IMS V6 Security Guide

TOP : DB2 Information Management

IMS V6 Security Guide

The Information Management System (IMS) is a program product that is a key asset in many customer installations. IMS (also referred to as IMS/VS, and IMS/ESA) may be used as a Transaction Manager, a Database Manager, or both. This book describes all of the IMS resources that may be protected, and the security facilities used to protect them.

IMS resources (such as transactions, data, and application programs) are valuable assets that often require protection from accidental or intentional access by unauthorized users. IMS itself has provided security facilities , such as the security maintenance utility (SMU) and security exits, to protect IMS resources for many years. IMS also supports securing IMS resources through the use of security products, such as the resource access control facility (RACF).

Today's open computer systems allow IMS applications and data to be accessed from new sources such as the world wide web. As companies permit their applications and data to be opened up to their customers, securing IMS resources has become even more critical. Therefore, it is important for an installation's security personnel to have a good understanding of how to restrict access to IMS resources from traditional sources as well as from other sources such as TCP/IP networks, the World Wide Web, and distributed client/server systems using advanced program-to-program communications (APPC).

.

The purpose of this book is to provide an installation's security personnel with the capability to secure IMS resources.
Price: $47.00 $37.00
Pages: 288
Date Published: July 19, 1999
ISBN: 0738413615
Author: IBM Redbooks
Product Number: SG24-5363-00
Ships in 3-5 days
Return to category
Why Vervante?

© 2024 Vervante Corporation. All rights reserved.