Redbook - as400 Security - IBM System i Security: Protecting i5/OS Data with Encryption
http://www.redbooks.ibm.com/abstracts/sg247399.html
Part 1, "Introduction to data encryption" , introduces key concepts, terminology, algorithms, and key management.
Part 2, "Planning for data encryption" , provides critical information for planning a data encryption project on i5/OS.
Part 3, "Implementation of data encryption" , provides various implementation scenarios with a step-by-step guide
Part 1. Introduction to data encryption
Chapter 1. Data encryption: the big picture
Chapter 2. Algorithms, operations, and System i implementations
Chapter 3. Key management concepts
Part 2. Planning for data encryption
Chapter 4. Analyzing needs and defining scope
Chapter 5. Managing keys on System i
Chapter 6. Choosing a data encryption method
Chapter 7. Database considerations
Chapter 8. Application considerations
Chapter 9. Backup considerations
Part 3. Implementation of data encryption
Chapter 10. SQL method
Chapter 11. Cryptographic Services APIs method
Chapter 12. HW-based method
Subscribe to:
Post Comments (Atom)
Popular Posts
- Yahoo! Mail: Revenge of the Oddpost
- MobileTracker - Cingular announces EDGE Wireless WAN service
- Linux Forum: Apache, Webmin and Mandrake - Linux Operating System Help
- Free AS400 & iSeries Software Tools & Utilities Downloads
- Common Gateway Interface (CGI) on the as400 / iSeries
- Table designs based on CSS and DIV elements
- The Laughing Boardroom video...a real world example!
- UDATE and *DATE in AS400 RPG
- IBM eServer iSeries - The Laughing Boardroom
- Does Anybody Care About AIX on the iSeries?
No comments:
Post a Comment