End to End Security with z Systems
Publisher Description
This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward.
The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.
Introduction to the New Mainframe: Security
2007
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
2015
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition
2014
Mike Meyers' CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601)
2021
Cloud Security
2010
TCP/IP Tutorial and Technical Overview
2006
Advanced Networking Concepts Applied Using Linux on IBM System z
2012
IPv6 Introduction and Configuration
2012
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009