Author: Ori Pomerantz
Publisher: Pearson Education
ISBN: 013270434X
Category : Computers
Languages : en
Pages : 194
Book Description
Leverage Your Security Expertise in IBM® System zTM Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the IBM System z mainframe platform from UNIX®, Linux®, or Windows®, you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. Even if you’ve never logged onto a mainframe before, this book will teach you how to run today’s z/OS® operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don’t have a mainframe available for practice? The book contains step-by-step videos walking you through dozens of key techniques. Simply log in and register your book at www.ibmpressbooks.com/register to gain access to these videos. The authors illuminate the mainframe’s security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you’re an experienced system administrator or security professional, there’s no faster way to extend your expertise into “big iron” environments. Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why
Mainframe Basics for Security Professionals
Author: Ori Pomerantz
Publisher: Pearson Education
ISBN: 013270434X
Category : Computers
Languages : en
Pages : 194
Book Description
Leverage Your Security Expertise in IBM® System zTM Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the IBM System z mainframe platform from UNIX®, Linux®, or Windows®, you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. Even if you’ve never logged onto a mainframe before, this book will teach you how to run today’s z/OS® operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don’t have a mainframe available for practice? The book contains step-by-step videos walking you through dozens of key techniques. Simply log in and register your book at www.ibmpressbooks.com/register to gain access to these videos. The authors illuminate the mainframe’s security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you’re an experienced system administrator or security professional, there’s no faster way to extend your expertise into “big iron” environments. Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why
Publisher: Pearson Education
ISBN: 013270434X
Category : Computers
Languages : en
Pages : 194
Book Description
Leverage Your Security Expertise in IBM® System zTM Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the IBM System z mainframe platform from UNIX®, Linux®, or Windows®, you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. Even if you’ve never logged onto a mainframe before, this book will teach you how to run today’s z/OS® operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don’t have a mainframe available for practice? The book contains step-by-step videos walking you through dozens of key techniques. Simply log in and register your book at www.ibmpressbooks.com/register to gain access to these videos. The authors illuminate the mainframe’s security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you’re an experienced system administrator or security professional, there’s no faster way to extend your expertise into “big iron” environments. Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why
Introduction to the New Mainframe
Author: Mike Ebbers
Publisher: IBM.Com/Redbooks
ISBN: 9780738495972
Category : Client/server computing
Languages : en
Pages : 0
Book Description
This IBM Redbook provides students of information systems technology with the background knowledge and skills necessary to begin using the basic facilities of a mainframe computer. It is the first in a planned series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate. This textbook can also be used as a prerequisite for courses in advanced topics or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation, nor is it a reference book that discusses every feature and option of the mainframe facilities. Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment. As we go through this course, we suggest that the instructor alternate between text, lecture, discussions, and hands-on exercises. Many of the exercises are cumulative, and are designed to show the student how to design and implement the topic presented. The instructor-led discussions and hands-on exercises are an integral part of the course material, and can include topics not covered in this textbook. This book is also offered with a textbook cover instead of a redbook cover in PDF and hardcopy formats. Download PDF of book with textbook cover (6.0MB) Order hardcopy of book with textbook cover Note: The contents of the book are identical in both the textbook and redbook versions except for the covers.
Publisher: IBM.Com/Redbooks
ISBN: 9780738495972
Category : Client/server computing
Languages : en
Pages : 0
Book Description
This IBM Redbook provides students of information systems technology with the background knowledge and skills necessary to begin using the basic facilities of a mainframe computer. It is the first in a planned series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate. This textbook can also be used as a prerequisite for courses in advanced topics or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation, nor is it a reference book that discusses every feature and option of the mainframe facilities. Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment. As we go through this course, we suggest that the instructor alternate between text, lecture, discussions, and hands-on exercises. Many of the exercises are cumulative, and are designed to show the student how to design and implement the topic presented. The instructor-led discussions and hands-on exercises are an integral part of the course material, and can include topics not covered in this textbook. This book is also offered with a textbook cover instead of a redbook cover in PDF and hardcopy formats. Download PDF of book with textbook cover (6.0MB) Order hardcopy of book with textbook cover Note: The contents of the book are identical in both the textbook and redbook versions except for the covers.
Eating the IT Elephant
Author: Richard Hopkins
Publisher: Addison-Wesley Professional
ISBN: 0132704269
Category : Business & Economics
Languages : en
Pages : 261
Book Description
A Practical, Start-to-Finish Approach to Managing, Evolving, and Transforming Legacy IT Systems For every IT executive, manager, architect, program leader, project leader, and lead analyst “Richard and Kevin introduce us to a reality that’s often neglected in our industry: the problem of evolving legacy systems, a domain they call ‘Brownfield development.’ The authors identify the root of the problem as that of complexity, and offer an approach that focuses on the fundamentals of abstraction and efficient communication to nibble at this problem of transformation bit by bit. As the old saying goes, the way you eat the elephant is one bite at a time. Richard and Kevin bring us to the table with knife and fork and other tools, and show us a way to devour this elephant in the room.” Grady Booch, IBM Fellow, co-creator of UML “Most organizations in the 21st century have an existing, complex systems landscape. It is time that the IT industry face up to the reality of the situation and the need for new development methods and tools that address it. This book describes a new approach to the development of future systems: a structured approach that recognizes the challenges of ‘Brownfield’ development, is based on engineering principles, and is supported by appropriate tooling.” Chris Winter, CEng CITP FBCS FIET, IBM Fellow, Member of the IBM Academy of Technology Most conventional approaches to IT development assume that you’re building entirely new systems. Today, “Greenfield” development is a rarity. Nearly every project exists in the context of existing, complex system landscapes--often poorly documented and poorly understood. Now, two of IBM’s most experienced senior architects offer a new approach that is fully optimized for the unique realities of “Brownfield” development. Richard Hopkins and Kevin Jenkins explain why accumulated business and IT complexity is the root cause of large-scale project failure and show how to overcome that complexity “one bite of the elephant at a time.” You’ll learn how to manage every phase of the Brownfield project, leveraging breakthrough collaboration, communication, and visualization tools--including Web 2.0, semantic software engineering, model-driven development and architecture, and even virtual worlds. This book will help you reengineer new flexibility and agility into your IT environment...integrate more effectively with partners...prepare for emerging business challenges... improve system reuse and value...reduce project failure rates...meet any business or IT challenge that requires the evolution or transformation of legacy systems. · System complexity: understand it, and harness it Go beyond the comforting illusion of your high-level architecture diagrams · How conventional development techniques actually make things worse Why traditional decomposition and abstraction don’t work--and what to do instead · Reliably reengineer your IT in line with your business priorities New ways to understand, communicate, visualize, collaborate, and solve complex IT problems · Cut the elephant down to size, one step at a time Master all four phases of a Brownfield project: survey, engineer, accept, and deploy
Publisher: Addison-Wesley Professional
ISBN: 0132704269
Category : Business & Economics
Languages : en
Pages : 261
Book Description
A Practical, Start-to-Finish Approach to Managing, Evolving, and Transforming Legacy IT Systems For every IT executive, manager, architect, program leader, project leader, and lead analyst “Richard and Kevin introduce us to a reality that’s often neglected in our industry: the problem of evolving legacy systems, a domain they call ‘Brownfield development.’ The authors identify the root of the problem as that of complexity, and offer an approach that focuses on the fundamentals of abstraction and efficient communication to nibble at this problem of transformation bit by bit. As the old saying goes, the way you eat the elephant is one bite at a time. Richard and Kevin bring us to the table with knife and fork and other tools, and show us a way to devour this elephant in the room.” Grady Booch, IBM Fellow, co-creator of UML “Most organizations in the 21st century have an existing, complex systems landscape. It is time that the IT industry face up to the reality of the situation and the need for new development methods and tools that address it. This book describes a new approach to the development of future systems: a structured approach that recognizes the challenges of ‘Brownfield’ development, is based on engineering principles, and is supported by appropriate tooling.” Chris Winter, CEng