Implementing Ssh

Implementing Ssh Book in PDF, ePub and Kindle version is available to download in english. Read online anytime anywhere directly from your device. Click on the download button below to get a free pdf file of Implementing Ssh book. This book definitely worth reading, it is an incredibly well-written.

Implementing SSH

Author : Himanshu Dwivedi
Publisher : John Wiley & Sons
Page : 404 pages
File Size : 50,6 Mb
Release : 2003-11-04
Category : Computers
ISBN : 9780764557255

Get Book

Implementing SSH by Himanshu Dwivedi Pdf

A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your network Prevent unwanted hacker attacks! This detailed guide will show you how to strengthen your company system's defenses, keep critical data secure, and add to the functionality of your network by deploying SSH. Security expert Himanshu Dwivedi shows you ways to implement SSH on virtually all operating systems, desktops, and servers, so your system is safe, secure, and stable. Learn how SSH fulfills all the core items in security, including authentication, authorization, encryption, integrity, and auditing. Also, discover methods to optimize the protocol for security and functionality on Unix, Windows, and network architecture environments. Additionally, find out about the similarities and differences of the major SSH servers and clients. With the help of numerous architectural examples and case studies, you'll gain the necessary skills to: * Explore many remote access solutions, including the theory, setup, and configuration of port forwarding * Take advantage of features such as secure e-mail, proxy, and dynamic port forwarding * Use SSH on network devices that are traditionally managed by Telnet * Utilize SSH as a VPN solution in both a server and client aspect * Replace insecure protocols such as Rsh, Rlogin, and FTP * Use SSH to secure Web browsing and as a secure wireless (802.11) solution

Implementing the IBM System Storage SAN Volume Controller with IBM Spectrum Virtualize Version 8.4

Author : Corne Lottering,Denis Olshanskiy,Jackson Shea,Jordan Fincher,Hartmut Lonzer,Ibrahim Alade Rufai,Katja Kratt,Konrad Trojok,Leandro Torolho,Pawel Brodacki,Rodrigo Jungi Suzuki,Sergey Kubin,Sidney Varoni Junior,Tiago Bastos,Vasfi Gucer,IBM Redbooks
Publisher : IBM Redbooks
Page : 946 pages
File Size : 44,5 Mb
Release : 2021-08-06
Category : Computers
ISBN : 9780738459370

Get Book

Implementing the IBM System Storage SAN Volume Controller with IBM Spectrum Virtualize Version 8.4 by Corne Lottering,Denis Olshanskiy,Jackson Shea,Jordan Fincher,Hartmut Lonzer,Ibrahim Alade Rufai,Katja Kratt,Konrad Trojok,Leandro Torolho,Pawel Brodacki,Rodrigo Jungi Suzuki,Sergey Kubin,Sidney Varoni Junior,Tiago Bastos,Vasfi Gucer,IBM Redbooks Pdf

Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM FlashSystem® solution that is powered by IBM Spectrum® Virtualize V8.4. This innovative storage offering delivers essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a compact, modular design that is offered at a competitive, midrange price. The solution incorporates some of the top IBM technologies that are typically found only in enterprise-class storage systems, which raises the standard for storage efficiency in midrange disk systems. This cutting-edge storage system extends the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion. This IBM Redbooks® publication introduces the features and functions of an IBM Spectrum Virtualize V8.4 system through several examples. This book is aimed at pre-sales and post-sales technical support and marketing and storage administrators. It helps you understand the architecture, how to implement it, and how to take advantage of its industry-leading functions and features.

Implementing the IBM FlashSystem 5010 and FlashSystem 5030 with IBM Spectrum Virtualize V8.3.1

Author : Jack Armstrong,Tiago Bastos,Pawel Brodacki,Markus Döllinger,Jon Herd,Sergey Kubin,Carsten Larsen,Hartmut Lonzer,Jon Tate,IBM Redbooks
Publisher : IBM Redbooks
Page : 882 pages
File Size : 42,9 Mb
Release : 2020-10-28
Category : Computers
ISBN : 9780738459080

Get Book

Implementing the IBM FlashSystem 5010 and FlashSystem 5030 with IBM Spectrum Virtualize V8.3.1 by Jack Armstrong,Tiago Bastos,Pawel Brodacki,Markus Döllinger,Jon Herd,Sergey Kubin,Carsten Larsen,Hartmut Lonzer,Jon Tate,IBM Redbooks Pdf

Organizations of all sizes face the challenge of managing massive volumes of increasingly valuable data. But storing this data can be costly, and extracting value from the data is becoming more difficult. IT organizations have limited resources, but must stay responsive to dynamic environments and act quickly to consolidate, simplify, and optimize their IT infrastructures. IBM® FlashSystem 5010 and FlashSystem 5030 systems provide a smarter solution that is affordable, easy to use, and self-optimizing, which enables organizations to overcome these storage challenges. The IBM FlashSystem® 5010 and FlashSystem 5030 deliver efficient, entry-level configurations that are designed to meet the needs of small and midsize businesses. Designed to provide organizations with the ability to consolidate and share data at an affordable price, the system offers advanced software capabilities that are found in more expensive systems. This IBM Redbooks® publication is intended for pre-sales and post-sales technical support professionals and storage administrators. It applies to the IBM FlashSystem 5010 and FlashSystem 5030 and IBM Spectrum® Virtualize V8.3.1. This edition applies to IBM Spectrum Virtualize V8.3.1 and the associated hardware and software detailed within. Screen captures that are included within this book might differ from the generally available (GA) version because parts of this book were written with pre-GA code. On February 11, 2020, IBM announced that it was simplifying its portfolio. This book was written by using previous models of the product line before the simplification; however, most of the general principles apply. If you are in any doubt as to their applicability, work with your local IBM representative.

Exam Ref 70-533 Implementing Microsoft Azure Infrastructure Solutions

Author : Michael Washam,Rick Rainey,Dan Patrick,Steve Ross
Publisher : Microsoft Press
Page : 844 pages
File Size : 46,5 Mb
Release : 2018-01-23
Category : Computers
ISBN : 9781509304660

Get Book

Exam Ref 70-533 Implementing Microsoft Azure Infrastructure Solutions by Michael Washam,Rick Rainey,Dan Patrick,Steve Ross Pdf

Prepare for the newest versions of Microsoft Exam 70-533–and help demonstrate your real-world mastery of implementing Microsoft Azure Infrastructure as a Service (IaaS). Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Design and implement Azure App Service Apps Create and manage compute resources, and implement containers Design and implement a storage strategy, including storage encryption Implement virtual networks, including new techniques for hybrid connections Design and deploy ARM Templates Manage Azure security and Recovery Services Manage Azure operations, including automation and data analysis Manage identities with Azure AD Connect Health, Azure AD Domain Services, and Azure AD single sign on This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you are an IT professional with experience implementing and monitoring cloud and hybrid solutions and/or supporting application lifecycle management This book covers the 533 objectives as of December 2017. If there are updates for this book, you will find them at https://aka.ms/examref5332E/errata. About the Exam Exam 70-533 focuses on skills and knowledge for provisioning and managing services in Microsoft Azure, including: implementing infrastructure components such as virtual networks, virtual machines, containers, web and mobile apps, and storage; planning and managing Azure AD, and configuring Azure AD integration with on-premises Active Directory domains. About Microsoft Certification Passing this exam helps qualify you for MCSA: Cloud Platform Microsoft Certified Solutions Associate certification, demonstrating your expertise in applying Microsoft cloud technologies to reduce costs and deliver value. To earn this certification, you must also pass any one of the following exams: 70-532 Developing Microsoft Azure Solutions, or 70-534 Architecting Microsoft Azure Solutions, or 70-535, Architecting Microsoft Azure Solutions, or 70-537: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack.

Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide

Author : Catherine Paquet
Publisher : Cisco Press
Page : 921 pages
File Size : 47,8 Mb
Release : 2012-11-29
Category : Computers
ISBN : 9780132983310

Get Book

Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide by Catherine Paquet Pdf

Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide Second Edition Foundation learning for the CCNA Security IINS 640-554 exam Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide, Second Edition, is a Cisco-authorized, self-paced learning tool for CCNA® Security 640-554 foundation learning. This book provides you with the knowledge needed to secure Cisco® networks. By reading this book, you will gain a thorough understanding of how to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. This book focuses on using Cisco IOS routers to protect the network by capitalizing on their advanced features as a perimeter router, firewall, intrusion prevention system, and site-to-site VPN device. The book also covers the use of Cisco Catalyst switches for basic network security, the Cisco Secure Access Control System (ACS), and the Cisco Adaptive Security Appliance (ASA). You learn how to perform basic tasks to secure a small branch office network using Cisco IOS security features available through web-based GUIs (Cisco Configuration Professional) and the CLI on Cisco routers, switches, and ASAs. Whether you are preparing for CCNA Security certification or simply want to gain a better understanding of Cisco IOS security fundamentals, you will benefit from the information provided in this book. Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide, Second Edition, is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. -- Develop a comprehensive network security policy to counter threats against information security -- Secure borderless networks -- Learn how to use Cisco IOS Network Foundation Protection (NFP) and Cisco Configuration Professional (CCP) -- Securely implement the management and reporting features of Cisco IOS devices -- Deploy Cisco Catalyst Switch security features -- Understand IPv6 security features -- Plan threat control strategies -- Filter traffic with access control lists -- Configure ASA and Cisco IOS zone-based firewalls -- Implement intrusion prevention systems (IPS) and network address translation (NAT) -- Secure connectivity with site-to-site IPsec VPNs and remote access VPNs This volume is in the Foundation Learning Guide Series offered by Cisco Press®. These guides are developed together with Cisco as the only authorized, self-paced learning tools that help networking professionals build their understanding of networking concepts and prepare for Cisco certification exams. Category: Cisco Certification Covers: CCNA Security IINS exam 640-554

Implementing Cisco IOS Network Security (IINS)

Author : Catherine Paquet
Publisher : Cisco Press
Page : 625 pages
File Size : 53,7 Mb
Release : 2009-04-14
Category : Computers
ISBN : 9781587058837

Get Book

Implementing Cisco IOS Network Security (IINS) by Catherine Paquet Pdf

Implementing Cisco IOS Network Security (IINS) is a Cisco-authorized, self-paced learning tool for CCNA® Security foundation learning. This book provides you with the knowledge needed to secure Cisco® routers and switches and their associated networks. By reading this book, you will gain a thorough understanding of how to troubleshoot and monitor network devices to maintain integrity, confidentiality, and availability of data and devices, as well as the technologies that Cisco uses in its security infrastructure. This book focuses on the necessity of a comprehensive security policy and how it affects the posture of the network. You will learn how to perform basic tasks to secure a small branch type office network using Cisco IOS® security features available through the Cisco Router and Security Device Manager (SDM) web-based graphical user interface (GUI) and through the command-line interface (CLI) on Cisco routers and switches. The author also provides, when appropriate, parallels with Cisco ASA appliances. Whether you are preparing for CCNA Security certification or simply want to gain a better understanding of Cisco IOS security fundamentals, you will benefit from the information provided in this book. Implementing Cisco IOS Network Security (IINS) is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Develop a comprehensive network security policy to counter threats against information security Configure routers on the network perimeter with Cisco IOS Software security features Configure firewall features including ACLs and Cisco IOS zone-based policy firewalls to perform basic security operations on a network Configure site-to-site VPNs using Cisco IOS features Configure IPS on Cisco network routers Configure LAN devices to control access, resist attacks, shield other network devices and systems, and protect the integrity and confidentiality of network traffic This volume is in the Certification Self-Study Series offered by Cisco Press®. Books in this series provide officially developed self-study solutions to help networking professionals understand technology implementations and prepare for the Cisco Career Certifications examinations.

Implementing Enterprise Cybersecurity with Opensource Software and Standard Architecture

Author : Anand Handa,Rohit Negi,Sandeep Kumar Shukla
Publisher : CRC Press
Page : 278 pages
File Size : 50,6 Mb
Release : 2022-09-01
Category : Science
ISBN : 9781000794281

Get Book

Implementing Enterprise Cybersecurity with Opensource Software and Standard Architecture by Anand Handa,Rohit Negi,Sandeep Kumar Shukla Pdf

Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffectively. The Editors have developed multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the opensource software domain. This book has 8 chapters describing these projects in detail with recipes on how to use opensource tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment. This book also demonstrates work related to malware analysis using machine learning and implementation of honeypots, network Intrusion Detection Systems in a security operation center environment. It is essential reading for cybersecurity professionals and advanced students.

