Reduce risk and improve security on IBM mainframes: Volume 3: Mainframe subsystem and application security
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z™ Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z Systems™ provides the capabilities to address the nee...
Gespeichert in:
Beteilige Person: | |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Poughkeepsie, NY
IBM Corporation, International Technical Support Organization
2015
|
Ausgabe: | First edition. |
Schriftenreihe: | IBM redbooks
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780738441023/?ar |
Zusammenfassung: | This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z™ Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z Systems™ provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring. |
Beschreibung: | "Security; z Systems.". - Number on resource description page: SG24819600. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed November 18, 2015) |
Umfang: | 1 Online-Ressource (1 volume) illustrations. |
ISBN: | 0738441023 9780738441023 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04750515X | ||
003 | DE-627-1 | ||
005 | 20240228120000.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2015 xx |||||o 00| ||eng c | ||
020 | |a 0738441023 |9 0-7384-4102-3 | ||
020 | |a 9780738441023 |9 978-0-7384-4102-3 | ||
020 | |a 9780738441023 |9 978-0-7384-4102-3 | ||
035 | |a (DE-627-1)04750515X | ||
035 | |a (DE-599)KEP04750515X | ||
035 | |a (ORHE)9780738441023 | ||
035 | |a (DE-627-1)04750515X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Bücker, Axel |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Reduce risk and improve security on IBM mainframes |b Volume 3: Mainframe subsystem and application security |c Axel Buecker [and seven others] |
246 | 3 | 3 | |a Mainframe subsystem and application security |
250 | |a First edition. | ||
264 | 1 | |a Poughkeepsie, NY |b IBM Corporation, International Technical Support Organization |c 2015 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a IBM redbooks | |
500 | |a "Security; z Systems.". - Number on resource description page: SG24819600. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed November 18, 2015) | ||
520 | |a This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z™ Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z Systems™ provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring. | ||
650 | 0 | |a IBM computers |x Security measures | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
650 | 4 | |a IBM computers ; Security measures | |
710 | 2 | |a International Business Machines Corporation. |b International Technical Support Organization, |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738441023/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-04750515X |
---|---|
_version_ | 1821494892913754112 |
adam_text | |
any_adam_object | |
author | Bücker, Axel |
author_corporate | International Business Machines Corporation. International Technical Support Organization |
author_corporate_role | ctb |
author_facet | Bücker, Axel International Business Machines Corporation. International Technical Support Organization |
author_role | aut |
author_sort | Bücker, Axel |
author_variant | a b ab |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04750515X (DE-599)KEP04750515X (ORHE)9780738441023 |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03495cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-04750515X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120000.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738441023</subfield><subfield code="9">0-7384-4102-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738441023</subfield><subfield code="9">978-0-7384-4102-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738441023</subfield><subfield code="9">978-0-7384-4102-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04750515X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04750515X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738441023</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04750515X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bücker, Axel</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Reduce risk and improve security on IBM mainframes</subfield><subfield code="b">Volume 3: Mainframe subsystem and application security</subfield><subfield code="c">Axel Buecker [and seven others]</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Mainframe subsystem and application security</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Poughkeepsie, NY</subfield><subfield code="b">IBM Corporation, International Technical Support Organization</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IBM redbooks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Security; z Systems.". - Number on resource description page: SG24819600. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed November 18, 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z™ Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z Systems™ provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">IBM computers</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IBM computers ; Security measures</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Business Machines Corporation.</subfield><subfield code="b">International Technical Support Organization,</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738441023/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04750515X |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:36Z |
institution | BVB |
isbn | 0738441023 9780738441023 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | IBM Corporation, International Technical Support Organization |
record_format | marc |
series2 | IBM redbooks |
spelling | Bücker, Axel VerfasserIn aut Reduce risk and improve security on IBM mainframes Volume 3: Mainframe subsystem and application security Axel Buecker [and seven others] Mainframe subsystem and application security First edition. Poughkeepsie, NY IBM Corporation, International Technical Support Organization 2015 1 Online-Ressource (1 volume) illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier IBM redbooks "Security; z Systems.". - Number on resource description page: SG24819600. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed November 18, 2015) This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z™ Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z Systems™ provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring. IBM computers Security measures Computer security Computer Security Sécurité informatique IBM computers ; Security measures International Business Machines Corporation. International Technical Support Organization, MitwirkendeR ctb |
spellingShingle | Bücker, Axel Reduce risk and improve security on IBM mainframes Volume 3: Mainframe subsystem and application security IBM computers Security measures Computer security Computer Security Sécurité informatique IBM computers ; Security measures |
title | Reduce risk and improve security on IBM mainframes Volume 3: Mainframe subsystem and application security |
title_alt | Mainframe subsystem and application security |
title_auth | Reduce risk and improve security on IBM mainframes Volume 3: Mainframe subsystem and application security |
title_exact_search | Reduce risk and improve security on IBM mainframes Volume 3: Mainframe subsystem and application security |
title_full | Reduce risk and improve security on IBM mainframes Volume 3: Mainframe subsystem and application security Axel Buecker [and seven others] |
title_fullStr | Reduce risk and improve security on IBM mainframes Volume 3: Mainframe subsystem and application security Axel Buecker [and seven others] |
title_full_unstemmed | Reduce risk and improve security on IBM mainframes Volume 3: Mainframe subsystem and application security Axel Buecker [and seven others] |
title_short | Reduce risk and improve security on IBM mainframes |
title_sort | reduce risk and improve security on ibm mainframes volume 3 mainframe subsystem and application security |
title_sub | Volume 3: Mainframe subsystem and application security |
topic | IBM computers Security measures Computer security Computer Security Sécurité informatique IBM computers ; Security measures |
topic_facet | IBM computers Security measures Computer security Computer Security Sécurité informatique IBM computers ; Security measures |
work_keys_str_mv | AT buckeraxel reduceriskandimprovesecurityonibmmainframesvolume3mainframesubsystemandapplicationsecurity AT internationalbusinessmachinescorporationinternationaltechnicalsupportorganization reduceriskandimprovesecurityonibmmainframesvolume3mainframesubsystemandapplicationsecurity AT buckeraxel mainframesubsystemandapplicationsecurity AT internationalbusinessmachinescorporationinternationaltechnicalsupportorganization mainframesubsystemandapplicationsecurity |