Index
 
Operating Systems
Java
Programming Languages
Hardware
Microsoft Technologies
Computer Science
Database
Network
Software Engineering
XML and XSL
Internet
Web Programming
Web Technologies
Physics
Bio-Chemistry
Mathematics
Medical
Redbooks
Unlisted/Miscellaneous

Contact Us

Freebookzone.com | What's New | Missing Link | Feedback

Redbooks Draft



Book Title : Introduction to the New Mainframe: Security
eBook download format(s) : PDF HTM 
ISBN-10 : 0738489656 
ISBN-13 : 978-0-738489-65-0 
Author(s) : Rica Weller  Ross Clements Ken Dugdale Per Fremstad Olegario Hernandez William C. Johnston Patrick Kappeler Linda Kochersberger Abey Tedla Jeff Thompson Ashwin Venkatraman  
Section : Redbooks Draft
Book Review:

Book Description
This IBM Redbook provides students of information systems with the background knowledge and skills necessary to begin using the basic security facilities of IBM System z. It enables a broad understanding of both the security principles and the hardware and software components needed to insure that the mainframe resources and environment are secure. It also explains how System z components interface with some non-System z components. A multi-user, multi-application, multi-task environment such as System z requires a different level of security than that typically encountered on a single-user platform. In addition, when a mainframe is connected in a network to other processors, a multi-layered approach to security is recommended. Students are assumed to have successfully completed introductory courses in computer system concepts. Although this course looks into all the operating systems on System z, the main focus is on IBM z/OS. Thus, it is strongly recommended that students have also completed an introductory course on z/OS.
Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe-based platforms, as well as those who are familiar with some aspects of the mainframe environment or applications but want to learn more about the security and integrity facilities and advantages offered by the mainframe environment.

Table of Contents
Part 1. Overview of security fundamentals
Chapter 1. Why do we need security and why use a mainframe?
Chapter 2. The bookstore--a case study
Chapter 3. Security Concepts
Chapter 4. Elements of security
Part 2. Hardware and Networking security
Chapter 5. System z architecture and security
Chapter 6. System z virtualization and its challenges
Chapter 7. Cryptography on System z
Chapter 8. Network Security for System z
Part 3. Securing operating systems on System z
Chapter 9. z/OS System Integrity
Chapter 10. z/OS System Authorization Facility and Security Managers
Chapter 11. Security in z/OS UNIX
Chapter 12. z/OS Communications Security
Chapter 13. Security in z/VM
Chapter 14. Security in Linux on System z
Chapter 15. Security in z/VSE
Chapter 16. Security in z/TPF
Part 4. Security in Middleware and Applications
Chapter 17. Data Management Security
Chapter 18. Transaction security
Chapter 19. Web-based security
Chapter 20. Security for Identity Management
Part 5. Information Security Program and Compliance
Chapter 21. Creating an Information Security Program
Chapter 22. Compliance and Certification
Chapter 23. Operational Information Security Policy and Management
Chapter 24. Security Audits
Appendix A. Security Integrity Models
Appendix B. z/OS UNIX General Resource Classes
Appendix C. The Mainframe Charter

Special Notices
These pages are Web versions of IBM Redbooks- and Redpapers-in-progress. They are published here for those who need the information now and may contain spelling, layout and grammatical errors.
This material has not been submitted to any formal IBM test and is published AS IS. It has not been the subject of rigorous review. Your feedback is welcomed to improve the usefulness of the material to others.

IBM assumes no responsibility for its accuracy or completeness. The use of this information or the implementation of any of these techniques is a customer responsibility and depends upon the customer's ability to evaluate and integrate them into the customer's operational environment.
PDF Size: (5.9 MB)




add to del.icio.us                 Digg Freebookzone.com!

You may use anyone of the download options


eBook VersionBuy this book from Amazon
Front Cover

Missing Link?, Report It and try these 2 + 1 alternates...
  
     Buy 


Tell a Friend!

Similar Book titles in Redbooks Draft section:
System i Application Modernization: Building a New Interface to Your Legacy Applications
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
GDPS Family - An Introduction to Concepts and Capabilities
iSeries Application Modernization: Building a New Interface to Your Legacy Applications
Enterprise Security Architecture using IBM ISS Security Solutions
Enterprise Security Architecture Using IBM Tivoli Security Solutions
WebSphere Application Server V6.1 Security Handbook
IBM Technology for Java? Virtual Machine ? New 32-bit JVM on System i?
IBM System Storage DS3000: Introduction and Implementation Guide
Understanding SOA Security Design and Implementation
IBM System z9 Business Class Technical Introduction
Communications Server for z/OS V1R8 TCP/IP Implementation Volume 4: Policy-based Network Security
AIX 6 Advanced Security Features
Introduction to Workload Partition Management in IBM AIX Version 6
Advanced POWER Virtualization on IBM System p5: Introduction and Configuration
AIX V6 Advanced Security Features Introduction and Configuration
IBM System z10 Enterprise Class Technical Introduction
IBM b-type Data Center Networking - Design and Best Practices Introduction
IBM b-type Data Center Networking - Product Introduction and Initial Setup
Security on the Mainframe
DB2 9 for z/OS: New Tools for Query Optimization
Introduction to the ISPF Productivity Tool: Turbocharge your ISPF for z/OS Environment - IPT based on practical examples
Advanced POWER Virtualization on IBM System p Introduction and Configuration
Deployment Guide Series: IBM Tivoli Security Compliance Insight Manager
DB2 Security and Compliance Solutions for Linux, UNIX and Windows
PowerVM Virtualization on IBM System p Introduction and Configuration Fourth Edition
Introduction to the ISPF Productivity Tool V5.9: Turbocharge your ISPF for z/OS Environment - IPT based on practical examples
IBM System Storage/Brocade 8 Gbps Multiprotocol Routing: An Introduction and Implementation
z/OS Mainframe Security and Audit Management using IBM Tivoli zSecure
IBM Communications Server for z/OS V1R10 TCP/IP Implementation Volume 4: Security and Policy-Based Networking
Security Guide for IBM i V6.1
IBM System Storage/Brocade Multiprotocol Routing: An Introduction and Implementation
Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
Security Functions with DB2 10 for z/OS
IBM System Storage DS3500: Introduction and Implementation Guide
IBM b-type Data Center Networking: Design and Best Practices Introduction
IBM z/OS V1R12 Communications Server TCP/IP Implementation Volume 4: Security and Policy-Based Networking
Introduction to the New Mainframe: z/OS Basics
IBM zEnterprise System Technical Introduction
End to End Security - z/OS Identity Propagation
Security on IBM z/VSE
Setup Security and Integration with the DataPower XI50z for zEnterprise
Introduction to IBM Real-time Compression Appliances
An introduction to z/VM SSI and LGR
New Ways of Running Batch Applications on z/OS Vol. II: z/OS Batch Runtime
IBM Business Process Manager Security: Concepts and Recommendations
Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager
IBM zEnterprise EC12 Technical Introduction
IBM PowerVM Virtualization Introduction and Configuration
GDPS Family - An Introduction to Concepts and Facilities
New ways of running batch applications on z/OS Vol. I: CICS Transaction Server
New Ways of Running Batch Applications on z/OS Vol. IV: IMS
IBM Flex System V7000 Storage Node Introduction and Implementation Guide
IBM PowerVC Introduction and Configuration
Security on the IBM Mainframe, Vol. 1 A Holistic Approach by Reducing Risk and Improving Security
GDPS Family An Introduction to Concepts and Capabilities
IBM PowerVC Version 1.2 Introduction and Configuration
An Architect's Guide to New Java Workloads in CICS (Transaction Server)
Centrally Managing Access to Self-Encrypting Drives in IBM System x Servers Using IBM Security Key Lifecycle Manager
An Architect's Guide to New Java Workloads in CICS Transaction Server
Centrally Managing Access to Self-Encrypting Drives in System x Servers Using IBM Security Key Lifecycle Manager
GDPS Family: An introduction to Concepts and Capabilities
Security on the IBM Mainframe, Vol. 3 A Holistic Approach by Reducing Risk and Improving Security
IBM PowerVC Version 1.2.3 Introduction and Configuration
Security on the IBM Mainframe, Vol. 2 A Holistic Approach by Reducing Risk and Improving Security
IBM GDPS Family: An introduction to Concepts and Capabilities


