Access Control List Permissions 3. Project Groups and Generic Profiles 3. Other Resources 3. Gathering Information 3. Delegating chown Privileges 3.
Verifying the Change 3. Deleting Resource Profiles 3. Security Data Levels, Categories, and Labels 3. Defining the Policy 3. Security Levels 3. Categories 3. Assigning Security Levels and Categories 3. Additional Information 4.
Getting Started with FortiGate PDF Download Free |
Logging 4. Configuring Logging 4. SMF Configuration 4.
RACF Configuration 4. Generating Reports 4. Understanding Sequential Reports 4. Other Types of Reports 4. Classes for USS Logging 4. Specifying Logging in USS 4. Logging in zSecure 4.
Additional Information 5. Auditing 5. The System Report 5. The Program Properties Table Report 5. The Selected User Attribute Report 5. The Selected Data Sets Report 5.
Additional Information 6. Shop Books. Add to Wishlist. USD Sign in to Purchase Instantly.
Explore Now. Buy As Gift. Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why.
About the Author Ori Pomerantz has been securing computer networks--and teaching other people to do so--since Show More.
Why is z/OS So Difficult to Audit?
Average Review. Write a Review. Related Searches. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared High availability and troubleshooting techniques are also explained in the last two chapters of the book. This concise, example-oriented book explores all the concepts you need to administer a FortiGate unit.
A Fresh and Modern Look at All Things Mainframe
Next, you will get acquainted with important topics like high availability and Vdoms. Finally, you will end the book with an overview of troubleshooting tools and techniques. What you will learn from this book Configure static and dynamic routing in a FortiGate unit Filter spam, viruses, and illegitimate Internet activities using the UTM features of FortiGate Enforce compliance and block threats using IPS and endpoint controls Design tunnels with SSL and IPSEC to extend your network in a secure manner Use high availability solutions including link aggregation, clustering, and virtual domains Identify the main features and uses of the Forticlient software Troubleshoot issues related to the aforementioned features Approach This book is a step-by-step tutorial that will teach you everything you need to know about the deployment and management of FortiGate, including high availability, complex routing, various kinds of VPN working, user authentication, security rules and controls on applications, and mail and Internet access.
If you want to experiment with radio frequency identification RFID , this book is the perfect place to start. All you need is some experience with Arduino and Processing, the ability to connect basic circuits on a breadboard with jumper wire-and you're good to go. You'll be guided through three hands-on projects that let you experience RFID in action. After you build each of the book's projects in succession, you'll have the knowledge to pursue RFID applications of your own.