IBM z/OS V1R12 Communications Server TCP/IP implementation: Volume 4: Security and policy-based networking
For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z® provides world class and state-of-the-art support for the TCP/IP Internet...
Gespeichert in:
Beteiligte Personen: | , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
IBM Redbooks
2011
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/073843566X/?ar |
Zusammenfassung: | For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z® provides world class and state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer, organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations. The IBM z/OS® Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication explains how to set up security for the z/OS networking environment. Network security requirements have become more stringent and complex. Because many transactions come from unknown users and untrusted networks, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. We also include helpful tutorial information in the appendixes of this book because security technologies can be quite complex. |
Beschreibung: | Includes index |
Umfang: | 1 Online-Ressource (954 Seiten) illustrations |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-094101892 | ||
003 | DE-627-1 | ||
005 | 20240228121940.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230802s2011 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)094101892 | ||
035 | |a (DE-599)KEP094101892 | ||
035 | |a (ORHE)073843566X | ||
035 | |a (DE-627-1)094101892 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230328 | |
100 | 1 | |a Ebbers, Mike |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a IBM z/OS V1R12 Communications Server TCP/IP implementation |b Volume 4: Security and policy-based networking |c Mike Ebbers, Rama Ayyar, Octavio L. Ferreira, Gazi Karakus, Yukihiko Miyamoto, Joel Porterie, Andi Wijaya |
246 | 3 | 3 | |a Security and policy-based networking |
264 | 1 | |a [Place of publication not identified] |b IBM Redbooks |c 2011 | |
300 | |a 1 Online-Ressource (954 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z® provides world class and state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer, organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations. The IBM z/OS® Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication explains how to set up security for the z/OS networking environment. Network security requirements have become more stringent and complex. Because many transactions come from unknown users and untrusted networks, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. We also include helpful tutorial information in the appendixes of this book because security technologies can be quite complex. | ||
630 | 2 | 0 | |a z/OS |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer networks |x Management | |
650 | 0 | |a TCP/IP (Computer network protocol) | |
650 | 0 | |a Client/server computing | |
650 | 4 | |a z/OS | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs ; Gestion | |
650 | 4 | |a TCP/IP (Protocole de réseaux d'ordinateurs) | |
650 | 4 | |a Architecture client-serveur (Informatique) | |
650 | 4 | |a Client/server computing | |
650 | 4 | |a Computer networks ; Management | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a TCP/IP (Computer network protocol) | |
700 | 1 | |a Ayyar, Rama |e VerfasserIn |4 aut | |
700 | 1 | |a Ferreira, Octavio L. |e VerfasserIn |4 aut | |
700 | 1 | |a Karakus, Gazi |e VerfasserIn |4 aut | |
700 | 1 | |a Miyamoto, Yukihiko |e VerfasserIn |4 aut | |
700 | 1 | |a Porterie, Joel |e VerfasserIn |4 aut | |
700 | 1 | |a Wijaya, Andi |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/073843566X/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-094101892 |
---|---|
_version_ | 1829007845492785152 |
adam_text | |
any_adam_object | |
author | Ebbers, Mike Ayyar, Rama Ferreira, Octavio L. Karakus, Gazi Miyamoto, Yukihiko Porterie, Joel Wijaya, Andi |
author_facet | Ebbers, Mike Ayyar, Rama Ferreira, Octavio L. Karakus, Gazi Miyamoto, Yukihiko Porterie, Joel Wijaya, Andi |
author_role | aut aut aut aut aut aut aut |
author_sort | Ebbers, Mike |
author_variant | m e me r a ra o l f ol olf g k gk y m ym j p jp a w aw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)094101892 (DE-599)KEP094101892 (ORHE)073843566X |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03807cam a22005652c 4500</leader><controlfield tag="001">ZDB-30-ORH-094101892</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121940.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230802s2011 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)094101892</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP094101892</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)073843566X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)094101892</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230328</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ebbers, Mike</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IBM z/OS V1R12 Communications Server TCP/IP implementation</subfield><subfield code="b">Volume 4: Security and policy-based networking</subfield><subfield code="c">Mike Ebbers, Rama Ayyar, Octavio L. Ferreira, Gazi Karakus, Yukihiko Miyamoto, Joel Porterie, Andi Wijaya</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Security and policy-based networking</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (954 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z® provides world class and state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer, organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations. The IBM z/OS® Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication explains how to set up security for the z/OS networking environment. Network security requirements have become more stringent and complex. Because many transactions come from unknown users and untrusted networks, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. We also include helpful tutorial information in the appendixes of this book because security technologies can be quite complex.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">z/OS</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">TCP/IP (Computer network protocol)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">z/OS</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TCP/IP (Protocole de réseaux d'ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Architecture client-serveur (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TCP/IP (Computer network protocol)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ayyar, Rama</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ferreira, Octavio L.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Karakus, Gazi</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miyamoto, Yukihiko</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Porterie, Joel</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wijaya, Andi</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/073843566X/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-094101892 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:36:46Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (954 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IBM Redbooks |
