O'Reilly logo

Security on the IBM Mainframe: Volume 1 A Holistic Approach to Reduce Risk and Improve Security by Jan Thielmann, Botrous Thalouth, Vinodkumar Ramalingam, Madhukar Reddy Nali, Brian Hugenbruch, Cesar Goldkorn, Lennie Dymoke-Bradshaw, Boudhayan Chakrabarty, Axel Buecker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Linux on System z security
This chapter provides a collection of preferred practices for securing System z when you are running a Linux environment. This chapter highlights its unique features and also illustrates how taking advantage of such features can simplify system management.
The preferred practices to manage IT security are documented by several sources. These practices can be used to secure Linux on System z. However, several unique technologies that this platform uses should be considered when you define the security policies. These technologies ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required