Security on IBM z/VSE:
Abstract One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extens...
Saved in:
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Poughkeepsie, NY
IBM Corporation, International Technical Support Organization
2018
|
Edition: | Fourth edition. |
Series: | IBM redbooks
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9780738456911/?ar |
Summary: | Abstract One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security. |
Item Description: | "This edition (SG24-7691-02) applies to IBM z/VSE V6R2"--Page 2 of cover. - Includes bibliographical references. - Online resource; title from cover (Safari, viewed July 11, 2018) |
Physical Description: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 0738456918 9780738456911 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047506954 | ||
003 | DE-627-1 | ||
005 | 20240228120530.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
020 | |a 0738456918 |9 0-7384-5691-8 | ||
020 | |a 9780738456911 |9 978-0-7384-5691-1 | ||
020 | |a 9780738456911 |9 978-0-7384-5691-1 | ||
035 | |a (DE-627-1)047506954 | ||
035 | |a (DE-599)KEP047506954 | ||
035 | |a (ORHE)9780738456911 | ||
035 | |a (DE-627-1)047506954 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Hellner, Helmut |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Security on IBM z/VSE |c Helmut Hellner [and five others] |
250 | |a Fourth edition. | ||
264 | 1 | |a Poughkeepsie, NY |b IBM Corporation, International Technical Support Organization |c 2018 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a IBM redbooks | |
500 | |a "This edition (SG24-7691-02) applies to IBM z/VSE V6R2"--Page 2 of cover. - Includes bibliographical references. - Online resource; title from cover (Safari, viewed July 11, 2018) | ||
520 | |a Abstract One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security. | ||
650 | 0 | |a Computer security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
710 | 2 | |a International Business Machines Corporation. |b International Technical Support Organization. |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738456911/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047506954 |
---|---|
_version_ | 1829007799254777856 |
adam_text | |
any_adam_object | |
author | Hellner, Helmut |
author_corporate | International Business Machines Corporation. International Technical Support Organization |
author_corporate_role | ctb |
author_facet | Hellner, Helmut International Business Machines Corporation. International Technical Support Organization |
author_role | aut |
author_sort | Hellner, Helmut |
author_variant | h h hh |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047506954 (DE-599)KEP047506954 (ORHE)9780738456911 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Fourth edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02696cam a22004332c 4500</leader><controlfield tag="001">ZDB-30-ORH-047506954</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120530.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738456918</subfield><subfield code="9">0-7384-5691-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738456911</subfield><subfield code="9">978-0-7384-5691-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738456911</subfield><subfield code="9">978-0-7384-5691-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047506954</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047506954</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738456911</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047506954</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hellner, Helmut</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security on IBM z/VSE</subfield><subfield code="c">Helmut Hellner [and five others]</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fourth edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Poughkeepsie, NY</subfield><subfield code="b">IBM Corporation, International Technical Support Organization</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IBM redbooks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This edition (SG24-7691-02) applies to IBM z/VSE V6R2"--Page 2 of cover. - Includes bibliographical references. - Online resource; title from cover (Safari, viewed July 11, 2018)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Business Machines Corporation.</subfield><subfield code="b">International Technical Support Organization.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738456911/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047506954 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:36:02Z |
institution | BVB |
isbn | 0738456918 9780738456911 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IBM Corporation, International Technical Support Organization |
record_format | marc |
series2 | IBM redbooks |
spelling | Hellner, Helmut VerfasserIn aut Security on IBM z/VSE Helmut Hellner [and five others] Fourth edition. Poughkeepsie, NY IBM Corporation, International Technical Support Organization 2018 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier IBM redbooks "This edition (SG24-7691-02) applies to IBM z/VSE V6R2"--Page 2 of cover. - Includes bibliographical references. - Online resource; title from cover (Safari, viewed July 11, 2018) Abstract One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security. Computer security Sécurité informatique International Business Machines Corporation. International Technical Support Organization. MitwirkendeR ctb |
spellingShingle | Hellner, Helmut Security on IBM z/VSE Computer security Sécurité informatique |
title | Security on IBM z/VSE |
title_auth | Security on IBM z/VSE |
title_exact_search | Security on IBM z/VSE |
title_full | Security on IBM z/VSE Helmut Hellner [and five others] |
title_fullStr | Security on IBM z/VSE Helmut Hellner [and five others] |
title_full_unstemmed | Security on IBM z/VSE Helmut Hellner [and five others] |
title_short | Security on IBM z/VSE |
title_sort | security on ibm z vse |
topic | Computer security Sécurité informatique |
topic_facet | Computer security Sécurité informatique |
work_keys_str_mv | AT hellnerhelmut securityonibmzvse AT internationalbusinessmachinescorporationinternationaltechnicalsupportorganization securityonibmzvse |