Advances in artificial intelligence for privacy protection and security [[electronic resource] /] / editors, Agusti Solanas, Antoni Martínez-Ballesté |
Pubbl/distr/stampa | Hackensack, N.J., : World Scientific, c2010 |
Descrizione fisica | 1 online resource (402 p.) |
Disciplina | 005.8/6 |
Altri autori (Persone) |
SolanasAgusti
Martínez-BallestéAntoni |
Collana | Intelligent information systems |
Soggetto topico |
Information technology - Security measures
Computer security Data protection Artificial intelligence |
Soggetto genere / forma | Electronic books. |
ISBN |
1-282-76021-1
9786612760211 981-279-033-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce
2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms 3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates 3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-O® Between Societal Benet̄ and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing 4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks 5.2.4.1. The backpropagation algorithm |
Record Nr. | UNINA-9910456155703321 |
Hackensack, N.J., : World Scientific, c2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in artificial intelligence for privacy protection and security [[electronic resource] /] / editors, Agusti Solanas, Antoni Martínez-Ballesté |
Pubbl/distr/stampa | Hackensack, N.J., : World Scientific, c2010 |
Descrizione fisica | 1 online resource (402 p.) |
Disciplina | 005.8/6 |
Altri autori (Persone) |
SolanasAgusti
Martínez-BallestéAntoni |
Collana | Intelligent information systems |
Soggetto topico |
Information technology - Security measures
Computer security Data protection Artificial intelligence |
ISBN | 9789812790330 (e-book) |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce
2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms 3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates 3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-O® Between Societal Benet̄ and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing 4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks 5.2.4.1. The backpropagation algorithm |
Record Nr. | UNINA-9910780726503321 |
Hackensack, N.J., : World Scientific, c2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in artificial intelligence for privacy protection and security / / editors, Agusti Solanas, Antoni Martinez-Balleste |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Hackensack, N.J., : World Scientific, c2010 |
Descrizione fisica | 1 online resource (402 p.) |
Disciplina | 005.8/6 |
Altri autori (Persone) |
SolanasAgusti
Martinez-BallesteAntoni |
Collana | Intelligent information systems |
Soggetto topico |
Information technology - Security measures
Computer security Data protection Artificial intelligence |
ISBN | 9789812790330 (e-book) |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce
2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms 3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates 3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-O® Between Societal Benet̄ and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing 4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks 5.2.4.1. The backpropagation algorithm |
Altri titoli varianti | Artificial intelligence for privacy protection and security |
Record Nr. | UNINA-9910824069403321 |
Hackensack, N.J., : World Scientific, c2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Application recovery tool for IMS and DB2 databases [[electronic resource] ] : a data recovery guide / / [Paolo Bruni ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | [San Jose, Calif.], : IBM International Technical Support Organization, 2002 |
Descrizione fisica | xviii, 166 p. : ill |
Disciplina | 005.8/6 |
Altri autori (Persone) | BruniPaolo |
Collana | IBM redbooks |
Soggetto topico |
Data recovery (Computer science)
IMS (DL/I) (Computer system) |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910454616203321 |
[San Jose, Calif.], : IBM International Technical Support Organization, 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Application recovery tool for IMS and DB2 databases [[electronic resource] ] : a data recovery guide / / [Paolo Bruni ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | [San Jose, Calif.], : IBM International Technical Support Organization, 2002 |
Descrizione fisica | xviii, 166 p. : ill |
Disciplina | 005.8/6 |
Altri autori (Persone) | BruniPaolo |
Collana | IBM redbooks |
Soggetto topico |
Data recovery (Computer science)
IMS (DL/I) (Computer system) |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910782026403321 |
