[go: up one dir, main page]

Weller et al., 2007 - Google Patents

Introduction to the New Mainframe: Security

Weller et al., 2007

View HTML
Document ID
7370230424559606894
Author
Weller R
Clements R
Dugdale K
Fremstad P
Hernandez O
Johnston W
Kappeler P
Kochersberger L
Tedla A
Thompson J
Venkatraman A
et al.
Publication year

External Links

Snippet

This book provides students of information systems with the background knowledge and skills necessary to begin using the basic security facilities of IBM System z. It enables a broad understanding of both the security principles and the hardware and software …
Continue reading at books.google.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements

Similar Documents

Publication Publication Date Title
CISSP Official (ISC) 2 guide to the CISSP CBK
Gollman Computer security
Lehtinen et al. Computer security basics
Rao et al. The InfoSec handbook: An introduction to information security
Miller et al. Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills
Swanson et al. Generally accepted principles and practices for securing information technology systems
Ramachandran Designing security architecture solutions
Krutz et al. The CISSP Prep Guide: Mastering the ten domains of computer security
Solomon et al. Information security illuminated
Jacobs Engineering information security: The application of systems engineering concepts to achieve information assurance
Dotson Practical cloud security
Krause Information Security Management Handbook on CD-ROM
Paul Official (ISC) 2 Guide to the CSSLP
Raina PKI security solutions for the Enterprise: solving HIPAA, E-Paper Act, and other compliance issues
Beissel Cybersecurity investments: Decision support under economic aspects
Chapple Access control and identity management
Osborne How to cheat at managing information security
Singer et al. Trust-based security; or, trust considered harmful
Shaul et al. Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
Baars et al. Foundations of information security based on ISO27001 and ISO27002
Naranjo Rico Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement data protection measures using encryption techniques
Ulven et al. A Systematic Review of Cybersecurity Risks in Higher Education. Future Internet 2021, 13, 39
Weller et al. Introduction to the New Mainframe: Security
McMillan et al. CISSP cert guide
Georgiou Security policies for cloud computing