Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)

Buy

This IBM Redbook considers an enterprise and describes some of the procedures and documentation that need to be developed to secure WebSphere MQ on the z/OS (zSeries), OS/400 (iSeries), IBM AIX (pSeries) and Windows 2000 (xSeries) platforms. This Redbook also documents the before and after configurations needed to take advantage of the recent functional improvements to WebSphere MQ, such as the Secure Sockets Layer (SSL).

Security is a complex subject. The first part of this Redbook is intended to help the reader understand it. The second part lays out a business case scenario where the technology is implemented to secure WebSphere MQ.

The book incorporates:

  • Cross-platform security, ascertaining the responsibility of identification and authentication.
  • Security issues when using WebSphere MQ over the Internet.
  • Securing of messages, taking advantage of the functional improvements to WebSphere MQ such as PKI and SSL.
  • Maintenance of message integrity by means of authentication and encryption.
  • Use of technologies external to WebSphere MQ, such as PKI, DCE, and RACF to solve the security concerns.

The appendixes provide additional information, scripts, sample code and JCL related to the chapters in the book.

(HTML tags aren't allowed.)

Microsoft PowerPivot for Excel 2010: Give Your Data Meaning
Microsoft PowerPivot for Excel 2010: Give Your Data Meaning

On November 4, 2009, Alberto and I had dinner with many other Analysis Services experts from all around the world, including many people from the Microsoft development team. We were in Seattle for the PASS Summit 2009, a conference for SQL Server professionals, and because Redmond, Washington is very near to Seattle, events like this often...

Machine Learning Projects for Mobile Applications: Build Android and iOS applications using TensorFlow Lite and Core ML
Machine Learning Projects for Mobile Applications: Build Android and iOS applications using TensorFlow Lite and Core ML

Bring magic to your mobile apps using TensorFlow Lite and Core ML

Key Features

  • Explore machine learning using classification, analytics, and detection tasks.
  • Work with image, text and video datasets to delve into real-world tasks
  • Build apps for Android and...
Hypernumbers and Extrafunctions: Extending the Classical Calculus (SpringerBriefs in Mathematics)
Hypernumbers and Extrafunctions: Extending the Classical Calculus (SpringerBriefs in Mathematics)

“Hypernumbers and Extrafunctions” presents a rigorous mathematical approach to operate with infinite values. First, concepts of real and complex numbers are expanded to include a new universe of numbers called hypernumbers which includes infinite quantities. This brief extends classical calculus based on real functions by...


The Traveling Salesman: Computational Solutions for TSP Applications (Lecture Notes in Computer Science)
The Traveling Salesman: Computational Solutions for TSP Applications (Lecture Notes in Computer Science)

More than fifteen years ago, I was faced with the following problem in an assignment for a class in computer science. A brewery had to deliver beer to five stores, and the task was to write a computer program for determining the shortest route for the truck driver to visit all stores and return to the brewery. All my attemps to find a...

Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

Linux Device Drivers, 2nd Edition
Linux Device Drivers, 2nd Edition

This practical guide is for anyone who wants to support computer peripherals under the Linux operating system. It shows step-by-step how to write a driver for character devices, block devices, and network interfaces, illustrating with examples you can compile and run. The second edition covers Kernel 2.4 and adds discussions of symmetric...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy