EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Lotus Domino 6 for Z OS

Download or read book Lotus Domino 6 for Z OS written by Mike Ebbers and published by . This book was released on 2003 with total page 208 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book ABCs of IBM z OS System Programming Volume 6

Download or read book ABCs of IBM z OS System Programming Volume 6 written by Karan Singh and published by IBM Redbooks. This book was released on 2014-08-12 with total page 286 pages. Available in PDF, EPUB and Kindle. Book excerpt: The ABCs of IBM® z/OS® System Programming is an 11-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. If you want to become more familiar with z/OS in your current environment or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection can serve as a powerful technical tool. Following are the contents of the volumes: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, IBM Language Environment®, and SMP/E Volume 3: Introduction to DFSMS, data set basics, storage management hardware and software, VSAM, System-managed storage, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), and IBM Geographically Dispersed Parallel SysplexTM (IBM GDPS®) Volume 6: Introduction to security, IBM RACF®, digital certificates and public key infrastructure (PKI), Kerberos, cryptography and IBM z9® integrated cryptography, Lightweight Directory Access Protocol (LDAP), and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, IBM System z® processor design, System z connectivity, logical partition (LPAR) concepts, hardware configuration definition (HCD), and Hardware Management Console (HMC) Volume 11: Capacity planning, performance management, Workload Manager (WLM), IBM Resource Measurement FacilityTM (RMFTM), and System Management Facilities (SMF)

Book IBM HTTP Server on z OS  Migrating from Domino powered to Apache powered

Download or read book IBM HTTP Server on z OS Migrating from Domino powered to Apache powered written by Edward McCarthy and published by IBM Redbooks. This book was released on 2017-07-13 with total page 210 pages. Available in PDF, EPUB and Kindle. Book excerpt: Users of IBM® z/OS® for the past several years had a choice of two HTTP Servers that they can use. Now, one server became strategic while the other is no longer supported with z/OS V2.2. IHS powered by Apache supports IPv6 and 64-bit execution and includes security authentication and authorization capabilities that are similar to those capabilities that are provided in IHS powered by IBM Domino®. This IBM RedpaperTM publication is aimed at technicians who are responsible for planning and deploying system software. It provides informationon about the various features that are available in IBM HTTP Server powered by Apache. It also provides guidance about how to upgrade from the old product to the new product.

Book IBM z15 Technical Introduction

Download or read book IBM z15 Technical Introduction written by Bill White and published by IBM Redbooks. This book was released on 2021-05-03 with total page 130 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication introduces the latest member of the IBM Z® platform, the IBM z15TM. It includes information about the Z environment and how it helps integrate data and transactions more securely. It also provides insight for faster and more accurate business decisions. The z15 is a state-of-the-art data and transaction system that delivers advanced capabilities, which are vital to any digital transformation. The z15 is designed for enhanced modularity, and occupies an industry-standard footprint. It is offered as a single air-cooled 19-inch frame called the z15 T02, or as a multi-frame (1 to 4 19-inch frames) called the z15 T01. Both z15 models excel at the following tasks:: Using hybrid multicloud integration services Securing and protecting data with encryption everywhere Providing resilience with key to zero downtime Transforming a transactional platform into a data powerhouse Getting more out of the platform with operational analytics Accelerating digital transformation with agile service delivery Revolutionizing business processes Blending open source and IBM Z technologies This book explains how this system uses innovations and traditional Z strengths to satisfy growing demand for cloud, analytics, and open source technologies. With the z15 as the base, applications can run in a trusted, reliable, and secure environment that improves operations and lessens business risk.

Book IBM Tivoli Directory Server for z OS

Download or read book IBM Tivoli Directory Server for z OS written by Karan Singh and published by IBM Redbooks. This book was released on 2011-07-07 with total page 340 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication examines the IBM Tivoli® Directory Server for z/OS®. IBM Tivoli Directory Server is a powerful Lightweight Directory Access Protocol (LDAP) infrastructure that provides a foundation for deploying comprehensive identity management applications and advanced software architectures. This publication provides an introduction to the IBM Tivoli Directory Server for z/OS that provides a brief summary of its features and a examination of the possible deployment topologies. It discusses planning a deployment of IBM Tivoli Directory Server for z/OS, which includes prerequisites, planning considerations, and data stores, and provides a brief overview of the configuration process. Additional chapters provide a detailed discussion of the IBM Tivoli Directory Server for z/OS architecture that examines the supported back ends, discusses in what scenarios they are best used, and provides usage examples for each back end. The discussion of schemas breaks down the schema and provides guidance on extending it. A broad discussion of authentication, authorization, and security examines the various access protections, bind mechanisms, and transport security available with IBM Tivoli Directory Server for z/OS. This chapter also provides an examination of the new Password Policy feature. Basic and advanced replication topologies are also covered. A discussion on plug-ins provides details on the various types of plug-ins, the plug-in architecture, and creating a plug-in, and provides an example plug-in. Integration of IBM Tivoli Directory Server for z/OS into the IBM Workload Manager environment is also covered. This publication also provides detailed information about the configuration of IBM Tivoli Directory Server for z/OS. It discusses deploying IBM Tivoli Directory Server for z/OS on a single system, with examples of configuring the available back ends. Configuration examples are also provided for deploying the server in a Sysplex, and for both basic and advanced replication topologies. Finally it provides guidance on monitoring and debugging IBM Tivoli Directory Server for z/OS.

Book IBM zEnterprise 114 Technical Guide

Download or read book IBM zEnterprise 114 Technical Guide written by Bill White and published by IBM Redbooks. This book was released on 2012-02-27 with total page 416 pages. Available in PDF, EPUB and Kindle. Book excerpt: The popularity of the Internet and the affordability of IT hardware and software have resulted in an explosion of applications, architectures, and platforms. Workloads have changed. Many applications, including mission-critical ones, are deployed on a variety of platforms, and the System z® design has adapted to this change. It takes into account a wide range of factors, including compatibility and investment protection, to match the IT requirements of an enterprise. This IBM® Redbooks® publication discusses the IBM zEnterprise System, an IBM scalable mainframe server. IBM is taking a revolutionary approach by integrating separate platforms under the well-proven System z hardware management capabilities, while extending System z qualities of service to those platforms. The zEnterprise System consists of the IBM zEnterprise 114 central processor complex, the IBM zEnterprise Unified Resource Manager, and the IBM zEnterprise BladeCenter® Extension. The z114 is designed with improved scalability, performance, security, resiliency, availability, and virtualization. The z114 provides up to 18% improvement in uniprocessor speed and up to a 12% increase in total system capacity for z/OS®, z/VM®, and Linux on System z over the z10TM Business Class (BC). The zBX infrastructure works with the z114 to enhance System z virtualization and management through an integrated hardware platform that spans mainframe, POWER7TM, and System x technologies. The federated capacity from multiple architectures of the zEnterprise System is managed as a single pool of resources, integrating system and workload management across the environment through the Unified Resource Manager. This book provides an overview of the zEnterprise System and its functions, features, and associated software support. Greater detail is offered in areas relevant to technical planning. This book is intended for systems engineers, consultants, planners, and anyone wanting to understand the zEnterprise System functions and plan for their usage. It is not intended as an introduction to mainframes. Readers are expected to be generally familiar with existing IBM System z technology and terminology.

Book Exploring IBM EServer ZSeries and S 390 Servers

Download or read book Exploring IBM EServer ZSeries and S 390 Servers written by Jim Hoskins and published by Maximum Press. This book was released on 2003 with total page 468 pages. Available in PDF, EPUB and Kindle. Book excerpt: Considered the bible of the IBM zSeries and S/390 world, this new edition closely examines the role large computers will play in the new century. All the new hardware models and operating system products—Linux, VSE, MVS, VM, AIX, and Open Edition—are now available for the zSeries and are fully explained, as are critical business issues such as cost justification, lease versus purchase, support, security, and maintenance. Hypothetical small, medium, and large businesses are described and then outfitted with the appropriate zSeries solution. This replaces 1885068700.

Book IBM z OS V1R11 Communications Server TCP IP Implementation Volume 4  Security and Policy Based Networking

Download or read book IBM z OS V1R11 Communications Server TCP IP Implementation Volume 4 Security and Policy Based Networking written by Bill White and published by IBM Redbooks. This book was released on 2010-04-26 with total page 926 pages. Available in PDF, EPUB and Kindle. Book excerpt: Note: This PDF is over 900 pages, so when you open it with Adobe Reader and then do a "Save As", the save process could time out. Instead, right-click on the PDF and select "Save Target As". For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors, providing, among many other capabilities, world-class, state-of-the-art, support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer, organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations. The IBM z/OS Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication explains how to set up security for your z/OS networking environment. With the advent of TCP/IP and the Internet, network security requirements have become more stringent and complex. Because many transactions come from unknown users and from untrusted networks such as the Internet, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. Also, because security technologies are complex and can be confusing, we include helpful tutorial information in the appendixes of this book. For more specific information about z/OS Communications Server base functions, standard applications, and high availability, refer to the other volumes in the series: "IBM z/OS V1R11 Communications Server TCP/IP Implementation Volume 1: Base Functions, Connectivity, and Routing," SG24-7798 "IBM z/OS V1R11 Communications Server TCP/IP Implementation Volume 2: Standard Applications," SG24-7799 "IBM z/OS V1R11 Communications Server TCP/IP Implementation Volume 3: High Availability, Scalability, and Performance," SG24-7800 In addition, "z/OS Communications Server: IP Configuration Guide," SC31-8775, "z/OS Communications Server: IP Configuration Reference," SC31-8776, and "z/OS Communications Server: IP User's Guide and Commands," SC31-8780, contain comprehensive descriptions of the individual parameters for setting up and using the functions that we describe in this book. They also include step-by-step checklists and supporting examples. It is not the intent of this book to duplicate the information in those publications, but to complement them with practical implementation scenarios that might be useful in your environment. To determine at what level a specific function was introduced, refer to "z/OS Communications Server: New Function Summary," GC31-8771.

Book IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

Download or read book IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager written by Axel Buecker and published by IBM Redbooks. This book was released on 2010-07-16 with total page 464 pages. Available in PDF, EPUB and Kindle. Book excerpt: To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and communicating results through a dashboard and full set of audit and compliance reporting. In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information and Event Manager. We also present a typical deployment within a business scenario. This book is a valuable resource for security officers, administrators, and architects who want to understand and implement a centralized security audit and compliance solution.

Book InfoWorld

    Book Details:
  • Author :
  • Publisher :
  • Release : 2003-12-01
  • ISBN :
  • Pages : 60 pages

Download or read book InfoWorld written by and published by . This book was released on 2003-12-01 with total page 60 pages. Available in PDF, EPUB and Kindle. Book excerpt: InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.

Book Improving Productivity with IBM ISPF Productivity Tool V7 1 for z OS

Download or read book Improving Productivity with IBM ISPF Productivity Tool V7 1 for z OS written by Michael Rotter and published by IBM Redbooks. This book was released on 2013-04-24 with total page 630 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication introduces the IBM Interactive System Productivity Facility (ISPF) Productivity Tool (IPT) Version 7, Release 1 for IBM z/OS®. IPT operates as a seamlessly integrated front end to ISPF. Note the following points: IPT functionality is available from any panel, without a need to modify any ISPF Primary Options Menu. All IPT functions are totally integrated. IPT can perform almost any activity within ISPF, or internally invoke the function that can perform the task. IPT combines separately provided ISPF utility functions and new ISPF Productivity Tool features into the Object List (OLIST) and Member Selection List (MSL). The resulting members, datasets, and Object Lists become powerful platforms where you can perform many tasks without navigating to other utilities. IPT relates objects to applications in a similar manner to the way that a PC performs Object Linking and Embedding (OLE). By extending the dataset objects that are used by ISPF to other object classes, IPT lets you specify the object to be processed and the action that is performed (such as EDIT or BROWSE). The facility that is appropriate to the object class for the action that you have requested is invoked automatically. IPT provides extensive search capabilities that are both rapid and intuitive. You can easily search for volumes, datasets, members, and text within members. ISPF Productivity Tool also furnishes automatic drill-down system navigation to examine volumes, datasets, and members. IPT provides a menu-driven facility to display and recover all of the deleted members of a partitioned dataset (PDS) library. IPT extends the ISPF action bar with options that provide access to new functionality so that you do not have to learn new commands or syntax. In addition to the ISPF Point-and-Shoot capabilities, IPT provides new concepts, such as hotbars (user-defined fields that execute commands), field-sensitive areas in MSLs and OLISTs, automatic recognition of a dataset name on any ISPF panel as a parameter to BROWSE, EDIT, or VIEW, or parameters within any Time Sharing Option (TSO) command. IPT provides integrated and enhanced IBM Software Configuration and Library Manager (SCLM) support within the standard member and dataset lists. SCLM is a source library management component of ISPF that provides change control, multiple source versions, auditing, a built-in make facility, and automatic check-in/sign-out using standard libraries (PDS and partitioned dataset extended (PDSE)). IPT includes built-in interfaces to various IBM and ISV products. IPT includes a new batch utility that provides a seamlessly integrated front end to the IBM IEBCOPY utility. In addition to supporting all IEBCOPY standard functionality, it includes additional major enhancements. This book is intended as a supplement to existing product manuals. It opens with an overview of the main IPT concepts and facilities, and follows with detailed chapters which are each dedicated to a major IPT function. Practical scenarios, accompanied by window captures and coding examples, demonstrate how both experienced ISPF users and those new to the IBM z/OS environment can benefit from the IPT enhanced functionality in each case.

Book Apache Spark Implementation on IBM z OS

Download or read book Apache Spark Implementation on IBM z OS written by Lydia Parziale and published by IBM Redbooks. This book was released on 2016-08-13 with total page 144 pages. Available in PDF, EPUB and Kindle. Book excerpt: The term big data refers to extremely large sets of data that are analyzed to reveal insights, such as patterns, trends, and associations. The algorithms that analyze this data to provide these insights must extract value from a wide range of data sources, including business data and live, streaming, social media data. However, the real value of these insights comes from their timeliness. Rapid delivery of insights enables anyone (not only data scientists) to make effective decisions, applying deep intelligence to every enterprise application. Apache Spark is an integrated analytics framework and runtime to accelerate and simplify algorithm development, depoyment, and realization of business insight from analytics. Apache Spark on IBM® z/OS® puts the open source engine, augmented with unique differentiated features, built specifically for data science, where big data resides. This IBM Redbooks® publication describes the installation and configuration of IBM z/OS Platform for Apache Spark for field teams and clients. Additionally, it includes examples of business analytics scenarios.

Book Exploiting the IBM Health Checker for z OS Infrastructure

Download or read book Exploiting the IBM Health Checker for z OS Infrastructure written by Mario Bezzi and published by IBM Redbooks. This book was released on 2010-12-22 with total page 246 pages. Available in PDF, EPUB and Kindle. Book excerpt: The IBM® Health Checker for z/OS® (also identified in this book as IBM Health Checker) is a key component of the z/OS operating system, whose objective is to identify potential problems before they impact the system's availability. To do this it continuously checks many current, active z/OS and sysplex settings and compares them with those suggested by IBM or defined by you. The IBM Health Checker for z/OS is made of two parts: - A framework that provides check management and execution services. It supports check development by IBM, independent software vendors (ISVs), and users. - Individual checks that look for specific z/OS settings and definitions, checking for potential problems. Customers can use the IBM Health Checker for z/OS infrastructure to run their own checks, extending the reach of IBM Health Checker for z/OS to environment-specific settings. This IBM RedpaperTM publication introduces the IBM Health Checker and describes how to activate and use it. It teaches you how to exploit the IBM Health Checker infrastructure to run custom checks and how to identify good candidates for writing your own checks. This publication also provides a number of sample checks to give you a good start creating custom checks for your environment.

Book IBM z OS Management Facility V2R3

Download or read book IBM z OS Management Facility V2R3 written by Redelf Janssen and published by IBM Redbooks. This book was released on 2019-12-13 with total page 614 pages. Available in PDF, EPUB and Kindle. Book excerpt: This IBM® Redbooks® publication helps you install, configure, and use the IBM z/OS® Management Facility (z/OSMF). z/OSMF is a product for z/OS that simplifies, optimizes, and modernizes the z/OS system programmer experience. z/OSMF delivers solutions in a task-oriented, web browser-based user interface with integrated user assistance. The goal of z/OSMF is to improve system programmer productivity, and make functions easier to understand and use. This improvement makes system programmers more productive as quickly as possible with the least amount of training. You can automate tasks, reduce the learning curve, and improve productivity through a modern, simplified, and intuitive task-based, browser-based interface. z/OSMF is aimed at a mixed skills workforce: It is suited to professionals who are new to z/OS and those who are skilled in z/OS. Each professional has their own needs and faces their own challenges. Novice system programmer might need to understand the "big picture" and how procedures are done. Novices also need access to documentation about procedures and tasks, and implement them according to the rules of the enterprise. Experienced system programmers are familiar with tasks and procedures. Therefore, the goal is to make their work less error-prone and easier. This goal allows them to be more productive and contribute more to their business. Although z/OS delivered simplification since it was introduced, z/OSMF brings a new dimension and focus to simplification. z/OSMF simplifies and modernizes the user experience and helps make pertinent information readily available and easily accessible.

Book IBM z OS V2R2 Communications Server TCP IP Implementation  Volume 4 Security and Policy Based Networking

Download or read book IBM z OS V2R2 Communications Server TCP IP Implementation Volume 4 Security and Policy Based Networking written by Bill White and published by IBM Redbooks. This book was released on 2017-03-21 with total page 958 pages. Available in PDF, EPUB and Kindle. Book excerpt: For more than 50 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases, and mission-critical enterprise-wide applications. IBM z® Systems, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors in providing, among many other capabilities, world-class and state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations. The IBM z/OS Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication is for people who install and support z/OS Communications Server. It explains how to set up security for your z/OS networking environment. With the advent of TCP/IP and the Internet, network security requirements have become more stringent and complex. Because many transactions are from unknown users and untrusted networks such as the Internet, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. Also, because security technologies are complex and can be confusing, we include helpful tutorial information in the appendixes of this book. For more information about z/OS Communications Server base functions, standard applications, and high availability, see the other following volumes in the series: IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 1: Base Functions, Connectivity, and Routing, SG24-8360 IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 2: Standard Applications, SG24-8361 IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 3: High Availability, Scalability, and Performance, SG24-8362 This book does not duplicate the information in these publications. Instead, it complements those publications with practical implementation scenarios that might be useful in your environment. For more information about at what level a specific function was introduced, see z/OS Communications Server: New Function Summary, GC31-8771.

Book IBM z OS V1R12 Communications Server TCP IP Implementation  Volume 4 Security and Policy Based Networking

Download or read book IBM z OS V1R12 Communications Server TCP IP Implementation Volume 4 Security and Policy Based Networking written by Mike Ebbers and published by IBM Redbooks. This book was released on 2011-07-27 with total page 954 pages. Available in PDF, EPUB and Kindle. Book excerpt: For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z® provides world class and state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer, organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations. The IBM z/OS® Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication explains how to set up security for the z/OS networking environment. Network security requirements have become more stringent and complex. Because many transactions come from unknown users and untrusted networks, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. We also include helpful tutorial information in the appendixes of this book because security technologies can be quite complex, For more specific information about z/OS Communications Server base functions, standard applications, and high availability, refer to the other volumes in the series.

Book IBM z OS V2R1 Communications Server TCP IP Implementation Volume 4  Security and Policy Based Networking

Download or read book IBM z OS V2R1 Communications Server TCP IP Implementation Volume 4 Security and Policy Based Networking written by Rufus P. Credle Jr. and published by IBM Redbooks. This book was released on 2016-02-10 with total page 958 pages. Available in PDF, EPUB and Kindle. Book excerpt: For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors in providing, among many other capabilities, world-class and state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations. The IBM z/OS Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication is for people who install and support z/OS Communications Server. It explains how to set up security for your z/OS networking environment. Network security requirements have become more stringent and complex. Because many transactions are from unknown users and untrusted networks, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. Also, because security technologies are complex and can be confusing, we include helpful tutorial information in the appendixes of this book.