CITP FBCS FIET, IBM Fellow, Member of the IBM Academy of Technology Most conventional approaches to IT development assume that you’re building entirely new systems. Today, “Greenfield” development is a rarity. Nearly every project exists in the context of existing, complex system landscapes--often poorly documented and poorly understood. Now, two of IBM’s most experienced senior architects offer a new approach that is fully optimized for the unique realities of “Brownfield” development. Richard Hopkins and Kevin Jenkins explain why accumulated business and IT complexity is the root cause of large-scale project failure and show how to overcome that complexity “one bite of the elephant at a time.” You’ll learn how to manage every phase of the Brownfield project, leveraging breakthrough collaboration, communication, and visualization tools--including Web 2.0, semantic software engineering, model-driven development and architecture, and even virtual worlds. This book will help you reengineer new flexibility and agility into your IT environment...integrate more effectively with partners...prepare for emerging business challenges... improve system reuse and value...reduce project failure rates...meet any business or IT challenge that requires the evolution or transformation of legacy systems. · System complexity: understand it, and harness it Go beyond the comforting illusion of your high-level architecture diagrams · How conventional development techniques actually make things worse Why traditional decomposition and abstraction don’t work--and what to do instead · Reliably reengineer your IT in line with your business priorities New ways to understand, communicate, visualize, collaborate, and solve complex IT problems · Cut the elephant down to size, one step at a time Master all four phases of a Brownfield project: survey, engineer, accept, and deploy
Introduction to the New Mainframe: Security
Author: Rica Weller
Publisher: IBM Redbooks
ISBN: 0738489646
Category : Computers
Languages : en
Pages : 550
Book Description
This book provides students of information systems with the background knowledge and skills necessary to begin using the basic security facilities of IBM System z. It enables a broad understanding of both the security principles and the hardware and software components needed to insure that the mainframe resources and environment are secure. It also explains how System z components interface with some non-System z components. A multi-user, multi-application, multi-task environment such as System z requires a different level of security than that typically encountered on a single-user platform. In addition, when a mainframe is connected in a network to other processors, a multi-layered approach to security is recommended. Students are assumed to have successfully completed introductory courses in computer system concepts. Although this course looks into all the operating systems on System z, the main focus is on IBM z/OS. Thus, it is strongly recommended that students have also completed an introductory course on z/OS. Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe-based platforms, as well as those who are familiar with some aspects of the mainframe environment or applications but want to learn more about the security and integrity facilities and advantages offered by the mainframe environment.
Publisher: IBM Redbooks
ISBN: 0738489646
Category : Computers
Languages : en
Pages : 550
Book Description
This book provides students of information systems with the background knowledge and skills necessary to begin using the basic security facilities of IBM System z. It enables a broad understanding of both the security principles and the hardware and software components needed to insure that the mainframe resources and environment are secure. It also explains how System z components interface with some non-System z components. A multi-user, multi-application, multi-task environment such as System z requires a different level of security than that typically encountered on a single-user platform. In addition, when a mainframe is connected in a network to other processors, a multi-layered approach to security is recommended. Students are assumed to have successfully completed introductory courses in computer system concepts. Although this course looks into all the operating systems on System z, the main focus is on IBM z/OS. Thus, it is strongly recommended that students have also completed an introductory course on z/OS. Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe-based platforms, as well as those who are familiar with some aspects of the mainframe environment or applications but want to learn more about the security and integrity facilities and advantages offered by the mainframe environment.
DB2 Developer's Guide
Author: Craig S. Mullins
Publisher: IBM Press
ISBN: 0132836440
Category : Computers
Languages : en
Pages : 1657
Book Description
DB2 Developer's Guide is the field's #1 go-to source for on-the-job information on programming and administering DB2 on IBM z/OS mainframes. Now, three-time IBM Information Champion Craig S. Mullins has thoroughly updated this classic for DB2 v9 and v10. Mullins fully covers new DB2 innovations including temporal database support; hashing; universal tablespaces; pureXML; performance, security and governance improvements; new data types, and much more. Using current versions of DB2 for z/OS, readers will learn how to: * Build better databases and applications for CICS, IMS, batch, CAF, and RRSAF * Write proficient, code-optimized DB2 SQL * Implement efficient dynamic and static SQL applications * Use binding and rebinding to optimize applications * Efficiently create, administer, and manage DB2 databases and applications * Design, build, and populate efficient DB2 database structures for online, batch, and data warehousing * Improve the performance of DB2 subsystems, databases, utilities, programs, and SQL stat DB2 Developer's Guide, Sixth Edition builds on the unique approach that has made previous editions so valuable. It combines: * Condensed, easy-to-read coverage of all essential topics: information otherwise scattered through dozens of documents * Detailed discussions of crucial details within each topic * Expert, field-tested implementation advice * Sensible examples
Publisher: IBM Press
ISBN: 0132836440
Category : Computers
Languages : en
Pages : 1657
Book Description
DB2 Developer's Guide is the field's #1 go-to source for on-the-job information on programming and administering DB2 on IBM z/OS mainframes. Now, three-time IBM Information Champion Craig S. Mullins has thoroughly updated this classic for DB2 v9 and v10. Mullins fully covers new DB2 innovations including temporal database support; hashing; universal tablespaces; pureXML; performance, security and governance improvements; new data types, and much more. Using current versions of DB2 for z/OS, readers will learn how to: * Build better databases and applications for CICS, IMS, batch, CAF, and RRSAF * Write proficient, code-optimized DB2 SQL * Implement efficient dynamic and static SQL applications * Use binding and rebinding to optimize applications * Efficiently create, administer, and manage DB2 databases and applications * Design, build, and populate efficient DB2 database structures for online, batch, and data warehousing * Improve the performance of DB2 subsystems, databases, utilities, programs, and SQL stat DB2 Developer's Guide, Sixth Edition builds on the unique approach that has made previous editions so valuable. It combines: * Condensed, easy-to-read coverage of all essential topics: information otherwise scattered through dozens of documents * Detailed discussions of crucial details within each topic * Expert, field-tested implementation advice * Sensible examples
XPages Extension Library
Author: Paul Hannan
Publisher: IBM Press
ISBN: 0132901811
Category : Computers
Languages : en
Pages : 574
Book Description
The XPages Extension Library's next-generation XPages controls make application development far more efficient, effective, scalable, and rewarding. With IBM� Lotus� Notes�/Domino� 8.5.3 and Upgrade Pack 1, IBM has incorporated powerful new capabilities and support. These components and technologies are now fully ready for even the toughest production challenges. XPages Extension Library is the first and only complete guide to Domino development with this library; it's the best manifestation yet of the underlying XPages Extensibility Framework. Complementing the popular Mastering XPages, it gives XPages developers complete information for taking full advantage of the new components from IBM. Combining reference material and practical use cases, the authors offer step-by- step guidance for installing and configuring the XPages Extension Library and using its state-of-the-art applications infrastructure to quickly create rich web applications with outstanding user experiences. Next, the authors provide detailed step-by-step guidance for leveraging the library's powerful new support for REST services, mobile and social development, and relational data. The book concludes by showing how to include Java(tm) code in Domino XPages applications--a great way to make them even more powerful. Coverage includes Automating deployment of XPages Extension Library throughout your IBM Lotus Notes/Domino or IBM XWork environment Integrating modern design patterns and best practices into Lotus Domino applications with drag-and-drop ease Incorporating AJAX capabilities with Switch, In Place Form, and other dynamic content controls Extending applications with Dojo widgets, popups, Tooltips, Dialogs, and Pickers Implementing state-of-the-art navigation and outlines Using Layout and Dynamic Views controls to painlessly modernize most Domino applications to XPages Quickly building mobile interfaces for existing applications Using social enablers to connect with social platforms and incorporate social features Integrating SQL datasources into XPages data-driven applications
Publisher: IBM Press
ISBN: 0132901811
Category : Computers
Languages : en
Pages : 574
Book Description