Similar Book titles in Other sections:

Section: Bio-Chemistry
Introduction to Glycolysis
Variation and Evolution in Plants and Microorganisms: Towards a New Synthesis: 50 Years after Stebbins
Computational Molecular Biology: An Introduction


Section: CS -> Compilers and Languages
Semantics with Applications: A Formal Introduction
An Introduction to GCC
Introduction to Programming Languages
Data, Syntax and Semantics - An Introduction to Modelling Programming Languages
Introduction to Machine Learning
Show all..


Section: Data Structures and Algorithms
Introduction to Computer Graphics
Introduction to Algorithms


Section: CS -> Theory
Introduction to Computer Science I
An Introduction to the Theory of Computation (Principles of Computer Science Series)
Introduction to Symbolic Computation
An Introduction to Multigrid Methods
Categories, Types And Structures - An Introduction to Category Theory for The Working Computer Scientist
Show all..


Section: DB -> Datawarehousing
Data Mining - An Introduction Student Notes


Section: DB -> Oracle
Oracle Database 10g New Features


Section: DB -> Others
Introduction to Databases for the Web
Introduction to Databases for Web Developers
Introduction to Sybase


Section: DB -> Postgre SQL
PostgreSQL: Introduction and Concepts
An Introduction to MySQL


Section: DB -> SQL
Introduction to SQL
A Gentle Introduction to SQL
Structured Query Language (SQL) : A Practical Introduction


Section: Device Drivers
Introduction to Writing Windows CE Display Drivers


Section: Logic Design and Architecture
An Introduction to VHDL


Section: Microprocessor
CAN (Controller Area Network): Introduction and Fundamentals
Extensible Firmware Interface: booting the new generation of Intel Architecture platforms
Introduction to Microcontrollers
Introduction to PLC controllers
Introduction to 8080/8085 Assembly Language Programming
Show all..


Section: Peripherals
Introduction to PCI


Section: Internet
Practical UNIX & Internet Security
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
The New Hacker's Dictionary
Computer Security Basics 2nd Edition
Writing Security Tools And Exploits
Show all..


Section: Advanced Java
Introduction to Computer Science Using Java


Section: Java Enterprise Edition
Enterprise Java Beans, an Introduction


Section: Java User Interface
Java 2D: An Introduction and Tutorial


Section: Java Language
Introduction to Programming Using Java
Introduction to Interactive Programming In Java
Introduction to Programming (in Java) - An Interdisciplinary Approach
Introduction to Neural Networks with Java


Section: Java Networking
JAVA 2 Network Security


Section: Life & Health
The Mind At Night - The New Science Of How And Why We Dream


Section: Mathematics
An Introduction to Neural Networks
Introduction to Group Theory
A Computational Introduction to Number Theory and Algebra
Introduction to Matrix Algebra
The Not So Short Introduction to LATEX 2e
Show all..


Section: Miscellaneous
An introduction to Cryptography
Introduction to Sound Processing
E-Commerce: An Introduction
Introduction to Marketing Models
A Gentle Introduction to TeX, a Manual for Self-study
Show all..


Section: Sales, Marketing & Trading
Engaged Knowledge Management Engagement With New Realities


Section: Microsoft Certifications
MCSE Training - 70-221 - Networking Infrastructure Design (New Riders)
MCSE 70-215 New Riders(Win2K Server)


Section: Microsoft C Sharp (C#)
A Programmer's Introduction to C# (Second Edition)
Programmer Introduction to C#


Section: Microsoft .(dot) net
The .NET Developer's Guide to Windows Security
Improving Web Application Security: Threats and Countermeasures


Section: Networking
Introduction to Data Communications
Introduction to Computer, Internet & Network Systems Security
Cisco - Designing Network Security
Cisco Secure Internet Security Solutions
Router Security Configuration Guide
Show all..


