|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn926045081 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
151022s2015 nyua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d OCLCA
|d CEF
|d OCLCA
|d UAB
|d CZL
|d LVT
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1302276098
|
020 |
|
|
|z 9780738440941
|
029 |
1 |
|
|a GBVCP
|b 89716167X
|
035 |
|
|
|a (OCoLC)926045081
|z (OCoLC)1302276098
|
037 |
|
|
|a CL0500000660
|b Safari Books Online
|
050 |
|
4 |
|a QA76.8.I
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Bücker, Axel,
|e author.
|
245 |
1 |
0 |
|a Reduce risk and improve security on IBM mainframes.
|n Volume 2,
|p Mainframe communication and networking security /
|c Axel Buecker [and seven others].
|
246 |
3 |
0 |
|a Mainframe communication and networking security
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Poughkeepsie, NY :
|b IBM Corporation, International Technical Support Organization,
|c 2015.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a IBM redbooks
|
588 |
|
|
|a Description based on online resource; title from cover page (Safari, viewed October 13, 2015).
|
500 |
|
|
|a "Security; z Systems."
|
500 |
|
|
|a Number from resource description page: SG24819500.
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a IBM computers
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a IBM computers
|x Security measures.
|2 fast
|0 (OCoLC)fst00966306
|
710 |
2 |
|
|a International Business Machines Corporation.
|b International Technical Support Organization,
|e issuing body.
|
830 |
|
0 |
|a IBM redbooks.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780738440941/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|