The XPages Extension Library's next-generation XPages controls make application development far more efficient, effective, scalable, and rewarding. With IBM� Lotus� Notes�/Domino� 8.5.3 and Upgrade Pack 1, IBM has incorporated powerful new capabilities and support. These components and technologies are now fully ready for even the toughest production challenges. XPages Extension Library is the first and only complete guide to Domino development with this library; it's the best manifestation yet of the underlying XPages Extensibility Framework. Complementing the popular Mastering XPages, it gives XPages developers complete information for taking full advantage of the new components from IBM. Combining reference material and practical use cases, the authors offer step-by- step guidance for installing and configuring the XPages Extension Library and using its state-of-the-art applications infrastructure to quickly create rich web applications with outstanding user experiences. Next, the authors provide detailed step-by-step guidance for leveraging the library's powerful new support for REST services, mobile and social development, and relational data. The book concludes by showing how to include Java(tm) code in Domino XPages applications--a great way to make them even more powerful. Coverage includes Automating deployment of XPages Extension Library throughout your IBM Lotus Notes/Domino or IBM XWork environment Integrating modern design patterns and best practices into Lotus Domino applications with drag-and-drop ease Incorporating AJAX capabilities with Switch, In Place Form, and other dynamic content controls Extending applications with Dojo widgets, popups, Tooltips, Dialogs, and Pickers Implementing state-of-the-art navigation and outlines Using Layout and Dynamic Views controls to painlessly modernize most Domino applications to XPages Quickly building mobile interfaces for existing applications Using social enablers to connect with social platforms and incorporate social features Integrating SQL datasources into XPages data-driven applications
A Practical Guide to Trusted Computing
Author: David Challener
Publisher: Pearson Education
ISBN: 0132704390
Category : Computers
Languages : en
Pages : 415
Book Description
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a complete, open industry standard for implementing trusted computing hardware subsystems in PCs. Already available from virtually every leading PC manufacturer, TPM gives software professionals powerful new ways to protect their customers. Now, there’s a start-to-finish guide for every software professional and security specialist who wants to utilize this breakthrough security technology. Authored by innovators who helped create TPM and implement its leading-edge products, this practical book covers all facets of TPM technology: what it can achieve, how it works, and how to write applications for it. The authors offer deep, real-world insights into both TPM and the Trusted Computing Group (TCG) Software Stack. Then, to demonstrate how TPM can solve many of today’s most challenging security problems, they present four start-to-finish case studies, each with extensive C-based code examples. Coverage includes What services and capabilities are provided by TPMs TPM device drivers: solutions for code running in BIOS, TSS stacks for new operating systems, and memory-constrained environments Using TPM to enhance the security of a PC’s boot sequence Key management, in depth: key creation, storage, loading, migration, use, symmetric keys, and much more Linking PKCS#11 and TSS stacks to support applications with middleware services What you need to know about TPM and privacy--including how to avoid privacy problems Moving from TSS 1.1 to the new TSS 1.2 standard TPM and TSS command references and a complete function library
Publisher: Pearson Education
ISBN: 0132704390
Category : Computers
Languages : en
Pages : 415
Book Description
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a complete, open industry standard for implementing trusted computing hardware subsystems in PCs. Already available from virtually every leading PC manufacturer, TPM gives software professionals powerful new ways to protect their customers. Now, there’s a start-to-finish guide for every software professional and security specialist who wants to utilize this breakthrough security technology. Authored by innovators who helped create TPM and implement its leading-edge products, this practical book covers all facets of TPM technology: what it can achieve, how it works, and how to write applications for it. The authors offer deep, real-world insights into both TPM and the Trusted Computing Group (TCG) Software Stack. Then, to demonstrate how TPM can solve many of today’s most challenging security problems, they present four start-to-finish case studies, each with extensive C-based code examples. Coverage includes What services and capabilities are provided by TPMs TPM device drivers: solutions for code running in BIOS, TSS stacks for new operating systems, and memory-constrained environments Using TPM to enhance the security of a PC’s boot sequence Key management, in depth: key creation, storage, loading, migration, use, symmetric keys, and much more Linking PKCS#11 and TSS stacks to support applications with middleware services What you need to know about TPM and privacy--including how to avoid privacy problems Moving from TSS 1.1 to the new TSS 1.2 standard TPM and TSS command references and a complete function library
IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite
Author: Axel Buecker
Publisher: IBM Redbooks
ISBN: 0738435880
Category : Computers
Languages : en
Pages : 494
Book Description
Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company's sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators. This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.
Publisher: IBM Redbooks
ISBN: 0738435880
Category : Computers
Languages : en
Pages : 494
Book Description
Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company's sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators. This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.
Mastering XPages
Author: Martin Donnelly
Publisher: Pearson Education
ISBN: 0132486318
Category : Computers
Languages : en
Pages : 784
Book Description
The first complete, practical guide to XPages development - direct from members of the XPages development team at IBM Lotus Martin Donnelly, Mark Wallace, and Tony McGuckin have written the definitive programmer's guide to utilizing this breakthrough technology. Packed with tips, tricks, and best practices from IBM's own XPages developers, Mastering XPages brings together all the information developers need to become experts - whether you're experienced with Notes/Domino development or not. The authors start from the very beginning, helping developers steadily build your expertise through practical code examples and clear, complete explanations. Readers will work through scores of real-world XPages examples, learning cutting-edge XPages and XSP language skills and gaining deep insight into the entire development process. Drawing on their own experience working directly with XPages users and customers, the authors illuminate both the technology and how it can be applied to solving real business problems. Martin Donnelly previously led a software startup that developed and distributed small business accounting software. Donnelly holds a Commerce degree from University College Cork and an M.S. in Computer Science from Boston University. Mark Wallace has worked at IBM for 15 years on many projects as a technical architect and application developer. Tony McGuckin participates in the Lotus OneUI Web Application and iWidget Adoption Workgroup. He holds a bachelor's degree in Software Engineering from the University of Ulster.
Publisher: Pearson Education
ISBN: 0132486318
Category : Computers
Languages : en
Pages : 784
Book Description
The first complete, practical guide to XPages development - direct from members of the XPages development team at IBM Lotus Martin Donnelly, Mark Wallace, and Tony McGuckin have written the definitive programmer's guide to utilizing this breakthrough technology. Packed with tips, tricks, and best practices from IBM's own XPages developers, Mastering XPages brings together all the information developers need to become experts - whether you're experienced with Notes/Domino development or not. The authors start from the very beginning, helping developers steadily build your expertise through practical code examples and clear, complete explanations. Readers will work through scores of real-world XPages examples, learning cutting-edge XPages and XSP language skills and gaining deep insight into the entire development process. Drawing on their own experience working directly with XPages users and customers, the authors illuminate both the technology and how it can be applied to solving real business problems. Martin Donnelly previously led a software startup that developed and distributed small business accounting software. Donnelly holds a Commerce degree from University College Cork and an M.S. in Computer Science from Boston University. Mark Wallace has worked at IBM for 15 years on many projects as a technical architect and application developer. Tony McGuckin participates in the Lotus OneUI Web Application and iWidget Adoption Workgroup. He holds a bachelor's degree in Software Engineering from the University of Ulster.
Implementing ITIL Configuration Management
Author: Larry Klosterboer
Publisher: Pearson Education
ISBN: 0132704315
Category : Computers
Languages : en
Pages : 445
Book Description
Practical, Real-World ITIL Configuration Management—From Start to Finish The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively, and drives greater business value from all your IT investments. The core of ITIL is configuration management: the discipline of identifying, tracking, and controlling your IT environment’s diverse components to gain accurate and timely information for better decision-making. Now, there’s a practical, start-to-finish guide to ITIL configuration management for every IT leader, manager, and practitioner. ITIL-certified architect and solutions provider Larry Klosterboer helps you establish a clear roadmap for success, customize standard processes to your unique needs, and avoid the pitfalls that stand in your way. You’ll learn how to plan your implementation, deploy tools and processes, administer ongoing configuration management tasks, refine ITIL information, and leverage it for competitive advantage. Throughout, Klosterboer demystifies ITIL’s jargon, illuminates each technique with real-world advice and examples, and helps you focus on the specific techniques that offer maximum business value in your environment. Coverage includes Assessing your current configuration management maturity and setting goals for improvement Gathering and managing requirements to align ITIL with organizational needs Describing the schema of your configuration management database (CMDB) Identifying, capturing, and organizing configuration data Choosing the best tools for your requirements Integrating data and processes to create a unified logical CMDB and configuration management service Implementing pilot projects to demonstrate the value of configuration management and to test your planning Moving from a pilot to wide-scale enterprise deployment Defining roles for deployment and ongoing staffing Leveraging configuration management information: Reporting and beyond Measuring and improving CMDB data accuracy Covers ITIL version 3. Preface xvii Acknowledgments xxi About the Author xxiii Chapter 1: Overview of Configuration Management 1 Part I: Planning for Configuration Management 17 Chapter 2: Gathering and Analyzing Requirements 19 Chapter 3: Determining Scope, Span, and Granularity 37 Chapter 4: Customizing the Configuration Management Process 55 Chapter 5: Planning for Data Population 67 Chapter 6: Putting Together a Useful Project Plan 85 Part II: Implementing Configuration Management 97 Chapter 7: Choosing the Right Tools 99 Chapter 8: Implementing the Process 117 Chapter 9: Populating the Configuration Management Database 127 Chapter 10: Choosing and Running a Pilot Program 137 Chapter 11: Communication and Enterprise Roll Out 149 Part III: Running an Effective Configuration Management System 161 Chapter 12: Building a Configuration Management Team 163 Chapter 13: The Many Uses for Configuration Information 179 Chapter 14: Measuring and Improving CMDB Accuracy 193 Chapter 15: Improving the Business Value of Configuration Management 207 Index 217
Publisher: Pearson Education
ISBN: 0132704315
Category : Computers
Languages : en
Pages : 445
Book Description
Practical, Real-World ITIL Configuration Management—From Start to Finish The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively, and drives greater business value from all your IT investments. The core of ITIL is configuration management: the discipline of identifying, tracking, and controlling your IT environment’s diverse components to gain accurate and timely information for better decision-making. Now, there’s a practical, start-to-finish guide to ITIL configuration management for every IT leader, manager, and practitioner. ITIL-certified architect and solutions provider Larry Klosterboer helps you establish a clear roadmap for success, customize standard processes to your unique needs, and avoid the pitfalls that stand in your way. You’ll learn how to plan your implementation, deploy tools and processes, administer ongoing configuration management tasks, refine ITIL information, and leverage it for competitive advantage. Throughout, Klosterboer demystifies ITIL’s jargon, illuminates each technique with real-world advice and examples, and helps you focus on the specific techniques that offer maximum business value in your environment. Coverage includes Assessing your current configuration management maturity and setting goals for improvement Gathering and managing requirements to align ITIL with organizational needs Describing the schema of your configuration management database (CMDB) Identifying, capturing, and organizing configuration data Choosing the best tools for your requirements Integrating data and processes to create a unified logical CMDB and configuration management service Implementing pilot projects to demonstrate the value of configuration management and to test your planning Moving from a pilot to wide-scale enterprise deployment Defining roles for deployment and ongoing staffing Leveraging configuration management information: Reporting and beyond Measuring and improving CMDB data accuracy Covers ITIL version 3. Preface xvii Acknowledgments xxi About the Author xxiii Chapter 1: Overview of Configuration Management 1 Part I: Planning for Configuration Management 17 Chapter 2: Gathering and Analyzing Requirements 19 Chapter 3: Determining Scope, Span, and Granularity 37 Chapter 4: Customizing the Configuration Management Process 55 Chapter 5: Planning for Data Population 67 Chapter 6: Putting Together a Useful Project Plan 85 Part II: Implementing Configuration Management 97 Chapter 7: Choosing the Right Tools 99 Chapter 8: Implementing the Process 117 Chapter 9: Populating the Configuration Management Database 127 Chapter 10: Choosing and Running a Pilot Program 137 Chapter 11: Communication and Enterprise Roll Out 149 Part III: Running an Effective Configuration Management System 161 Chapter 12: Building a Configuration Management Team 163 Chapter 13: The Many Uses for Configuration Information 179 Chapter 14: Measuring and Improving CMDB Accuracy 193 Chapter 15: Improving the Business Value of Configuration Management 207 Index 217