[San Jose, Calif.], : IBM International Technical Support Organization, 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Application recovery tool for IMS and DB2 databases : a data recovery guide / / [Paolo Bruni ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | [San Jose, Calif.], : IBM International Technical Support Organization, 2002 |
Descrizione fisica | xviii, 166 p. : ill |
Disciplina | 005.8/6 |
Altri autori (Persone) | BruniPaolo |
Collana | IBM redbooks |
Soggetto topico |
Data recovery (Computer science)
IMS (DL/I) (Computer system) |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover -- Contents -- Figures -- Tables -- Examples -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 The recovery functions of DB2 and IMS -- Chapter 1. Overview of DB2 data recovery -- 1.1 Basics of DB2 data recovery -- 1.1.1 DB2 recovery components -- 1.1.2 Changing data -- 1.1.3 DB2 data recovery -- 1.2 Examples of DB2 data recovery functions -- 1.2.1 Default recovery using the latest full copy and log -- 1.2.2 TOCOPY recovery using the latest full copy -- 1.2.3 TOCOPY recovery using an incremental copy -- 1.2.4 TOLOGPOINT recovery using log RBA -- 1.2.5 MERGECOPY utility -- Chapter 2. Overview of IMS data recovery -- 2.1 Overview of IMS data recovery -- 2.1.1 The need for recovery -- 2.1.2 The database utilities -- 2.2 Examples of backup and recovery utilities -- 2.2.1 Database Image Copy utilities -- 2.2.2 Database Change Accumulation utility -- 2.2.3 Database Batch Backout utility -- 2.2.4 Database Recovery utility -- 2.2.5 Impact of recovery variables -- 2.3 Overview of Database Recovery Control: DBRC -- 2.3.1 DBRC usage -- Chapter 3. IMS Online Recovery Service -- 3.1 ORS overview -- 3.2 Installation considerations -- 3.2.1 Requirements -- 3.2.2 Operational conditions -- 3.2.3 Defining the ORS environment -- 3.3 Operating and administering ORS -- 3.3.1 Database administrator roles with ORS -- 3.3.2 Database availability -- 3.3.3 ORS and IMS shutdown -- 3.3.4 Performance -- 3.4 Sample operation procedures and outputs -- 3.4.1 Displaying database information -- 3.4.2 Stopping and deallocating the database -- 3.4.3 Building the recovery lists -- 3.4.4 ORS: displaying the databases status -- 3.4.5 Starting the recovery -- 3.4.6 Displaying database status during recovery -- 3.4.7 Completing the recovery -- Chapter 4. Recovering IMS and DB2 data.
4.1 Consistency of application data across IMS and DB2 -- 4.1.1 Overview -- 4.1.2 Two-phase commit protocol -- 4.2 Maintaining consistency after termination or failure -- 4.3 LOG protocol -- 4.3.1 Termination -- Part 2 IBM Application Recovery Tool for IMS and DB2 Databases -- Chapter 5. ART's overview -- 5.1 The IBM Data Management tools -- 5.1.1 Recovery and replication area -- 5.2 Application Recovery Tool for IMS and DB2 Databases -- 5.2.1 The recovery process -- 5.2.2 The use of a VIC point -- 5.3 The new release -- Chapter 6. ART's installation and customization -- 6.1 Installation and customization -- 6.1.1 Overall installation process -- 6.1.2 ISPF Primary Panel and Installation Main Panel -- 6.2 Prepare ART under DB2 Environment (DB2 bind) -- 6.2.1 DB2 binding -- 6.2.2 Verifying DB2 installation -- 6.3 Prepare ART under IMS Environment (ACB generation) -- 6.3.1 IMS ACB generation -- 6.3.2 Verifying the IMS installation -- 6.4 Delete and define ART RECON for IMS and DB2 -- 6.5 Adding DRMEXEC to a menu or CLIST -- 6.6 Replacing the current parmlib -- Chapter 7. Using ART for DB2 recovery -- 7.1 ART and DB2 utilities -- 7.1.1 Online verses batch invocation of ART DB2 utility control -- 7.1.2 DRMFIC: Full Image Copy -- 7.1.3 DRMIIC: Incremental Image Copy -- 7.1.4 DRMMERGE: Mergecopy utility -- 7.1.5 DRMDLET2: Modify Recovery -- 7.1.6 DRMMDISK: Manage disk space -- 7.2 Primary panel -- 7.2.1 DRMVIC: Virtual Image Copy -- 7.2.2 DRMMAP: Recovery map -- 7.2.3 DRMRECOV: Recovery utility -- 7.2.4 DRMDCHEK: Check data utility -- 7.2.5 DRMAOP: Auto operator -- 7.3 Scenarios using ART -- 7.3.1 Recovery to a VIC -- Chapter 8. Using ART for IMS recovery -- 8.1 ART and IMS utilities -- 8.1.1 DRMINIT: DBRC INIT -- 8.1.2 DRMIC: IMS Image Copy -- 8.1.3 DRMCA: IMS DBRC CA -- 8.1.4 DRMRROEG: Reorg IMS RECON data sets -- 8.1.5 DRMDLET1: IMS DBRC cleanup. 