Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security

Descripción editorial

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements.

We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture.

This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

GÉNERO
Informática e Internet
PUBLICADO
2015
25 de septiembre
IDIOMA
EN
Inglés
EXTENSIÓN
188
Páginas
EDITORIAL
IBM Redbooks
VENDEDOR
International Business Machines Corp
TAMAÑO
2
MB
Using Liberty for DevOps, Continuous Delivery, and Deployment Using Liberty for DevOps, Continuous Delivery, and Deployment
2015
Oracle E-Business Suite 12.2.4 Installation and Upgrade on IBM Power S824 Oracle E-Business Suite 12.2.4 Installation and Upgrade on IBM Power S824
2015
IBM Bluemix Architecture Series: Web Application Hosting on IBM Containers IBM Bluemix Architecture Series: Web Application Hosting on IBM Containers
2015
IBM System Storage N series Reference Architecture for Virtualized Environments IBM System Storage N series Reference Architecture for Virtualized Environments
2014
IBM System Storage N series Clustered Data ONTAP IBM System Storage N series Clustered Data ONTAP
2014
Oracle to DB2 Conversion Guide: Compatibility Made Easy Oracle to DB2 Conversion Guide: Compatibility Made Easy
2014
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
2017
Mainframe from Scratch: Hardware Configuration and z/OS Build Mainframe from Scratch: Hardware Configuration and z/OS Build
2016
Computer Networks Computer Networks
2015
Computer Networking Computer Networking
2018
Learning Networking Learning Networking
2012