Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 3rd ed.
    Series Statement: IBM redbooks
    Keywords: Computer security ; Electronic books ; Electronic books ; local
    Abstract: One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data has to be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE™ system has extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent-they could have been using resources without the business even being aware that they are there. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.
    Note: Number on resource description page: SG24-7691-02. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed Feb. 3, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...