End to End Security with z Systems End to End Security with z Systems

End to End Security with z Systems

출판사 설명

This IBM® Redpaper™ provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward.

The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.

장르
컴퓨터 및 인터넷
출시일
2015년
4월 3일
언어
EN
영어
길이
50
페이지
출판사
IBM Redbooks
판매자
International Business Machines Corp
크기
548.7
KB
Introduction to the New Mainframe: Security Introduction to the New Mainframe: Security
2007년
Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
2016년
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
2015년
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition Official (ISC)2 Guide to the CISSP CBK, Fourth Edition
2014년
Mike Meyers' CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Mike Meyers' CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601)
2021년
Cloud Security Cloud Security
2010년
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006년
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012년
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012년
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
2011년
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010년
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009년