8.1.6 DRMMDISK: Disk management of database -- 8.2 IMS primary panel -- 8.2.1 DRMVIC: Virtual Image Copy -- 8.2.2 DRMMAP -- 8.2.3 DRMRECOV -- Chapter 9. Using ART for IMS and DB2 recovery -- 9.1 Introduction -- 9.1.1 Image copies in IMS and DB2 -- 9.1.2 Concurrent Image Copies in IMS and DB2 -- 9.2 DRMVIC -- 9.3 DRMRECOV -- 9.4 DRMRECOV examples -- 9.4.1 Invoking the DRMRECOV function -- 9.5 DRMRECOV and IMS/ORS -- 9.5.1 About the interface routine: AORS -- 9.5.2 Sample execution -- Part 3 Appendixes -- Appendix A. Sample JCL and output for DB2 Recovery -- A.1 DB2 COPY utility -- A.2 ART DRMMAP -- Appendix B. Sample JCL and output for IMS recovery -- B.1 Image Copies -- B.1.1 Standard Image Copy -- B.1.2 Concurrent Image Copy -- B.1.3 Image Copy Type 2 -- B.2 Change Accumulation -- B.3 Batch Back-out -- B.4 Database Recovery -- B.5 Recovering VSAM files for IMS database -- B.6 Dsect listing for I/C and C/A header record -- Appendix C. Additional material -- Locating the Web material -- Using the Web material -- System requirements for downloading the Web material -- How to use the Web material -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover. |
Record Nr. | UNINA-9910825052403321 |
[San Jose, Calif.], : IBM International Technical Support Organization, 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CICSVR usage guide [[electronic resource] /] / [Yolanda Cascajo Jimenez ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | San Jose, Calif., : IBM Corporation, International Technical Support Organization, c2002 |
Descrizione fisica | xviii, 114 p. : ill |
Disciplina | 005.8/6 |
Altri autori (Persone) | Cascajo JimenezYolanda |
Collana | Redbooks |
Soggetto topico |
Data recovery (Computer science)
Electronic data processing - Backup processing alternatives |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910454639903321 |
San Jose, Calif., : IBM Corporation, International Technical Support Organization, c2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CICSVR usage guide [[electronic resource] /] / [Yolanda Cascajo Jimenez ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | San Jose, Calif., : IBM Corporation, International Technical Support Organization, c2002 |
Descrizione fisica | xviii, 114 p. : ill |
Disciplina | 005.8/6 |
Altri autori (Persone) | Cascajo JimenezYolanda |
Collana | Redbooks |
Soggetto topico |
Data recovery (Computer science)
Electronic data processing - Backup processing alternatives |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910782043203321 |
San Jose, Calif., : IBM Corporation, International Technical Support Organization, c2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CICSVR usage guide / / [Yolanda Cascajo Jimenez ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | San Jose, Calif., : IBM Corporation, International Technical Support Organization, c2002 |
Descrizione fisica | xviii, 114 p. : ill |
Disciplina | 005.8/6 |
Altri autori (Persone) | Cascajo JimenezYolanda |
Collana | Redbooks |
Soggetto topico |
Data recovery (Computer science)
Electronic data processing - Backup processing alternatives |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover -- Contents -- Figures -- Tables -- Examples -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. Introduction -- 1.1 What is CICSVR? -- 1.1.1 Terminology used in this book -- 1.1.2 Programs used by CICSVR -- 1.1.3 DD names used by CICSVR -- 1.2 What can I do with CICSVR -- 1.2.1 CICSVR ISPF dialogs -- 1.2.2 VSAM forward recovery -- 1.2.3 CICSVR VSAM batch logging -- 1.2.4 Remote recovery site commands -- 1.2.5 Change accumulation processing -- Chapter 2. Setting up CICSVR -- 2.1 CICSVR system setup -- 2.1.1 LPA customization -- 2.1.2 System parameters -- 2.2 CICSVR address space -- 2.3 RCDS definition -- 2.4 JCL skeleton -- 2.5 CICSVR utilities -- 2.5.1 Log of logs registration -- 2.5.2 Log of logs scan -- 2.5.3 Log stream copy -- 2.5.4 RCDS export/import -- 2.5.5 Migration utility -- 2.6 ITSO sample environment -- Chapter 3. CICSVR VSAM batch logging -- 3.1 Batch logging description -- 3.1.1 Batch logging protects VSAM data sets -- 3.1.2 CICSVR batch logging benefits -- 3.1.3 Batch logging prerequisites -- 3.2 Batch logging and forward recovery implementation -- 3.2.1 ITSO batch logging environment -- 3.2.2 CICSVR server address space checking -- 3.2.3 MVS log stream definition -- 3.2.4 Batch logging enablement -- 3.2.5 VSAM data set backup -- 3.2.6 VSAM data set update -- 3.2.7 Batch logging checking -- 3.2.8 Forward recovery job creation -- 3.2.9 CICSVR forward recovery report -- 3.3 A specific recovery scenario -- Chapter 4. CICSVR in a CICS TS environment -- 4.1 Forward recovery environment -- 4.1.1 VSAM data set definitions -- 4.1.2 CICS TS 1.3 file definition -- 4.1.3 VSAM data set backup -- 4.2 Automated restore and recovery -- 4.2.1 Step 1: List registered VSAM data sets -- 4.2.2 Step 2: Select criteria to filter the VSAM data sets.
