End to End Security with z Systems
Publisher Description
This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward.
The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.
Introduction to the New Mainframe: Security
2007
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
2015
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition
2014
Mike Meyers' CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601)
2021
Cloud Security
2010
TCP/IP Tutorial and Technical Overview
2006
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IPv6 Introduction and Configuration
2012
Advanced Networking Concepts Applied Using Linux on IBM System z
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009