Security on the IBM mainframe. a holistic approach to reduce risk and improve security / Volume 1

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasing security consciousness, IBM System z provides the capabilities to address the needs of today's business security challenges. This publi...

Full description

Bibliographic Details
Corporate Author: International Business Machines Corporation (-)
Other Authors: Bücker, Axel Author (author), Dymoke-Bradshaw, Lennie Contributor (contributor), Chakrabarty, Boudhayan Contributor
Format: eBook
Language:Inglés
Published: [Place of publication not identified] IBM Corporation International Technical Support Organization 2014
Edition:Second edition
Series:IBM redbooks.
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629799406719
Description
Summary:This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM System z® hardware and software. In an age of increasing security consciousness, IBM System z provides the capabilities to address the needs of today's business security challenges. This publication explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. This book highlights the features of IBM z/OS® and other operating systems, which offer various customizable security elements under the Security Server and Communication Server components. This book describes z/OS and other operating systems and additional software that leverage the building blocks of System z hardware to provide solutions to business security needs. This publication's intended audience is technical architects, planners, and managers who are interested in exploring how the security design and features of System z, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
Item Description:Bibliographic Level Mode of Issuance: Monograph
Physical Description:1 online resource (1 volume): illustrations
Bibliography:Includes bibliographical references.
ISBN:9780738440101