Section: GNU/Linux OS
Introduction to Linux
Linux Newbie Administrator Guide
Introduction to Socket Programming
Security in Open Systems
An Introduction to Tkinter
Show all..


Section: Mac OS X
Maximum Mac OS X Security


Section: Embedded and RTOS
Introduction to Robotics: Mechanics and Control


Section: OS Theory
A Short Introduction to Operating Systems


Section: Unix OS
Introduction to Unix for Web Developers


Section: Physics
Neutrinos and Beyond: New Windows on Nature
Astronomy and Astrophysics in the New Millennium
Physics in a New Era: An Overview
Connecting Quarks with the Cosmos: Eleven Science Questions for the New Century


Section: Assembly Language
Introduction to RISC Assembly Language Programming
Programmed Introduction to MIPS Assembly Language
Introduction to Reverse Engineering Software


Section: C Language
Introduction to C and C++ Programming
Introduction to C Programming
The New C Standard: A Cultural and Economic Commentary


Section: C++ Language
An Introduction to C++ and Object Oriented Programming
An Introduction to C++ Programming
Compilers and Compiler Generators: an introduction with C++
Introduction to C++ Programming I
Introduction to Object-Oriented Programming Using C++
Show all..


Section: Other Programming
Common Lisp: A Gentle Introduction to Symbolic Computation
Ada Distilled: An Introduction to Ada Programming
An Introduction to Programming in Emacs Lisp
An Introduction to Logic Programming Through Prolog
Job Control Language (JCL) Introduction
Show all..


Section: Ruby Programming
Things That Newcomers to Ruby Should Know


Section: Scripting
An Introduction to Scheme and its Implementation
Introduction to TCL/TK
Concrete Abstractions: An Introduction to Computer Science Using Scheme
An Introduction to Python


Section: Smalltalk
Smalltalk: An Introduction to Application Development Using VisualWorks
Smalltalk and Object Orientation: An Introduction


Section: Redbooks
Security Considerations in Notes and Domino 7: Making Great Security Easier to Implement
Communications Server for z/OS V1R7 TCP/IP Implementation, Volume 4: Policy-Based Network Security
Enterprise Security Architecture Using IBM Tivoli Security Solutions
IBM TotalStorage: Introduction to SAN Routing
Security for Linux on System z
Show all..


Section: Redpapers
IBM System p5 510 and 510Q Technical Overview and Introduction
IBM BladeCenter JS21 Technical Overview and Introduction
IBM System p5 185 Technical Overview and Introduction
IBM System p5 560Q Technical Overview and Introduction
IBM IntelliStation POWER 185 Technical Overview and Introduction
Show all..


Section: Redpapers Draft
IBM System p5 505 and 505Q Technical Overview and Introduction
IBM System p5 550 and 550Q Technical Overview and Introduction
IBM System p5 510 and 510Q Technical Overview and Introduction
IBM System p5 590 and 595 Technical Overview and Introduction
System x3755 Technical Introduction
Show all..


Section: Software Engineering
How to Design Programs: An Introduction to Programming and Computing
Task-Centered User Interface Design - A Practical Introduction


Section: Travel and Routes
Rough Guide Directions - New York
Adventure Tourism: The New Frontier


Section: Web Programming
Voodoo's Introduction to JavaScript
Introduction to Databases for the Web
A Programmer's Introduction to PHP 4.0


Section: Web Technology
Introduction to Dynamic HTML
Introduction to Adobe Photoshop
Introduction to Web Design
Introduction to HTML
Introduction to Web Design
Show all..


Section: XML, XSL & UML
A Gentle Introduction to XML
Introduction to XML for Web Developers
A Technical Introduction to XML (N. Walsh)
Introduction to XForms
Introduction to XML Programming
Show all..


Similar Books from Amazon :


Tell a Friend!


©2008 FreeBookZone.com - Home - Privacy Policy - Program Policy, Terms and Conditions