record_format | marc |
spelling | Ebbers, Mike VerfasserIn aut IBM z/OS V1R12 Communications Server TCP/IP implementation Volume 4: Security and policy-based networking Mike Ebbers, Rama Ayyar, Octavio L. Ferreira, Gazi Karakus, Yukihiko Miyamoto, Joel Porterie, Andi Wijaya Security and policy-based networking [Place of publication not identified] IBM Redbooks 2011 1 Online-Ressource (954 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z® provides world class and state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer, organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations. The IBM z/OS® Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication explains how to set up security for the z/OS networking environment. Network security requirements have become more stringent and complex. Because many transactions come from unknown users and untrusted networks, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. We also include helpful tutorial information in the appendixes of this book because security technologies can be quite complex. z/OS Computer networks Security measures Computer networks Management TCP/IP (Computer network protocol) Client/server computing Réseaux d'ordinateurs ; Sécurité ; Mesures Réseaux d'ordinateurs ; Gestion TCP/IP (Protocole de réseaux d'ordinateurs) Architecture client-serveur (Informatique) Computer networks ; Management Computer networks ; Security measures Ayyar, Rama VerfasserIn aut Ferreira, Octavio L. VerfasserIn aut Karakus, Gazi VerfasserIn aut Miyamoto, Yukihiko VerfasserIn aut Porterie, Joel VerfasserIn aut Wijaya, Andi VerfasserIn aut |
spellingShingle | Ebbers, Mike Ayyar, Rama Ferreira, Octavio L. Karakus, Gazi Miyamoto, Yukihiko Porterie, Joel Wijaya, Andi IBM z/OS V1R12 Communications Server TCP/IP implementation Volume 4: Security and policy-based networking z/OS Computer networks Security measures Computer networks Management TCP/IP (Computer network protocol) Client/server computing Réseaux d'ordinateurs ; Sécurité ; Mesures Réseaux d'ordinateurs ; Gestion TCP/IP (Protocole de réseaux d'ordinateurs) Architecture client-serveur (Informatique) Computer networks ; Management Computer networks ; Security measures |
title | IBM z/OS V1R12 Communications Server TCP/IP implementation Volume 4: Security and policy-based networking |
title_alt | Security and policy-based networking |
title_auth | IBM z/OS V1R12 Communications Server TCP/IP implementation Volume 4: Security and policy-based networking |
title_exact_search | IBM z/OS V1R12 Communications Server TCP/IP implementation Volume 4: Security and policy-based networking |
title_full | IBM z/OS V1R12 Communications Server TCP/IP implementation Volume 4: Security and policy-based networking Mike Ebbers, Rama Ayyar, Octavio L. Ferreira, Gazi Karakus, Yukihiko Miyamoto, Joel Porterie, Andi Wijaya |
title_fullStr | IBM z/OS V1R12 Communications Server TCP/IP implementation Volume 4: Security and policy-based networking Mike Ebbers, Rama Ayyar, Octavio L. Ferreira, Gazi Karakus, Yukihiko Miyamoto, Joel Porterie, Andi Wijaya |
title_full_unstemmed | IBM z/OS V1R12 Communications Server TCP/IP implementation Volume 4: Security and policy-based networking Mike Ebbers, Rama Ayyar, Octavio L. Ferreira, Gazi Karakus, Yukihiko Miyamoto, Joel Porterie, Andi Wijaya |
title_short | IBM z/OS V1R12 Communications Server TCP/IP implementation |
title_sort | ibm z os v1r12 communications server tcp ip implementation volume 4 security and policy based networking |
title_sub | Volume 4: Security and policy-based networking |
topic | z/OS Computer networks Security measures Computer networks Management TCP/IP (Computer network protocol) Client/server computing Réseaux d'ordinateurs ; Sécurité ; Mesures Réseaux d'ordinateurs ; Gestion TCP/IP (Protocole de réseaux d'ordinateurs) Architecture client-serveur (Informatique) Computer networks ; Management Computer networks ; Security measures |
topic_facet | z/OS Computer networks Security measures Computer networks Management TCP/IP (Computer network protocol) Client/server computing Réseaux d'ordinateurs ; Sécurité ; Mesures Réseaux d'ordinateurs ; Gestion TCP/IP (Protocole de réseaux d'ordinateurs) Architecture client-serveur (Informatique) Computer networks ; Management Computer networks ; Security measures |
work_keys_str_mv | AT ebbersmike ibmzosv1r12communicationsservertcpipimplementationvolume4securityandpolicybasednetworking AT ayyarrama ibmzosv1r12communicationsservertcpipimplementationvolume4securityandpolicybasednetworking AT ferreiraoctaviol ibmzosv1r12communicationsservertcpipimplementationvolume4securityandpolicybasednetworking AT karakusgazi ibmzosv1r12communicationsservertcpipimplementationvolume4securityandpolicybasednetworking AT miyamotoyukihiko ibmzosv1r12communicationsservertcpipimplementationvolume4securityandpolicybasednetworking AT porteriejoel ibmzosv1r12communicationsservertcpipimplementationvolume4securityandpolicybasednetworking AT wijayaandi ibmzosv1r12communicationsservertcpipimplementationvolume4securityandpolicybasednetworking AT ebbersmike securityandpolicybasednetworking AT ayyarrama securityandpolicybasednetworking AT ferreiraoctaviol securityandpolicybasednetworking AT karakusgazi securityandpolicybasednetworking AT miyamotoyukihiko securityandpolicybasednetworking AT porteriejoel securityandpolicybasednetworking AT wijayaandi securityandpolicybasednetworking |