Reduce risk and improve security on IBM mainframes Volume 2, Mainframe communication and networking security Volume 2, Mainframe communication and networking security /
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent thr...
Autor Corporativo: | |
---|---|
Otros Autores: | , , , , , , , |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Poughkeepsie, NY :
IBM Corporation, International Technical Support Organization
2015.
|
Edición: | First edition |
Colección: | IBM redbooks.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630056906719 |
Sumario: | This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today’s business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring. |
---|---|
Notas: | "Security; z Systems." Number from resource description page: SG24819500. |
Descripción Física: | 1 online resource (1 volume) : illustrations |
Bibliografía: | Includes bibliographical references. |
ISBN: | 9780738440941 |