You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment. In addition, this book concentrates on the planning and preparing of the environment and offers implementation, configuration, and operational examples that can be used in z/OS data set encryption environments. This publication is intended for IT architects, system programmer, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
IBM® zEnterprise® Data Compression (zEDC) capability and the Peripheral Component Interconnect Express (PCIe or PCI Express) hardware adapter called zEDC Express were announced in July 2013 as enhancements to the IBM z/OS® V2.1 operating system (OS) and the IBM zEnterprise EC12 (zEC12) and the IBM zEnterprise BC12 (zBC12). zEDC is optimized for use with large sequential files, and uses an industry-standard compression library. zEDC can help to improve disk usage and optimize cross-platform exchange of data with minimal effect on processor usage. The first candidate for such compression was the System Management Facility (SMF), and support for basic sequential access method (BSAM) and queu...
This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
None
Teaches readers how to test and analyze software to achieve an acceptable level of quality at an acceptable cost Readers will be able to minimize software failures, increase quality, and effectively manage costs Covers techniques that are suitable for near-term application, with sufficient technical background to indicate how and when to apply them Provides balanced coverage of software testing & analysis approaches By incorporating modern topics and strategies, this book will be the standard software-testing textbook
Non-compliance can lead to increasing costs. Regulatory violations involving data protection and privacy can have severe and unintended consequences. In addition, companies must keep pace with changes that arise from numerous legislative and regulatory bodies. Global organizations have the added liability of dealing with national and international-specific regulations. Proving that you are compliant entails compiling and organizing data from multiple sources to satisfy auditor's requests. Preparing for compliance audits can be a major time drain, and maintaining, updating, and adding new processes for compliance can be a costly effort. How do you keep constant changes to regulations and your...
A guide to the diversity of pesticides used in modern agricultural practices, and the relevant social and environmental issues Pesticides in Crop Production offers an important resource that explores pesticide action in plants; pesticide metabolism in soil microbes, plants and animals; bioaccumulation of pesticides and sensitiveness of microbiome towards pesticides. The authors explore pesticide risk assessment, the development of pesticide resistance in pests, microbial remediation of pesticide intoxicated legumes and pesticide toxicity amelioration in plants by plant hormones. The authors include information on eco-friendly pest management. They review the impact of pesticides on soil micr...
Tracking Cuban history from 1492 to the present, The Cuba Reader includes more than one hundred selections that present myriad perspectives on Cuba's history, culture, and politics. The volume foregrounds the experience of Cubans from all walks of life, including slaves, prostitutes, doctors, activists, and historians. Combining songs, poetry, fiction, journalism, political speeches, and many other types of documents, this revised and updated second edition of The Cuba Reader contains over twenty new selections that explore the changes and continuities in Cuba since Fidel Castro stepped down from power in 2006. For students, travelers, and all those who want to know more about the island nation just ninety miles south of Florida, The Cuba Reader is an invaluable introduction.
Since its U.S. debut a quarter-century ago, this brilliant text has set a new standard for historical scholarship of Latin America. It is also an outstanding political economy, a social and cultural narrative of the highest quality, and perhaps the finest description of primitive capital accumulation since Marx. Rather than chronology, geography, or political successions, Eduardo Galeano has organized the various facets of Latin American history according to the patterns of five centuries of exploitation. Thus he is concerned with gold and silver, cacao and cotton, rubber and coffee, fruit, hides and wool, petroleum, iron, nickel, manganese, copper, aluminum ore, nitrates, and tin. These are...