End to End Security with z Systems End to End Security with z Systems

End to End Security with z Systems

Beschreibung des Verlags

This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward.

The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.

GENRE
Computer und Internet
ERSCHIENEN
2015
3. April
SPRACHE
EN
Englisch
UMFANG
50
Seiten
VERLAG
IBM Redbooks
GRÖSSE
548,7
 kB

Mehr Bücher von IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Understanding LDAP - Design and Implementation Understanding LDAP - Design and Implementation
2004
High Availability and Disaster Recovery Options for db2 for Linux, Unix, and Windows High Availability and Disaster Recovery Options for db2 for Linux, Unix, and Windows
2012
Up and Running with DB2 on Linux Up and Running with DB2 on Linux
2008
Cloud Computing Patterns of Expertise Cloud Computing Patterns of Expertise
2014
Big Data Networked Storage Solution for Hadoop Big Data Networked Storage Solution for Hadoop
2013