Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
Title | Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security PDF eBook |
Author | Axel Buecker |
Publisher | IBM Redbooks |
Pages | 200 |
Release | 2015-11-02 |
Genre | Computers |
ISBN | 0738441023 |
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
First Generation Mainframes
Title | First Generation Mainframes PDF eBook |
Author | Stephen H. Kaisler |
Publisher | Cambridge Scholars Publishing |
Pages | 220 |
Release | 2018-11-30 |
Genre | Computers |
ISBN | 1527522636 |
This volume describes several different models of IBM computer systems, characterized by different data representations and instruction sets that strongly influenced computer system architecture in the 1950s and early 1960s. They focused on a common system architecture that allowed peripherals to be used on different systems, albeit with specific adapters. These systems were modular, which made them easy to manufacture, configure, and service. Computing with UNIVAC, they used reliable Williams Tubes for memory, and later introduced magnetic core memory. IBM developed its own magnetic tape drives and magnetic drums that were both faster and more reliable than UNIVAC’s peripherals. The first software systems that could reasonably be called “operating systems” enabled more efficient use of programmer time and system resources. The development of programming languages, notably FORTRAN, and assembly language processors, notably Autocoder, improved the productivity of programmers. In addition, IBM developed one of the finest product marketing, sales and servicing organizations in the world. The legacy of the IBM 700 series is found in their popular successors, the IBM 7000 Series, which will be described in a forthcoming volume.
IBM Mainframes
Title | IBM Mainframes PDF eBook |
Author | Nallur S. Prasad |
Publisher | McGraw-Hill Companies |
Pages | 360 |
Release | 1994 |
Genre | Computers |
ISBN |
The definitive reference for 360, 370, and 370/XA architecture, as well as design concepts for the 303X, 4381, 308X, 9370, and 3090 series. Updated to include the latest pertinent information on the new 370/ESA architecture, as well as the new Summit series.
What On Earth is a Mainframe?
Title | What On Earth is a Mainframe? PDF eBook |
Author | David Stephens |
Publisher | Lulu.com |
Pages | 210 |
Release | 2008-10-08 |
Genre | Computers |
ISBN | 1409225356 |
Confused about zSeries Mainframes? Need to understand the z/OS operating system - and in a hurry? Then you've just found the book you need.Avoiding technical jargon, this book gives you the basic facts in clear, light-hearted, entertaining English. You'll quickly learn what Mainframes are, what they do, what runs on them, and terms and terminology you need to speak Mainframe-ese.But it's not all technical. There's also invaluable information on the people that work on Mainframes, Mainframe management issues, new Mainframe trends, and other facts that don't seem to be written down anywhere else.Programmers, managers, recruitment consultants, and industry commentators will all find this book their new best friend when trying to understand the Mainframe world.
Second Generation Mainframes
Title | Second Generation Mainframes PDF eBook |
Author | Stephen H. Kaisler |
Publisher | Cambridge Scholars Publishing |
Pages | 393 |
Release | 2019-06-04 |
Genre | Computers |
ISBN | 1527535428 |
Second Generation Mainframes: The IBM 7000 Series describes IBM’s second generation of mainframe computers which introduced new technology, new peripherals and advanced software. These systems were continuations of the instruction sets of the IBM 700 series with significant enhancements, but supported upwards compatibility that preserved customers’ investment in the earlier series. The use of magnetic cores, fast magnetic tapes and disks, and transistors yielded computation speeds that opened new domains for computation. Programming languages continued to be developed and enhanced, and new ones were developed for specific domains, such as SNOBOL, COBOL, and Macro Assemblers. Robust subroutine libraries for mathematical applications appeared. New operating systems provided many capabilities to programmers for data management and file systems, limited multiprocessing, timesharing, programming language support, and better error handling and control of peripherals. Early concepts in persistent file systems on magnetic disks were developed that changed the nature of job processing. The IBM 7000 series led the way in many innovative concepts that helped to establish IBM as the foremost manufacturer of computer systems. However, the diversity of the models put significant strain on IBM’s financial resources and development teams, which ultimately led to OBM’s development of the System/360 family of machines.
Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security
Title | Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security PDF eBook |
Author | Axel Buecker |
Publisher | IBM Redbooks |
Pages | 188 |
Release | 2015-09-25 |
Genre | Computers |
ISBN | 0738440949 |
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.
Mainframe Basics for Security Professionals
Title | Mainframe Basics for Security Professionals PDF eBook |
Author | Ori Pomerantz |
Publisher | Pearson Education |
Pages | 194 |
Release | 2007-12-28 |
Genre | Computers |
ISBN | 013270434X |
Leverage Your Security Expertise in IBM® System zTM Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the IBM System z mainframe platform from UNIX®, Linux®, or Windows®, you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. Even if you’ve never logged onto a mainframe before, this book will teach you how to run today’s z/OS® operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don’t have a mainframe available for practice? The book contains step-by-step videos walking you through dozens of key techniques. Simply log in and register your book at www.ibmpressbooks.com/register to gain access to these videos. The authors illuminate the mainframe’s security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you’re an experienced system administrator or security professional, there’s no faster way to extend your expertise into “big iron” environments. Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why