4.2.3 Step 3: Select the VSAM data sets to recover -- 4.2.4 Step 4: Select recovery option -- 4.2.5 Step 5: Specify forward recovery parameters -- 4.2.6 Step 6: Select the log stream type -- 4.2.7 Step 7: Specify other options -- 4.2.8 Step 8: Forward recovery job submission -- Chapter 5. Disaster recovery -- 5.1 What disaster recovery is -- 5.2 Disaster recovery strategy -- 5.2.1 Naming standard -- 5.2.2 Cataloging the data sets at the remote site -- 5.2.3 Frequency of the log stream copy -- 5.2.4 Frequency and time of the log of logs scan -- 5.2.5 Frequency and time of the RCDS export/backup -- 5.2.6 Selecting the backup method to use -- 5.2.7 What backup method to use to copy the RCDS -- 5.3 How to create the recovery job -- 5.3.1 Using the ISPF dialog interface -- 5.3.2 Using manual method -- 5.4 What you need to do before a disaster -- 5.4.1 What you need to do at the primary site -- 5.4.2 What you need to do at the remote site -- 5.5 What you need to do after a disaster -- 5.5.1 Restore the DFSMShsm CDSs -- 5.5.2 Restore the RCDS -- 5.5.3 Restore the VSAM data sets -- 5.5.4 Generate and run the recovery job -- 5.6 Overview of disaster recovery for CICS TS -- 5.7 Sample scenario for CICS TS -- 5.7.1 Disaster at primary site -- 5.7.2 Disaster recovery at the remote site -- Appendix A. Additional information on APARS -- A.1 APAR II13131 -- A.2 APAR OW53432 -- A.3 APAR OW53881 -- A.4 Dependency APARs -- A.5 New CICSVR APARs -- Appendix B. Problem diagnosis -- B.1 CICSVR server problems -- B.1.1 CICSVR server initialization failure -- B.1.2 CICSVR server start failure (message DWW180E) -- B.2 Problems backing up your VSAM data sets -- B.2.1 DFSMSdss COPY fails (message ADR927E) -- B.3 Batch logging problems -- B.3.1 After-images not logged in the log stream -- B.4 Hints and tips -- B.4.1 Displaying SMS options -- Appendix C. CICSVR for CICS V4. C.1 Journal definition -- C.2 Recovery parameters -- C.3 JCL skeleton for archiving -- C.4 Batch logging -- Glossary -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover. |
Record Nr. | UNINA-9910815992303321 |
San Jose, Calif., : IBM Corporation, International Technical Support Organization, c2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Content Manager backup/recovery and high availability [[electronic resource] ] : strategies, options, and procedures / / [Wei-Dong Jackie Zhu ... et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | [S.l.], : IBM, International Technical Support Organization, c2004 |
Descrizione fisica | xii, 262 p. : ill |
Disciplina | 005.8/6 |
Altri autori (Persone) | ZhuWei-Dong Jackie |
Collana | IBM redbooks |
Soggetto topico |
Electronic data processing - Backup processing alternatives
Data recovery (Computer science) |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910450121603321 |
[S.l.], : IBM, International Technical Support Organization, c2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|