Cargando…

Security on IBM z/VSE /

Abstract One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extens...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Hellner, Helmut (Autor)
Autor Corporativo: International Business Machines Corporation. International Technical Support Organization
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Poughkeepsie, NY : IBM Corporation, International Technical Support Organization, 2018.
Edición:Fourth edition.
Colección:IBM redbooks.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1043906482
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 180711s2018 nyua ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d STF  |d TOH  |d DEBBG  |d CEF  |d CNCEN  |d OCLCA  |d G3B  |d S9I  |d UAB  |d CZL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 0738456918 
020 |a 9780738456911 
020 |z 9780738456911 
029 1 |a GBVCP  |b 1029872899 
035 |a (OCoLC)1043906482 
037 |a CL0500000978  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |q OCoLC 
049 |a UAMI 
100 1 |a Hellner, Helmut,  |e author. 
245 1 0 |a Security on IBM z/VSE /  |c Helmut Hellner [and five others]. 
250 |a Fourth edition. 
264 1 |a Poughkeepsie, NY :  |b IBM Corporation, International Technical Support Organization,  |c 2018. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
490 1 |a IBM redbooks 
588 0 |a Online resource; title from cover (Safari, viewed July 11, 2018). 
500 |a "This edition (SG24-7691-02) applies to IBM z/VSE V6R2"--Page 2 of cover 
504 |a Includes bibliographical references. 
520 |a Abstract One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
710 2 |a International Business Machines Corporation.  |b International Technical Support Organization. 
830 0 |a IBM redbooks. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738456911/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP