Security On Ibm Z Vse


Download Security On Ibm Z Vse PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Security On Ibm Z Vse book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Security on IBM z/VSE


Security on IBM z/VSE

Author: Helmut Hellner

language: en

Publisher: IBM Redbooks

Release Date: 2018-06-14


DOWNLOAD





One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.

Security on IBM Z/VSE


Security on IBM Z/VSE

Author: Helmut Hellner

language: en

Publisher:

Release Date: 2018


DOWNLOAD





Security on IBM Z/VSE


Security on IBM Z/VSE

Author: Helmut Hellner

language: en

Publisher:

Release Date: 2011


DOWNLOAD





One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data has to be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE system has extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent - they could have been using resources without the business even being aware that they are there. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.