ADD TO CART
No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful.
This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to the network, and letting users have access to this formidable resource space in a secure, controlled, and auditable fashion to make sure the System z server and Linux are useful to your business. As the quotation illustrates, the book is also about ensuring that, before you start designing a security solution, you understand what the solution has to achieve.
This book is intended for system engineers who want to customize a Linux on System z environment to meet strict security, audit, and control regulations.
The base for a secure system is tightly related to the way the architecture, and more specific virtualization, has been implemented on System z. Since its inception, 45 years ago, the architecture has been continuously developed to meet the increasing demands for a more secure and stable platform.
© 2021 Vervante Corporation. All rights reserved.