End to End Security with z Systems
출판사 설명
This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward.
The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.
Introduction to the New Mainframe: Security
2007년
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016년
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
2015년
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition
2014년
Mike Meyers' CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601)
2021년
Cloud Security
2010년
TCP/IP Tutorial and Technical Overview
2006년
Advanced Networking Concepts Applied Using Linux on IBM System z
2012년
IPv6 Introduction and Configuration
2012년
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011년
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010년
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009년