LEADER 05483nam 2200661Ia 450 001 9910451453303321 005 20200520144314.0 010 $a1-281-00412-X 010 $a9786611004125 010 $a0-08-047557-4 035 $a(CKB)1000000000341465 035 $a(EBL)291716 035 $a(OCoLC)476050978 035 $a(SSID)ssj0000243166 035 $a(PQKBManifestationID)11210992 035 $a(PQKBTitleCode)TC0000243166 035 $a(PQKBWorkID)10320789 035 $a(PQKB)11565679 035 $a(MiAaPQ)EBC291716 035 $a(Au-PeEL)EBL291716 035 $a(CaPaEBR)ebr10172761 035 $a(CaONFJC)MIL100412 035 $a(EXLCZ)991000000000341465 100 $a20060922d2006 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aSecuring HP NonStop servers in an open systems world$b[electronic resource] $eTCP/IP, OSS & SQL /$fXYPRO Technology 210 $aBurlington, MA $cElsevier Digital Press$dc2006 215 $a1 online resource (1001 p.) 300 $aIncludes index. 311 $a1-55558-344-X 327 $aFront Cover; Securing HP Non-StopTM Servers in an Open Systems World; Copyright Page; Contents; Foreword; Preface; Distinguished Contributors; Introduction; A Wider Perspective; Some New Terms; About This Handbook; Applying the Security; Chapter 1. Compliance Concepts; Representative Regulations; Analysis of Requirements in Common; Conclusions; Chapter 2. Changes to Safeguard Since G06.21; Safeguard Changes Included in Release G06.21; Safeguard Changes Included in Release G06.22; Safeguard Changes Included in Release G06.23; Safeguard Changes Included in Release G06.24; Explicit Nodes Example 327 $aSafeguard Changes Included in Release G06.25 Safeguard Changes Included in Release G06.26; Safeguard Changes Included in Release G06.27; Safeguard Changes Included in Release G06.28; Safeguard Changes Included in Release G06.29; Safeguard Subsystem Component Updates; Chapter 3. Securing Pathway Applications; Pathway Development; Pathway Run-Time Components; Chapter 4. TCP/IP; TCP/IP Security; TCP/IP Architecture; HP Non-Stop Server Implementation of TCP/IP; TCP/IP Applications; Firewalls and Routers; VPN; SSH Subsystem; Chapter 5. File Sharing Programs; Network File System (NFS) Subsystem 327 $aSamba Chapter 6. Non-Stop SQL and Database Security; What is Database Security?; Compiling and Executing Non-Stop SQL Programs; Securing Client Queries from ODBC/MX and JDBC/MX; Securing Dynamic SQL Queries; Non-Stop SQL Interactions with other Utilities; Chapter 7. Open Database Connectivity (ODBC) SQL/MP; Security Configuration; Auditing in ODBC; Other ODBC Programs and Utilities; Chapter 8. System Management Tools; Tandem Service Management (TSM) Subsystem; Open System Management (OSM); Distributed Systems Management/Software Configuration Manager; Chapter 9. The Guardian Gazette A-Z 327 $aADDTOSCF ScriptADDTCPIP Script; ALTERIP Script; APPPRVD System Program; APPSRVR System Program; CIMON System Program; CONFIG System Configuration File; CTCPIP0 and CTCPIP1 Scripts; CEVSMX System Program; Distributed Systems Management/Software Configuration Manager (DSM/SCM); ENOFT User Program; EVNTPRVD System Program; EVTMGR Program; FDIST System Program; FSCK System Utility; IAPRVD System Program; IAREPO File; IMPORT System Program; INIT0 and INIT1 Scripts; INITRD File; Integrity Non-Stop Compilers; LISTNER System Utility; LOGTCPIP Log File; LOGSCF Log Fill 8e; LOGTCP0 and LOGTCP1 Log File 327 $aLOGTCPIP Log File MXANCHOR File Configuration File; MXAUDSRV System Program; MXCMP User Program; MXESP System Program; MXGNAMES System Program; MXOAS System Program; MXOCFG System Program; MXODSN Configuration File; MXOMSG File; MXOSRVR System Program; MXRTDSRV System Program; MXUDR System Program; MXUTP System Program; Network File System (NFS) Subsystem; NFS; NOS System Program; NOSCOM User Program; NOSUTIL System Program; NS System Program; OSMINI Configuration File; OSSFM System Program; Object Code Accelerator (OCA) User Program; OEVPRVD System Program; OSH User Program 327 $aOpen System Management (OSM) 330 $aRecent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the soaring costs of security breaches, it is economically essential for companies to become proactive in implementing effective system and data security measures. This volume is a comprehensive reference for understanding security risks, mitigations and best practices as they apply to the various components of these business-critical computing 606 $aClient/server computing$xSecurity measures 606 $aHewlett-Packard computers$xSecurity measures 606 $aComputer security 608 $aElectronic books. 615 0$aClient/server computing$xSecurity measures. 615 0$aHewlett-Packard computers$xSecurity measures. 615 0$aComputer security. 676 $a005.8 676 $a005.8 22 712 02$aXYPRO Technology Corporation. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451453303321 996 $aSecuring HP NonStop servers in an open systems world$92471929 997 $aUNINA