Reduce risk and improve security on IBM mainframes: Volume 2: Mainframe communication and networking security
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent thr...
Gespeichert in:
Beteilige Person: | |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Poughkeepsie, NY
IBM Corporation, International Technical Support Organization
2015
|
Ausgabe: | First edition. |
Schriftenreihe: | IBM redbooks
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780738440941/?ar |
Zusammenfassung: | This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring. |
Beschreibung: | "Security; z Systems.". - Number from resource description page: SG24819500. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed October 13, 2015) |
Umfang: | 1 Online-Ressource (1 volume) illustrations. |
ISBN: | 9780738440941 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047505087 | ||
003 | DE-627-1 | ||
005 | 20240228115946.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2015 xx |||||o 00| ||eng c | ||
020 | |a 9780738440941 |9 978-0-7384-4094-1 | ||
035 | |a (DE-627-1)047505087 | ||
035 | |a (DE-599)KEP047505087 | ||
035 | |a (ORHE)9780738440941 | ||
035 | |a (DE-627-1)047505087 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Bücker, Axel |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Reduce risk and improve security on IBM mainframes |b Volume 2: Mainframe communication and networking security |c Axel Buecker [and seven others] |
246 | 3 | 3 | |a Mainframe communication and networking security |
250 | |a First edition. | ||
264 | 1 | |a Poughkeepsie, NY |b IBM Corporation, International Technical Support Organization |c 2015 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a IBM redbooks | |
500 | |a "Security; z Systems.". - Number from resource description page: SG24819500. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed October 13, 2015) | ||
520 | |a This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring. | ||
650 | 0 | |a IBM computers |x Security measures | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
650 | 4 | |a IBM computers ; Security measures | |
710 | 2 | |a International Business Machines Corporation. |b International Technical Support Organization, |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738440941/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047505087 |
---|---|
_version_ | 1821494892873908224 |
adam_text | |
any_adam_object | |
author | Bücker, Axel |
author_corporate | International Business Machines Corporation. International Technical Support Organization |
author_corporate_role | ctb |
author_facet | Bücker, Axel International Business Machines Corporation. International Technical Support Organization |
author_role | aut |
author_sort | Bücker, Axel |
author_variant | a b ab |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047505087 (DE-599)KEP047505087 (ORHE)9780738440941 |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03416cam a22004452 4500</leader><controlfield tag="001">ZDB-30-ORH-047505087</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115946.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738440941</subfield><subfield code="9">978-0-7384-4094-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047505087</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047505087</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738440941</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047505087</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bücker, Axel</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Reduce risk and improve security on IBM mainframes</subfield><subfield code="b">Volume 2: Mainframe communication and networking security</subfield><subfield code="c">Axel Buecker [and seven others]</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Mainframe communication and networking security</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Poughkeepsie, NY</subfield><subfield code="b">IBM Corporation, International Technical Support Organization</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IBM redbooks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Security; z Systems.". - Number from resource description page: SG24819500. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed October 13, 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">IBM computers</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IBM computers ; Security measures</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Business Machines Corporation.</subfield><subfield code="b">International Technical Support Organization,</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738440941/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047505087 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:36Z |
institution | BVB |
isbn | 9780738440941 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | IBM Corporation, International Technical Support Organization |
record_format | marc |
series2 | IBM redbooks |
spelling | Bücker, Axel VerfasserIn aut Reduce risk and improve security on IBM mainframes Volume 2: Mainframe communication and networking security Axel Buecker [and seven others] Mainframe communication and networking security First edition. Poughkeepsie, NY IBM Corporation, International Technical Support Organization 2015 1 Online-Ressource (1 volume) illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier IBM redbooks "Security; z Systems.". - Number from resource description page: SG24819500. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed October 13, 2015) This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring. IBM computers Security measures Computer security Computer Security Sécurité informatique IBM computers ; Security measures International Business Machines Corporation. International Technical Support Organization, MitwirkendeR ctb |
spellingShingle | Bücker, Axel Reduce risk and improve security on IBM mainframes Volume 2: Mainframe communication and networking security IBM computers Security measures Computer security Computer Security Sécurité informatique IBM computers ; Security measures |
title | Reduce risk and improve security on IBM mainframes Volume 2: Mainframe communication and networking security |
title_alt | Mainframe communication and networking security |
title_auth | Reduce risk and improve security on IBM mainframes Volume 2: Mainframe communication and networking security |
title_exact_search | Reduce risk and improve security on IBM mainframes Volume 2: Mainframe communication and networking security |
title_full | Reduce risk and improve security on IBM mainframes Volume 2: Mainframe communication and networking security Axel Buecker [and seven others] |
title_fullStr | Reduce risk and improve security on IBM mainframes Volume 2: Mainframe communication and networking security Axel Buecker [and seven others] |
title_full_unstemmed | Reduce risk and improve security on IBM mainframes Volume 2: Mainframe communication and networking security Axel Buecker [and seven others] |
title_short | Reduce risk and improve security on IBM mainframes |
title_sort | reduce risk and improve security on ibm mainframes volume 2 mainframe communication and networking security |
title_sub | Volume 2: Mainframe communication and networking security |
topic | IBM computers Security measures Computer security Computer Security Sécurité informatique IBM computers ; Security measures |
topic_facet | IBM computers Security measures Computer security Computer Security Sécurité informatique IBM computers ; Security measures |
work_keys_str_mv | AT buckeraxel reduceriskandimprovesecurityonibmmainframesvolume2mainframecommunicationandnetworkingsecurity AT internationalbusinessmachinescorporationinternationaltechnicalsupportorganization reduceriskandimprovesecurityonibmmainframesvolume2mainframecommunicationandnetworkingsecurity AT buckeraxel mainframecommunicationandnetworkingsecurity AT internationalbusinessmachinescorporationinternationaltechnicalsupportorganization mainframecommunicationandnetworkingsecurity |