LEADER 05483nam 2200661Ia 450 001 9910451453303321 005 20200520144314.0 010 $a1-281-00412-X 010 $a9786611004125 010 $a0-08-047557-4 035 $a(CKB)1000000000341465 035 $a(EBL)291716 035 $a(OCoLC)476050978 035 $a(SSID)ssj0000243166 035 $a(PQKBManifestationID)11210992 035 $a(PQKBTitleCode)TC0000243166 035 $a(PQKBWorkID)10320789 035 $a(PQKB)11565679 035 $a(MiAaPQ)EBC291716 035 $a(Au-PeEL)EBL291716 035 $a(CaPaEBR)ebr10172761 035 $a(CaONFJC)MIL100412 035 $a(EXLCZ)991000000000341465 100 $a20060922d2006 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aSecuring HP NonStop servers in an open systems world$b[electronic resource] $eTCP/IP, OSS & SQL /$fXYPRO Technology 210 $aBurlington, MA $cElsevier Digital Press$dc2006 215 $a1 online resource (1001 p.) 300 $aIncludes index. 311 $a1-55558-344-X 327 $aFront Cover; Securing HP Non-StopTM Servers in an Open Systems World; Copyright Page; Contents; Foreword; Preface; Distinguished Contributors; Introduction; A Wider Perspective; Some New Terms; About This Handbook; Applying the Security; Chapter 1. Compliance Concepts; Representative Regulations; Analysis of Requirements in Common; Conclusions; Chapter 2. Changes to Safeguard Since G06.21; Safeguard Changes Included in Release G06.21; Safeguard Changes Included in Release G06.22; Safeguard Changes Included in Release G06.23; Safeguard Changes Included in Release G06.24; Explicit Nodes Example 327 $aSafeguard Changes Included in Release G06.25 Safeguard Changes Included in Release G06.26; Safeguard Changes Included in Release G06.27; Safeguard Changes Included in Release G06.28; Safeguard Changes Included in Release G06.29; Safeguard Subsystem Component Updates; Chapter 3. Securing Pathway Applications; Pathway Development; Pathway Run-Time Components; Chapter 4. TCP/IP; TCP/IP Security; TCP/IP Architecture; HP Non-Stop Server Implementation of TCP/IP; TCP/IP Applications; Firewalls and Routers; VPN; SSH Subsystem; Chapter 5. File Sharing Programs; Network File System (NFS) Subsystem 327 $aSamba Chapter 6. Non-Stop SQL and Database Security; What is Database Security?; Compiling and Executing Non-Stop SQL Programs; Securing Client Queries from ODBC/MX and JDBC/MX; Securing Dynamic SQL Queries; Non-Stop SQL Interactions with other Utilities; Chapter 7. Open Database Connectivity (ODBC) SQL/MP; Security Configuration; Auditing in ODBC; Other ODBC Programs and Utilities; Chapter 8. System Management Tools; Tandem Service Management (TSM) Subsystem; Open System Management (OSM); Distributed Systems Management/Software Configuration Manager; Chapter 9. The Guardian Gazette A-Z 327 $aADDTOSCF ScriptADDTCPIP Script; ALTERIP Script; APPPRVD System Program; APPSRVR System Program; CIMON System Program; CONFIG System Configuration File; CTCPIP0 and CTCPIP1 Scripts; CEVSMX System Program; Distributed Systems Management/Software Configuration Manager (DSM/SCM); ENOFT User Program; EVNTPRVD System Program; EVTMGR Program; FDIST System Program; FSCK System Utility; IAPRVD System Program; IAREPO File; IMPORT System Program; INIT0 and INIT1 Scripts; INITRD File; Integrity Non-Stop Compilers; LISTNER System Utility; LOGTCPIP Log File; LOGSCF Log Fill 8e; LOGTCP0 and LOGTCP1 Log File 327 $aLOGTCPIP Log File MXANCHOR File Configuration File; MXAUDSRV System Program; MXCMP User Program; MXESP System Program; MXGNAMES System Program; MXOAS System Program; MXOCFG System Program; MXODSN Configuration File; MXOMSG File; MXOSRVR System Program; MXRTDSRV System Program; MXUDR System Program; MXUTP System Program; Network File System (NFS) Subsystem; NFS; NOS System Program; NOSCOM User Program; NOSUTIL System Program; NS System Program; OSMINI Configuration File; OSSFM System Program; Object Code Accelerator (OCA) User Program; OEVPRVD System Program; OSH User Program 327 $aOpen System Management (OSM) 330 $aRecent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the soaring costs of security breaches, it is economically essential for companies to become proactive in implementing effective system and data security measures. This volume is a comprehensive reference for understanding security risks, mitigations and best practices as they apply to the various components of these business-critical computing 606 $aClient/server computing$xSecurity measures 606 $aHewlett-Packard computers$xSecurity measures 606 $aComputer security 608 $aElectronic books. 615 0$aClient/server computing$xSecurity measures. 615 0$aHewlett-Packard computers$xSecurity measures. 615 0$aComputer security. 676 $a005.8 676 $a005.8 22 712 02$aXYPRO Technology Corporation. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451453303321 996 $aSecuring HP NonStop servers in an open systems world$92471929 997 $aUNINA LEADER 01294nam 2200385 450 001 9910822434703321 005 20230814224757.0 010 $a0-567-68527-6 010 $a0-567-68526-8 035 $a(CKB)4100000006997893 035 $a(MiAaPQ)EBC5633644 035 $a(Au-PeEL)EBL5633644 035 $a(OCoLC)1050163200 035 $a(EXLCZ)994100000006997893 100 $a20190201d2018 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe ladies and the cities $etransformation and apocalyptic identity in Joseph and Aseneth, 4 Ezra, the apocalypse and the shepherd of Hermas /$fEdith McEwan Humphrey 210 1$aLondon ;$aNew York :$cT&T Clark,$d2018. 215 $a1 online resource (192 pages) $cillustrations 225 1 $aJournal for the Study of the Pseudepigrapha. Supplement Series ;$v17 311 $a0-567-68680-9 410 0$aJournal for the study of the Pseudepigrapha.$pSupplement series ;$v17. 676 $a229.911 700 $aHumphrey$b Edith McEwan$01471925 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910822434703321 996 $aThe ladies and the cities$93915981 997 $aUNINA LEADER 02608oas 2201021 a 450 001 9910146488803321 005 20250830213015.0 011 $a1532-7876 035 $a(OCoLC)45007137 035 $a(CONSER) 2001214600 035 $a(CKB)954925561587 035 $a(EXLCZ)99954925561587 100 $a20000913a19899999 sy a 101 0 $aeng 135 $aurmnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMilitary psychology 210 $a[Mahwah, NJ] $cL. Erlbaum Associates 210 3 $aAbingdon, UK $cTaylor & Francis 215 $a1 online resource 300 $aRefereed/Peer-reviewed 311 08$a0899-5605 531 0 $aMil. psychol. 606 $aPsychology, Military$vPeriodicals 606 $aPsychology, Military 606 $aPsychologie militaire$vPe?riodiques 606 $aPsychologie militaire 606 $aMilitary Psychology$2ebps 606 $aMilitary History & Science$2ebps 606 $aArmed Forces$2fast$3(OCoLC)fst00814586 606 $aPsychology, Military$2fast$3(OCoLC)fst01081605 607 $aUnited States$xArmed Forces$vPeriodicals 607 $aE?tats-Unis$xForces arme?es$vPe?riodiques 607 $aUnited States$2fast$1https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq 608 $aPeriodicals.$2fast 608 $aPeriodicals.$2lcgft 615 0$aPsychology, Military 615 2$aPsychology, Military. 615 6$aPsychologie militaire 615 6$aPsychologie militaire. 615 7$aMilitary Psychology. 615 7$aMilitary History & Science. 615 7$aArmed Forces. 615 7$aPsychology, Military. 676 $a355 801 0$bF#A 801 1$bF#A 801 2$bNSD 801 2$bOCL 801 2$bOCLCQ 801 2$bUKMGB 801 2$bOCLCQ 801 2$bOCLCF 801 2$bOCLCO 801 2$bOCLCQ 801 2$bWT2 801 2$bBUF 801 2$bOCLCO 801 2$bU3W 801 2$bOCLCO 801 2$bOCLCQ 801 2$bTOF 801 2$bOCLCO 801 2$bAU@ 801 2$bOCLCO 801 2$bWYU 801 2$bOCLCO 801 2$bOCLCA 801 2$bVT2 801 2$bOCLCO 801 2$bNJT 801 2$bDLC 801 2$bOCLCQ 801 2$bOCLCO 801 2$bSRU 801 2$bUBY 801 2$bOCLCQ 801 2$bOCLCL 801 2$bCSU 801 2$bUWO 801 2$bCASUM 801 2$bOCLCQ 906 $aJOURNAL 912 $a9910146488803321 996 $aMilitary psychology$92277899 997 $aUNINA