Security for Linux on System z Security for Linux on System z

Security for Linux on System z

    • 5,0 • 1 note

Description de l’éditeur

No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful.

This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to the network, and letting users have access to this formidable resource space in a secure, controlled, and auditable fashion to make sure the System z server and Linux are useful to your business. As the quotation illustrates, the book is also about ensuring that, before you start designing a security solution, you understand what the solution has to achieve.

The base for a secure system is tightly related to the way the architecture and virtualization has been implemented on IBM System z. Since its inception 45 years ago, the architecture has been continuously developed to meet the increasing demands for a more secure and stable platform.

This book is intended for system engineers and security administrators who want to customize a Linux on System z environment to meet strict security, audit, and control regulations.

GENRE
Informatique et Internet
SORTIE
2013
10 janvier
LANGUE
EN
Anglais
LONGUEUR
348
Pages
ÉDITIONS
IBM Redbooks
TAILLE
5,1
Mo
Security on z/VM Security on z/VM
2007
The LPIC-2 Exam Prep The LPIC-2 Exam Prep
2014
RHCSA & RHCE  Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition RHCSA & RHCE  Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition
2015
Cloud Security Guidelines for IBM Power Systems Cloud Security Guidelines for IBM Power Systems
2016
Security Guide for IBM i V6.1 Security Guide for IBM i V6.1
2009
Synchronizing IBM RACF Data by using IBM Tivoli Directory Integrator Synchronizing IBM RACF Data by using IBM Tivoli Directory Integrator
2016
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
Big Data Networked Storage Solution for Hadoop Big Data Networked Storage Solution for Hadoop
2013
Performance and Capacity Implications for Big Data Performance and Capacity Implications for Big Data
2014
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
Information Governance Principles and Practices for a Big Data Landscape Information Governance Principles and Practices for a Big Data Landscape
2014
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013
The Virtualization Cookbook for IBM z Systems Volume 2: Red Hat Enterprise Linux 7.1 Servers The Virtualization Cookbook for IBM z Systems Volume 2: Red Hat Enterprise Linux 7.1 Servers
2016
DB2 Workload Manager for Linux, UNIX, and Windows DB2 Workload Manager for Linux, UNIX, and Windows
2008
Getting Started with Linux on Z Encryption for Data At-Rest Getting Started with Linux on Z Encryption for Data At-Rest
2019
CentOS: The Commercial Grade Linux Desktop CentOS: The Commercial Grade Linux Desktop
2014
z/VM and Linux on IBM System z: The Virtualization Cookbook for SLES9 z/VM and Linux on IBM System z: The Virtualization Cookbook for SLES9
2006
Securing Your Cloud: IBM Security for LinuxONE Securing Your Cloud: IBM Security for LinuxONE
2019