End to End Security with z Systems
発行者による作品情報
This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward.
The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016年
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
2015年
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition
2014年
Cloud Security
2010年
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
2024年
Securing Your Cloud: IBM Security for LinuxONE
2019年
IBM Watson Content Analytics: Discovering Actionable Insight from Your Content
2014年
IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013年
IBM and Cisco: Together for a World Class Data Center
2013年
Experiences with Oracle Database 12c Release 1 on Linux on System z
2014年
Oracle to DB2 Conversion Guide: Compatibility Made Easy
2014年
IBM SAN Solution Design Best Practices for VMware vSphere ESXi
2013年