Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security


Book Description

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.




First Generation Mainframes


Book Description

This volume describes several different models of IBM computer systems, characterized by different data representations and instruction sets that strongly influenced computer system architecture in the 1950s and early 1960s. They focused on a common system architecture that allowed peripherals to be used on different systems, albeit with specific adapters. These systems were modular, which made them easy to manufacture, configure, and service. Computing with UNIVAC, they used reliable Williams Tubes for memory, and later introduced magnetic core memory. IBM developed its own magnetic tape drives and magnetic drums that were both faster and more reliable than UNIVAC’s peripherals. The first software systems that could reasonably be called “operating systems” enabled more efficient use of programmer time and system resources. The development of programming languages, notably FORTRAN, and assembly language processors, notably Autocoder, improved the productivity of programmers. In addition, IBM developed one of the finest product marketing, sales and servicing organizations in the world. The legacy of the IBM 700 series is found in their popular successors, the IBM 7000 Series, which will be described in a forthcoming volume.




IBM Mainframes


Book Description

The definitive reference for 360, 370, and 370/XA architecture, as well as design concepts for the 303X, 4381, 308X, 9370, and 3090 series. Updated to include the latest pertinent information on the new 370/ESA architecture, as well as the new Summit series.




What On Earth is a Mainframe?


Book Description

Confused about zSeries Mainframes? Need to understand the z/OS operating system - and in a hurry? Then you've just found the book you need.Avoiding technical jargon, this book gives you the basic facts in clear, light-hearted, entertaining English. You'll quickly learn what Mainframes are, what they do, what runs on them, and terms and terminology you need to speak Mainframe-ese.But it's not all technical. There's also invaluable information on the people that work on Mainframes, Mainframe management issues, new Mainframe trends, and other facts that don't seem to be written down anywhere else.Programmers, managers, recruitment consultants, and industry commentators will all find this book their new best friend when trying to understand the Mainframe world.




Second Generation Mainframes


Book Description

Second Generation Mainframes: The IBM 7000 Series describes IBM’s second generation of mainframe computers which introduced new technology, new peripherals and advanced software. These systems were continuations of the instruction sets of the IBM 700 series with significant enhancements, but supported upwards compatibility that preserved customers’ investment in the earlier series. The use of magnetic cores, fast magnetic tapes and disks, and transistors yielded computation speeds that opened new domains for computation. Programming languages continued to be developed and enhanced, and new ones were developed for specific domains, such as SNOBOL, COBOL, and Macro Assemblers. Robust subroutine libraries for mathematical applications appeared. New operating systems provided many capabilities to programmers for data management and file systems, limited multiprocessing, timesharing, programming language support, and better error handling and control of peripherals. Early concepts in persistent file systems on magnetic disks were developed that changed the nature of job processing. The IBM 7000 series led the way in many innovative concepts that helped to establish IBM as the foremost manufacturer of computer systems. However, the diversity of the models put significant strain on IBM’s financial resources and development teams, which ultimately led to OBM’s development of the System/360 family of machines.




Reduce Risk and Improve Security on IBM Mainframes: Volume 2 Mainframe Communication and Networking Security


Book Description

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). In an age of increasing security consciousness and more dangerous and advanced persistent threats, System z provides the capabilities to address today's business security challenges. This book explores how System z hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems that offer a variety of customizable security elements. We also describe z/OS and other operating systems and additional software that use the building blocks of System z hardware to meet business security needs. We explore these from the perspective of an enterprise security architect and how a modern mainframe must fit into an enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of the System z platform, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.




Mainframe Basics for Security Professionals


Book Description

Leverage Your Security Expertise in IBM® System zTM Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the IBM System z mainframe platform from UNIX®, Linux®, or Windows®, you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. Even if you’ve never logged onto a mainframe before, this book will teach you how to run today’s z/OS® operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don’t have a mainframe available for practice? The book contains step-by-step videos walking you through dozens of key techniques. Simply log in and register your book at www.ibmpressbooks.com/register to gain access to these videos. The authors illuminate the mainframe’s security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you’re an experienced system administrator or security professional, there’s no faster way to extend your expertise into “big iron” environments. Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why




Linux on the Mainframe


Book Description

This is the comprehensive guide to Linux on the mainframe straight from the IBM Linux experts. The book covers virtualization, security, systems management, and more.




It Infrastructure Architecture - Infrastructure Building Blocks and Concepts Second Edition


Book Description

For many decades, IT infrastructure has provided the foundation for successful application deployment. Yet, general knowledge of infrastructures is still not widespread. Experience shows that software developers, system administrators, and project managers often have little knowledge of the big influence IT infrastructures have on the performance, availability and security of software applications. This book explains the concepts, history, and implementation of IT infrastructures. Although many of books can be found on individual infrastructure building blocks, this is the first book to describe all of them: datacenters, servers, networks, storage, virtualization, operating systems, and end user devices. Whether you need an introduction to infrastructure technologies, a refresher course, or a study guide for a computer science class, you will find that the presented building blocks and concepts provide a solid foundation for understanding the complexity of today's IT infrastructures.




Introduction to the New Mainframe


Book Description

This IBM Redbook provides students of information systems technology with the background knowledge and skills necessary to begin using the basic facilities of a mainframe computer. It is the first in a planned series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate. This textbook can also be used as a prerequisite for courses in advanced topics or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation, nor is it a reference book that discusses every feature and option of the mainframe facilities. Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment. As we go through this course, we suggest that the instructor alternate between text, lecture, discussions, and hands-on exercises. Many of the exercises are cumulative, and are designed to show the student how to design and implement the topic presented. The instructor-led discussions and hands-on exercises are an integral part of the course material, and can include topics not covered in this textbook. This book is also offered with a textbook cover instead of a redbook cover in PDF and hardcopy formats. Download PDF of book with textbook cover (6.0MB) Order hardcopy of book with textbook cover Note: The contents of the book are identical in both the textbook and redbook versions except for the covers.