Cargando…

Mainframe basics for security professionals : getting started with RACF /

Leverage Your Security Expertise in IBM ® System z™ Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world's largest enterprises. If you're coming to the IBM System z mainframe platform from UNIX ® , Linux ® , or Windows ® , you need practical guidan...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Pomerantz, Ori (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, NJ : IBM Press, ©2008.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn213380831
003 OCoLC
005 20231017213018.0
006 m o d
007 cr zn|||||||||
008 080214s2008 njua ob 001 0 eng d
010 |a  2007044290 
040 |a COCUF  |b eng  |e pn  |c COCUF  |d OCLCQ  |d UMI  |d MKN  |d CEF  |d OCLCQ  |d B24X7  |d DEBSZ  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d LIV  |d OCLCQ  |d YDX  |d OCLCO  |d OCLCA  |d COO  |d UAB  |d BRF  |d VT2  |d UKAHL  |d CZL  |d DST  |d OCLCO  |d OCL  |d OCLCQ  |d OCLCO 
019 |a 210293035  |a 297576631  |a 606040110  |a 1044187931  |a 1056383287  |a 1097158436  |a 1192329971  |a 1240516819  |a 1295600184  |a 1300532461  |a 1303329631 
020 |a 9780131738560 
020 |a 0131738569  |q (hbk. ;  |q alk. paper) 
020 |a 9780137137596 
020 |a 0137137591 
029 1 |a AU@  |b 000053248956 
029 1 |a CHBIS  |b 006149466 
029 1 |a CHVBK  |b 171321367 
029 1 |a DEBSZ  |b 355402963 
029 1 |a HEBIS  |b 291475833 
035 |a (OCoLC)213380831  |z (OCoLC)210293035  |z (OCoLC)297576631  |z (OCoLC)606040110  |z (OCoLC)1044187931  |z (OCoLC)1056383287  |z (OCoLC)1097158436  |z (OCoLC)1192329971  |z (OCoLC)1240516819  |z (OCoLC)1295600184  |z (OCoLC)1300532461  |z (OCoLC)1303329631 
037 |a CL0500000030  |b Safari Books Online 
050 4 |a QA76.9.A25  |b M3138 2008eb 
082 0 4 |a 004.16  |2 22 
049 |a UAMI 
245 0 0 |a Mainframe basics for security professionals :  |b getting started with RACF /  |c Ori Pomerantz [and others]. 
260 |a Upper Saddle River, NJ :  |b IBM Press,  |c ©2008. 
300 |a 1 online resource (xxi, 156 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references and index. 
520 |a Leverage Your Security Expertise in IBM ® System z™ Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world's largest enterprises. If you're coming to the IBM System z mainframe platform from UNIX ® , Linux ® , or Windows ® , you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. Even if you've never logged onto a mainframe before, this book will teach you how to run today's z/OS ® operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don't have a mainframe available for practice? The book contains step-by-step videos walking you through dozens of key techniques. Simply log in and register your book at www.ibmpressbooks.com/register to gain access to these videos. The authors illuminate the mainframe's security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM's powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you're an experienced system administrator or security professional, there's no faster way to extend your expertise into "big iron" environments. Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a z/OS. 
630 0 7 |a Z/OS.  |2 blmlsh 
630 0 7 |a z/OS  |2 fast 
650 0 |a Computer security. 
650 0 |a Electronic digital computers. 
650 0 |a Computers. 
650 2 |a Computer Security 
650 2 |a Computers 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs. 
650 7 |a computers.  |2 aat 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Electronic digital computers.  |2 blmlsh 
650 7 |a Computers  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Electronic digital computers  |2 fast 
700 1 |a Pomerantz, Ori.  |4 aut 
776 0 |z 0131738569 
776 0 |z 9780131738560 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780137137596/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37812642 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37813009 
938 |a YBP Library Services  |b YANK  |n 14858190 
938 |a Books 24x7  |b B247  |n bks00024467 
994 |a 92  |b IZTAP