Security on IBM z/VSE

Abstract One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extens...

Full description

Bibliographic Details
Main Author: Hellner, Helmut
Format: eBook
Language:English
Published: Poughkeepsie, NY IBM Corporation, International Technical Support Organization 2018
Edition:Fourth edition
Series:IBM redbooks
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02139nmm a2200313 u 4500
001 EB001944456
003 EBX01000000000000001107358
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 0738456918 
050 4 |a QA76.9.A25 
100 1 |a Hellner, Helmut 
245 0 0 |a Security on IBM z/VSE  |c Helmut Hellner [and five others] 
250 |a Fourth edition 
260 |a Poughkeepsie, NY  |b IBM Corporation, International Technical Support Organization  |c 2018 
300 |a 1 volume  |b illustrations 
505 0 |a Includes bibliographical references 
653 |a Computer security / fast 
653 |a Sécurité informatique 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a IBM redbooks 
500 |a "This edition (SG24-7691-02) applies to IBM z/VSE V6R2"--Page 2 of cover 
776 |z 9780738456911 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738456911/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a Abstract One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security