Security for Linux on System z Security for Linux on System z

Security for Linux on System z

Publisher Description

No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful.

This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to the network, and letting users have access to this formidable resource space in a secure, controlled, and auditable fashion to make sure the System z server and Linux are useful to your business. As the quotation illustrates, the book is also about ensuring that, before you start designing a security solution, you understand what the solution has to achieve.

The base for a secure system is tightly related to the way the architecture and virtualization has been implemented on IBM System z. Since its inception 45 years ago, the architecture has been continuously developed to meet the increasing demands for a more secure and stable platform.

This book is intended for system engineers and security administrators who want to customize a Linux on System z environment to meet strict security, audit, and control regulations.

GENRE
Computing & Internet
RELEASED
2013
10 January
LANGUAGE
EN
English
LENGTH
348
Pages
PUBLISHER
IBM Redbooks
SIZE
5.1
MB
ABCs of IBM z/OS System Programming Volume 6 ABCs of IBM z/OS System Programming Volume 6
2014
UNIX and Linux System Administration Handbook, 5/e UNIX and Linux System Administration Handbook, 5/e
2017
Understanding LDAP - Design and Implementation Understanding LDAP - Design and Implementation
2004
ABCs of z/OS System Programming: Volume 9 ABCs of z/OS System Programming: Volume 9
2011
Hands on Hacking Hands on Hacking
2020
Penetration Testing Penetration Testing
2014
Liberty in a DevOps Continuous Delivery Environment Liberty in a DevOps Continuous Delivery Environment
2015
IBM WebSphere Application Server V8.5 Administration and Configuration Guide for Liberty Profile IBM WebSphere Application Server V8.5 Administration and Configuration Guide for Liberty Profile
2015
IBM Spectrum Virtualize and IBM Spectrum Scale in an Enhanced Stretched Cluster Implementation IBM Spectrum Virtualize and IBM Spectrum Scale in an Enhanced Stretched Cluster Implementation
2015
Systems of Insight Overview Systems of Insight Overview
2015
Enabling IBM MQ Messaging with the IBM MQ Appliance Enabling IBM MQ Messaging with the IBM MQ Appliance
2015
Using Liberty for DevOps, Continuous Delivery, and Deployment Using Liberty for DevOps, Continuous Delivery, and Deployment
2015
CentOS: The Commercial Grade Linux Desktop CentOS: The Commercial Grade Linux Desktop
2014
DB2 Workload Manager for Linux, UNIX, and Windows DB2 Workload Manager for Linux, UNIX, and Windows
2008
The Virtualization Cookbook for IBM z Systems Volume 2: Red Hat Enterprise Linux 7.1 Servers The Virtualization Cookbook for IBM z Systems Volume 2: Red Hat Enterprise Linux 7.1 Servers
2016
Getting Started with Linux on Z Encryption for Data At-Rest Getting Started with Linux on Z Encryption for Data At-Rest
2019
Linux Kernel Programming Part 2 - Char Device Drivers and Kernel Synchronization Linux Kernel Programming Part 2 - Char Device Drivers and Kernel Synchronization
2021
Bodhi Linux 3 for Beginners Bodhi Linux 3 for Beginners
2015