Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux on IBM eserver zSeries and S/390: Best Security Practices

Buy
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.

We examine the unique security and integrity features zSeries offers for consolidating a large number Linux servers under z/VM. We discuss virtual machine isolation and command privileges assigned to VM guests. Security configuration options for z/VM Version 4.4 are explained.

In this book, we also discuss Linux security topics. We examine options for hardening a Linux installation. Securing Linux network traffic using Secure Sockets Layer and Secure Shell is considered. We look at implementing a virtual private network using FreeS/WAN. Commercial firewall technology and implementation using the StoneGate firewall for zSeries is discussed. We examine using IBM Tivoli® Access Manager in conjunction with an LDAP server running on z/OS® to authenticate Linux users against a RACF® running on z/OS.

About The Author
Gregory Geiselhart is a Project Leader for Linux on zSeries at the International Technical Support Organization, Poughkeepsie Center.

Ami Ehlenberger is a Staff Software Engineer and has been with IBM for the past four years. Ami was hired into the OS/390® development team in 1999 and has since worked in the areas of integration test, solution design, and services. She has a B.S. in Computer Science from Indiana University of Pennsylvania and an MBA in e-business from the University of Phoenix. Her expertise resides in LDAP, IBM WebSphere®, and IBM Tivoli Access Manager. Ami currently works for the Custom Technology Center, an IBM Eserver services organization.

Darius Fariborz has been a Network Architect in IBM Global Services since 1995. He joined IBM U.K. Laboratories in 1985 and holds an MSc in Telecommunications and Micro-Electronics from the University of Surrey. Prior to joining IBM, Darius worked for International Aeroradio Limited as a software engineer from 1982 to 1984 and as hardware design engineer for Thorn EMI Datatech from 1979 to 1982. His main interests are in network connectivity and security.
(HTML tags aren't allowed.)

Embodied Minds in Action
Embodied Minds in Action
In Embodied Minds in Action, Robert Hanna and Michelle Maiese work out a unified treatment of three fundamental philosophical problems: the mind-body problem, the problem of mental causation, and the problem of action. This unified treatment rests on two basic claims. The first is that conscious, intentional minds like ours are essentially...
Conspiracy in Camelot: The Complete History of the Assassination of John Fitzgerald Kennedy
Conspiracy in Camelot: The Complete History of the Assassination of John Fitzgerald Kennedy
Those not already deeply immersed in recondite Kennedy assassination lore will find this offering by Kroth-an associate professor of counseling psychology at Santa Clara University, and a contributor to CounterPunch, a biweekly "muckraking newsletter"-well over the top. Advertised as an "objective" look at the myriad conspiracy...
Practical LSD Manufacture 3rd edition
Practical LSD Manufacture 3rd edition

This book covers in great detail virtually all known methods for making LSD. Emphasis is placed on using botanical sources of lysergic acid such as ergot and morning glory seeds, but extraction of ergotamine migraine pills is also covered. Every recipe is presented along with references back to the original works in the scientific liturature....


Service-Oriented Computing: Agents, Semantics, and Engineering: AAMAS 2007 International Workshop, SOCASE 2007, Honolulu, HI, USA, May 14, 2007, Proceedings
Service-Oriented Computing: Agents, Semantics, and Engineering: AAMAS 2007 International Workshop, SOCASE 2007, Honolulu, HI, USA, May 14, 2007, Proceedings
This book constitutes the refereed proceedings of the International Workshop on Service-Oriented Computing: Agents, Semantics, and Engineering, SOCASE 2007, held in Honolulu, HI, USA as an associated event of AAMAS 2007, the main international conference on autonomous agents and multi-agent systems. The volume is rounded off with selected four best...
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

Professional Visual Basic 2010 and .NET 4 (Wrox Programmer to Programmer)
Professional Visual Basic 2010 and .NET 4 (Wrox Programmer to Programmer)

Intermediate and advanced coverage of Visual Basic 2010 and .NET 4 for professional developers

If you've already covered the basics and want to dive deep into VB and .NET topics that professional programmers use most, this is your book. You'll find a quick review of introductory topics-always helpful-before the...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy