Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mainframe Basics for Security Professionals: Getting Started with RACF

Buy
Security—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers the security system, the person who operates a data center, the person who executes a transaction, or the person who moves data on tapes between buildings. Today there is so much personally identifiable data and so many chances for fraud that securing that information is critical to the global economy.

For more than 40 years, the IBM® mainframe has been the backbone of financial services and the retail industry. Billions of transactions are executed every day across this infrastructure. The mainframe is known for its rock-solid security and integrity, yet, that is possible only with the assurance of a well-trained staff operating those systems and ensuring that the essential processes are being adhered to.

UNIX® systems have become ubiquitous in the IT world as well. Universities train thousands of students on these systems annually. Most businesses with mainframe computers are operating UNIX systems as well. It is important that a consistent operational approach be taken across these systems, to maintain the security of the overall environment. This book is intended for administrators and systems programmers who have come from the UNIX world and attempts to explain the security nuances of the mainframe. Remarkably, although the syntax of commands might be completely different, a wealth of similarities exists in the operational environment.

Based on its heritage and holistic design across the hardware, firmware, operating system, and middleware, the mainframe has some unique capabilities for additional security. This book looks at many of the basic and advanced properties for securing a mainframe, to help businesses maintain the integrity of their transactions.
(HTML tags aren't allowed.)

Understanding Forensic Digital Imaging
Understanding Forensic Digital Imaging
The science of digital imaging can be divided into two separate branches: the techniques that explain how to use and create digital images, and the technical knowledge that is necessary to design cameras, computers, and software. The expert witness should be a skilled practitioner in the techniques and have enough understanding of the technical...
Digital Holography and Digital Image Processing: Principles, Methods, Algorithms
Digital Holography and Digital Image Processing: Principles, Methods, Algorithms

Digital holography and digital image processing are twins born by computer era. They share origin, theoretical base, methods and algorithms. The present book describes these common fundamentals principles, methods and algorithms including image and hologram digitization, data compression, digital transforms and efficient computational...

Camel in Action
Camel in Action

Apache Camel is a Java framework that lets you implement the standard enterprise integration patterns in a few lines of code. With a concise but sophisticated DSL you snap integration logic into your app, Lego-style, using Java, XML, or Scala. Camel supports over 80 common transports such as HTTP, REST, JMS, and Web Services.

...

Mobile Forensics: Advanced Investigative Strategies
Mobile Forensics: Advanced Investigative Strategies

Key Features

  • A straightforward guide to address the roadblocks face when doing mobile forensics
  • Simplify mobile forensics using the right mix of methods, techniques, and tools
  • Get valuable advice to put you in the mindset of a forensic professional, regardless of your career...
Enterprise Solution Patterns Using Microsoft .Net: Version 2.0 : Patterns & Practices
Enterprise Solution Patterns Using Microsoft .Net: Version 2.0 : Patterns & Practices

This book captures the knowledge of seasoned developers and presents it in the form of a patterns catalog. Each pattern contains a simple, proven mechanism that solves a commonly recurring technical challenge. Patterns provide a common vocabulary and taxonomy for developers and architects to describe solutions concisely. By providing a...

The Essential R Reference
The Essential R Reference

An essential library of basic commands you can copy and paste into R The powerful and open-source statistical programming language R is rapidly growing in popularity, but it requires that you type in commands at the keyboard rather than use a mouse, so you have to learn the language of R. But there is a shortcut, and that's where this...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy