Weller et al., 2007 - Google Patents
Introduction to the New Mainframe: SecurityWeller et al., 2007
View HTML- Document ID
- 7370230424559606894
- Author
- Weller R
- Clements R
- Dugdale K
- Fremstad P
- Hernandez O
- Johnston W
- Kappeler P
- Kochersberger L
- Tedla A
- Thompson J
- Venkatraman A
- et al.
- Publication year
External Links
Snippet
This book provides students of information systems with the background knowledge and skills necessary to begin using the basic security facilities of IBM System z. It enables a broad understanding of both the security principles and the hardware and software …
- 238000000034 method 0 description 92
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CISSP | Official (ISC) 2 guide to the CISSP CBK | |
Gollman | Computer security | |
Lehtinen et al. | Computer security basics | |
Rao et al. | The InfoSec handbook: An introduction to information security | |
Miller et al. | Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills | |
Swanson et al. | Generally accepted principles and practices for securing information technology systems | |
Ramachandran | Designing security architecture solutions | |
Krutz et al. | The CISSP Prep Guide: Mastering the ten domains of computer security | |
Solomon et al. | Information security illuminated | |
Jacobs | Engineering information security: The application of systems engineering concepts to achieve information assurance | |
Dotson | Practical cloud security | |
Krause | Information Security Management Handbook on CD-ROM | |
Paul | Official (ISC) 2 Guide to the CSSLP | |
Raina | PKI security solutions for the Enterprise: solving HIPAA, E-Paper Act, and other compliance issues | |
Beissel | Cybersecurity investments: Decision support under economic aspects | |
Chapple | Access control and identity management | |
Osborne | How to cheat at managing information security | |
Singer et al. | Trust-based security; or, trust considered harmful | |
Shaul et al. | Practical Oracle Security: Your Unauthorized Guide to Relational Database Security | |
Baars et al. | Foundations of information security based on ISO27001 and ISO27002 | |
Naranjo Rico | Holistic business approach for the protection of sensitive data: study of legal requirements and regulatory compliance at international level to define and implement data protection measures using encryption techniques | |
Ulven et al. | A Systematic Review of Cybersecurity Risks in Higher Education. Future Internet 2021, 13, 39 | |
Weller et al. | Introduction to the New Mainframe: Security | |
McMillan et al. | CISSP cert guide | |
Georgiou | Security policies for cloud computing |