Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

Description de l’éditeur

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements.

We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture.

This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

GENRE
Informatique et Internet
SORTIE
2015
25 septembre
LANGUE
EN
Anglais
LONGUEUR
188
Pages
ÉDITIONS
IBM Redbooks
TAILLE
2
Mo

Plus de livres similaires

ABCs of z/OS System Programming: Volume 4 ABCs of z/OS System Programming: Volume 4
2011
Official (ISC)2 Guide to the CISSP CBK Official (ISC)2 Guide to the CISSP CBK
2012
Security+ Essentials Security+ Essentials
2010
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Cybersecurity Essentials Cybersecurity Essentials
2018
CCNSP-NP CCNSP-NP
2013

Plus de livres par IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Security for Linux on System z Security for Linux on System z
2013
Big Data Networked Storage Solution for Hadoop Big Data Networked Storage Solution for Hadoop
2013
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013
Performance and Capacity Implications for Big Data Performance and Capacity Implications for Big Data
2014
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010

D’autres ont aussi acheté

Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
2017
Mainframe from Scratch: Hardware Configuration and z/OS Build Mainframe from Scratch: Hardware Configuration and z/OS Build
2016
Computer Networking Computer Networking
2018
Computer Networking: Principles, Protocols, and Practice Computer Networking: Principles, Protocols, and Practice
2012
Apple Style Guide Apple Style Guide
2017