T17:09:47Z2024-06-08T17:09:47Zby Bücker, Axel, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780738441023/?ar">https://go.oreilly.com/library-access/library/view/-/9780738441023/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780738441023/?ar">https://learning.oreilly.com/library/view/~/9780738441023/?ar</a><br/>Format: Electronic Resources<br/>Encryption facility for z/OS version 1.10ent://SD_ILS/0/SD_ILS:23351072024-06-08T17:09:47Z2024-06-08T17:09:47Zby Kappeler, Patrick, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738489557/?ar">https://go.oreilly.com/library-access/library/view/-/0738489557/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0738489557">https://learning.oreilly.com/library/view/~/0738489557</a>
<a href="https://learning.oreilly.com/library/view/~/0738489557/?ar">https://learning.oreilly.com/library/view/~/0738489557/?ar</a><br/>Format: Electronic Resources<br/>