did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780131738560

Mainframe Basics for Security Professionals : Getting Started with RACF

by ; ; ;
  • ISBN13:

    9780131738560

  • ISBN10:

    0131738569

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2007-12-28
  • Publisher: IBM Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $54.99 Save up to $12.93
  • Digital
    $42.06
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

The security professionals introduction to and ongoing reference for mainframe security.

Author Biography

Ori Pomerantz has been securing computer networks-and teaching other people to do so-since 1995. Since joining IBM in 2003, he has written classes on several Tivoli security products, including IBM Tivoli zSecure Barbara Vander Weele, a software engineer at IBM, has developed and presented education material on provisioning, security, storage, and business technologies for IBM Worldwide Education Mark Nelson, Senior Software Engineer at IBM, is a twenty-year veteran of the RACF design team and a frequent speaker on RACF and z/OS security-related topics Tim Hahn, IBM Distinguished Engineer, has been with IBM for seventeen years. He is Chief Architect for Secure Systems and Networks within the IBM Software Group Tivoli organization

Table of Contents

Forewordp. xv
Prefacep. xvii
Acknowledgmentsp. xix
About the Authorsp. xxi
Introduction to the Mainframep. 1
Why Use a Mainframe?p. 1
A Little Historyp. 1
Why Are Mainframes Different?p. 2
Mainframe vs. Client/Serverp. 3
Getting Startedp. 4
What You Will Needp. 4
Logging in to the Mainframep. 5
"Hello, World" from TSOp. 6
Job Control Language (JCL)p. 7
Introduction to JCLp. 8
Data Setsp. 9
Using ISPF to Create and Run Batch Jobsp. 10
JCL Syntaxp. 15
Viewing the Job Outputp. 16
z/OS UNIX System Servicesp. 19
Getting Helpp. 22
Context-Sensitive Helpp. 22
The Manualsp. 24
Additional Informationp. 25
Users and Groupsp. 27
Creating a Userp. 27
How to Modify a User for OMVS Accessp. 31
Modifying the Userp. 31
Creating the OMVS Home Directory (and Modifying Users from TSO)p. 34
Verifying MYUSER Has OMVS Accessp. 36
Groupsp. 36
Searching Groupsp. 36
Displaying a Groupp. 38
Connecting Users to a Groupp. 39
zSecurep. 42
Additional Informationp. 43
Protecting Data Sets and Other Resourcesp. 45
Protecting Data Setsp. 45
Default Permissionsp. 45
Access Control List Permissionsp. 49
Project Groups and Generic Profilesp. 53
Other Resourcesp. 57
Gathering Informationp. 57
Activating UNIXPRIVp. 59
Delegating chown Privilegesp. 61
Verifying the Changep. 63
Deleting Resource Profilesp. 63
Security Data (Levels, Categories, and Labels)p. 64
Defining the Policyp. 64
Assigning Security Levels and Categoriesp. 65
Security Labels (SECLABELs)p. 66
Securing UNIX System Services (USS) Filesp. 68
zSecurep. 70
Additional Informationp. 71
Loggingp. 73
Configuring Loggingp. 73
SMF Configurationp. 74
RACF Configurationp. 80
Generating Reportsp. 82
Unloading Log Data to Sequential Text Filesp. 82
Understanding Sequential Reportsp. 85
Generating Reports with ICETOOLp. 87
Other Types of Reportsp. 91
UNIX System Services (USS) Loggingp. 91
Classes for USS Loggingp. 92
SMF Settings for USSp. 93
Specifying Logging in USSp. 93
Viewing the USS Log Recordsp. 95
Logging in zSecurep. 95
Additional Informationp. 97
Auditingp. 99
Auditingp. 99
The RACF Data Security Monitor (DSMON)p. 100
Running DSMONp. 101
The System Reportp. 102
The Program Properties Table Reportp. 103
The RACF Authorized Caller Table (ICHAUTAB) Reportp. 104
The RACF Exits Reportp. 104
The Selected User Attribute Reportp. 105
The Selected Data Sets Reportp. 106
The Set RACF Options (SETROPTS) Commandp. 108
The RACF Database Unload Utility (IRRDBU00)p. 110
Removing IDs with IRRRID00p. 111
The RACF Health Checksp. 114
RACF_SENSITIVE_RESOURCESp. 114
RACF_IBMUSER_REVOKEDp. 117
RACF Classes Active Health Checksp. 117
zSecure Auditingp. 118
Additional Informationp. 120
Limited-Authority RACF Administratorsp. 121
Profiles Owned by Usersp. 121
Group-Owned Profiles and Group Authoritiesp. 122
The group-AUDITOR Authorityp. 124
The group-SPECIAL Authorityp. 127
The group-OPERATIONS Authorityp. 128
System-Level Authoritiesp. 128
Manipulating Usersp. 129
Creating Usersp. 129
Manipulating Usersp. 131
Additional Informationp. 133
Mainframes in the Enterprise-Wide Security Infrastructurep. 135
What Is an Enterprise?p. 136
Enterprise Componentsp. 137
Security across Enterprise Componentsp. 139
Communication Protocolsp. 141
Enterprise Security Administrationp. 144
Authentication and Authorizationp. 145
Credential Propagation and Transformationp. 145
Communicating between Enterprises-and Beyondp. 148
Additional Informationp. 149
Indexp. 151
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program