The importance of modern computer networks is steadily growing as increasing amounts of data are exchanged over company intranets and the Internet. Understanding current networking technologies and communication protocols that are available for the IBM® mainframe and System z® operating systems is essential for setting up your network infrastructure with IBM z/VSE®. This IBM Redbooks® publication helps you install, tailor, and configure new networking options for z/VSE that are available with TCP/IP for VSE/ESA, IPv6/VSE, and Fast Path to Linux on System z (Linux Fast Path). We put a strong focus on network security and describe how the new OpenSSL-based SSL runtime component can be used to enhance the security of your business. This IBM Redbooks publication extends the information that is provided in Security on IBM z/VSE, SG24-7691.
One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.
Data is one the most critical and valuable assets of a business. Critical strategic decisions can be made more quickly and effectively when they are based on complete, accurate, and timely operational data. From this point of view, it is important to have an enterprise data management architecture that supports a flexible global view of the business. Many environments today are heterogeneous with a high quantity and diversity of data. In this IBM® Redbooks® publication, we help enterprise architects and IT managers with these environments make decisions for a centralized database or data warehouse. We recommend a centralized data management environment on Linux® on System z®. We include guidance for IBM z/VSETM and Linux specialists to reorganize existing IBM DB2® VSE data and build a database environment with continuous operation in Linux on System z. We begin this book by describing the possibilities and advantages of enterprise data management and different technical ways to realize it. Then we discuss planning, which is important for setting the foundation of the architecture that is implemented. We explain the hardware considerations for capacity and performance planning. For the z/VSE system and Linux on System z, we describe considerations for operation in a logical partition (LPAR) and in a virtualized environment with IBM z/VM®. In addition, we discuss the disk behavior for different workloads, storage dependencies, network connections, and DB2 database considerations. We also guide you in customizing the DB2 server for z/VSE, z/VM, and DB2 on Linux to allow existing z/VSE and z/VM applications to access the database on Linux on System z. We include the data migration, application considerations, dependencies, compatibility, monitoring, and tuning possibilities in such an environment.
The vast majority of all international judicial decisions have been issued since 1990. This increasing activity of international courts over the past two decades is one of the most significant developments within the international law. It has repercussions on all levels of governance and has challenged received understandings of the nature and legitimacy of international courts. It was previously held that international courts are simply instruments of dispute settlement, whose activities are justified by the consent of the states that created them, and in whose name they decide. However, this understanding ignores other important judicial functions, underrates problems of legitimacy, and prevents a full assessment of how international adjudication functions, and the impact that it has demonstrably had. This book proposes a public law theory of international adjudication, which argues that international courts are multifunctional actors who exercise public authority and therefore require democratic legitimacy. It establishes this theory on the basis of three main building blocks: multifunctionality, the notion of an international public authority, and democracy. The book aims to answer the core question of the legitimacy of international adjudication: in whose name do international courts decide? It lays out the specific problem of the legitimacy of international adjudication, and reconstructs the common critiques of international courts. It develops a concept of democracy for international courts that makes it possible to constructively show how their legitimacy is derived. It argues that ultimately international courts make their decisions, even if they do not know it, in the name of the peoples and the citizens of the international community.
One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.
The importance of modern computer networks is steadily growing as increasing amounts of data are exchanged over company intranets and the Internet. Understanding current networking technologies and communication protocols that are available for the IBM® mainframe and System z® operating systems is essential for setting up your network infrastructure with IBM z/VSE®. This IBM Redbooks® publication helps you install, tailor, and configure new networking options for z/VSE that are available with TCP/IP for VSE/ESA, IPv6/VSE, and Fast Path to Linux on System z (Linux Fast Path). We put a strong focus on network security and describe how the new OpenSSL-based SSL runtime component can be used to enhance the security of your business. This IBM Redbooks publication extends the information that is provided in Security on IBM z/VSE, SG24-7691.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.