Cargando…

Communications Server for z/OS V1R8 TCP/IP implementation. Volume 4, Policy-based network security /

This Communications Server (CS) for z/OS TCP/IP Implementation series provides easy-to-understand step-by-step how-to guidance on enabling the most commonly used and important functions of CS for z/OS TCP/IP. With the advent of TCP/IP and the Internet, network security requirements have become more...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: White, Bill (Telecommunications engineer) (Autor), Horowitz, Adi (Autor), Van Niekerk, Rudi (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [San Jose, California] : IBM Corporation, [2007]
Colección:IBM redbooks.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000nam a22000007i 4500
001 OR_on1398311848
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 230920s2007 caua ob 001 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA 
020 |z 9780738489827 
035 |a (OCoLC)1398311848 
037 |a 0738489824  |b O'Reilly Media 
050 4 |a QA76.9.C55 
082 0 4 |a 004/.36  |2 23/eng/20230920 
049 |a UAMI 
100 1 |a White, Bill  |c (Telecommunications engineer),  |e author. 
245 1 0 |a Communications Server for z/OS V1R8 TCP/IP implementation.  |n Volume 4,  |p Policy-based network security /  |c Bill White, Adi Horowitz, Rudi Van Niekerk. 
246 3 0 |a Policy-based network security 
264 1 |a [San Jose, California] :  |b IBM Corporation,  |c [2007] 
300 |a 1 online resource (458 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Redbooks 
504 |a Includes bibliographical references and index. 
520 |a This Communications Server (CS) for z/OS TCP/IP Implementation series provides easy-to-understand step-by-step how-to guidance on enabling the most commonly used and important functions of CS for z/OS TCP/IP. With the advent of TCP/IP and the Internet, network security requirements have become more stringent and complex. Because many transactions come from untrusted networks such as the Internet, and from unknown users, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. In addition, there are certain applications shipped with TCP/IP such as File Transfer Protocol (FTP) that, without proper configuration and access controls in place, could allow unauthorized This IBM Redbooks publication explains how to set up security for your z/OS networking environment. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a TCP/IP (Computer network protocol) 
650 0 |a Communications software. 
700 1 |a Horowitz, Adi,  |e author. 
700 1 |a Van Niekerk, Rudi,  |e author. 
830 0 |a IBM redbooks. 
856 4 0 |u https://learning.oreilly.com/library/view/~/0738489824/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP