End to End Security with z Systems
Descripción editorial
This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward.
The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.
Más libros de IBM Redbooks
IBM and Cisco: Together for a World Class Data Center
2013
Set up Linux on IBM System z for Production
2013
Building Big Data and Analytics Solutions in the Cloud
2014
Leveraging the IBM BPM Coach Framework in Your Organization
2014
Experiences with Oracle 11gR2 on Linux on System z
2013
IBM Tivoli Storage Productivity Center V5.2 Release Guide
2014