IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking

IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking

Bill White 및 다른 저자

출판사 설명

For more than 50 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases, and mission-critical enterprise-wide applications. IBM z® Systems, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors in providing, among many other capabilities, world-class and state-of-the-art support for the TCP/IP Internet protocol suite.

TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations.

The IBM z/OS Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP.

This IBM Redbooks® publication is for people who install and support z/OS Communications Server. It explains how to set up security for your z/OS networking environment. With the advent of TCP/IP and the Internet, network security requirements have become more stringent and complex. Because many transactions are from unknown users and untrusted networks such as the Internet, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. Also, because security technologies are complex and can be confusing, we include helpful tutorial information in the appendixes of this book.

For more information about z/OS Communications Server base functions, standard applications, and high availability, see the other following volumes in the series:

IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 1: Base Functions, Connectivity, and Routing, SG24-8360
IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 2: Standard Applications, SG24-8361
IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 3: High Availability, Scalability, and Performance, SG24-8362

This book does not duplicate the information in these publications. Instead, it complements those publications with practical implementation scenarios that might be useful in your environment. For more information about at what level a specific function was introduced, see z/OS Communications Server: New Function Summary, GC31-8771.

장르
컴퓨터 및 인터넷
출시일
2017년
3월 21일
언어
EN
영어
길이
954
페이지
출판사
IBM Redbooks
판매자
International Business Machines Corp
크기
15.8
MB
IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
2012년
Cisco ASA Cisco ASA
2014년
Set Up Security and Integration with the DataPower XI50z for zEnterprise Set Up Security and Integration with the DataPower XI50z for zEnterprise
2011년
Security for Linux on System z Security for Linux on System z
2013년
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications
2016년
Day One: Juniper Ambassadors’ Cookbook for Enterprise Day One: Juniper Ambassadors’ Cookbook for Enterprise
2013년
Uppity Uppity
2011년
Intrepid Intrepid
2008년
IBM z/OS V1R11 Communications Server TCP / IP Implementation Volume 3: High Availability, Scalability, and Performance IBM z/OS V1R11 Communications Server TCP / IP Implementation Volume 3: High Availability, Scalability, and Performance
2010년
Getting Started with Linux on Z Encryption for Data At-Rest Getting Started with Linux on Z Encryption for Data At-Rest
2019년
IBM z13 and IBM z13s Technical Introduction IBM z13 and IBM z13s Technical Introduction
2017년
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications
2016년
IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 4: Security and Policy-Based Networking IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 4: Security and Policy-Based Networking
2016년
IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
2012년
IBM z/OS V2R2: Operations IBM z/OS V2R2: Operations
2017년
Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security
2015년
IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 3: High Availability, Scalability, and Performance IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 3: High Availability, Scalability, and Performance
2017년
Improving Productivity with IBM ISPF Productivity Tool V7.1 for z/OS Improving Productivity with IBM ISPF Productivity Tool V7.1 for z/OS
2013년