Implementing an IBM/Cisco SAN

Author : Jon Tate,Michael Engelbrecht,Jacek Koman,IBM Redbooks
Publisher : IBM Redbooks
Page : 444 pages
File Size : 43,5 Mb
Release : 2009-03-09
Category : Computers
ISBN : 9780738432038

Get Book

Implementing an IBM/Cisco SAN by Jon Tate,Michael Engelbrecht,Jacek Koman,IBM Redbooks Pdf

"Do everything that is necessary and absolutely nothing that is not." In this IBM® Redbooks® publication, which is an update and major revision of the previous version, we have consolidated as much of the critical information as possible while discussing procedures and tasks that are likely to be encountered on a daily basis. Each of the products described has much more functionality than we could cover in just one book. The IBM SAN portfolio is rich in quality products that bring a vast amount of technicality and vitality to the SAN world. Their inclusion and selection is based on a thorough understanding of the storage networking environment that positions IBM, and therefore its customers and partners, in an ideal position to take advantage by their deployment. We discuss the latest additions to the IBM/Cisco SAN family and we show how they can be implemented in an open systems environment, focusing on the Fibre Channel protocol (FCP) environment. We address some of the key concepts that they bring to the market, and in each case, we give an overview of those functions that are essential to building a robust SAN environment.

Hack Proofing Linux

Author : James Stanger,Patrick T. Lane
Publisher : Elsevier
Page : 512 pages
File Size : 48,9 Mb
Release : 2001-07-06
Category : Computers
ISBN : 0080478115

Get Book

Hack Proofing Linux by James Stanger,Patrick T. Lane Pdf

From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need Uses forensics-based analysis to give the reader an insight to the mind of a hacker

CentOS Stream 9 Essentials

Author : Neil Smyth
Publisher : eBookFrenzy
Page : 375 pages
File Size : 51,8 Mb
Release : 2023-06-07
Category : Computers
ISBN : 9781951442736

Get Book

CentOS Stream 9 Essentials by Neil Smyth Pdf

CentOS Stream 9 Essentials is designed to provide detailed information on the installation, use, and administration of the CentOS 9 distribution. For beginners, the book covers topics such as operating system installation, the basics of the GNOME desktop environment, configuring email and web servers, and installing packages and system updates using App Streams. Additional installation topics, such as dual booting with Microsoft Windows, are also covered, together with all important security topics, such as configuring a firewall and user and group administration. For the experienced user, topics such as remote desktop access, the Cockpit web interface, logical volume management (LVM), disk partitioning, swap management, KVM virtualization, Secure Shell (SSH), Linux Containers, and file sharing using both Samba and NFS are covered in detail to provide a thorough overview of this enterprise class operating system.

Ubuntu 18.04 Essentials

Author : Neil Smyth
Publisher : Payload Media
Page : 394 pages
File Size : 49,9 Mb
Release : 2020-04-30
Category : Computers
ISBN : 9781951442170

Get Book

Ubuntu 18.04 Essentials by Neil Smyth Pdf

Arguably one of the most highly regarded and widely used enterprise level operating systems available today is the Ubuntu 18.04 distribution. Not only is it considered to be among the most stable and reliable operating systems, it is also backed by the considerable resources and technical skills of Canonical, Ltd. Ubuntu 18.04 Essentials is designed to provide detailed information on the installation, use and administration of the Ubuntu 18.04 distribution. For beginners, the book covers topics such as operating system installation, the basics of the GNOME desktop environment, configuring email and web servers and installing packages and system updates. Additional installation topics such as dual booting with Microsoft Windows are also covered, together with all important security topics such as configuring a firewall and user and group administration. For the experienced user, topics such as remote desktop access, the Cockpit web interface, logical volume management (LVM), disk partitioning, swap management, KVM virtualization, Secure Shell (SSH), Linux Containers and file sharing using both Samba and NFS are covered in detail to provide a thorough overview of this enterprise class operating system.

SSH, The Secure Shell

Author : Daniel J. Barrett,Richard E. Silverman,Robert G. Byrnes
Publisher : "O'Reilly Media, Inc."
Page : 666 pages
File Size : 48,7 Mb
Release : 2005-05-10
Category : Computers
ISBN : 9780596008956

Get Book

SSH, The Secure Shell by Daniel J. Barrett,Richard E. Silverman,Robert G. Byrnes Pdf

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.

Building DMZs For Enterprise Networks

Author : Syngress
Publisher : Elsevier
Page : 831 pages
File Size : 50,8 Mb
Release : 2003-08-04
Category : Computers
ISBN : 0080476260

Get Book

Building DMZs For Enterprise Networks by Syngress Pdf

This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter. - There are currently no books written specifically on DMZs - This book will be unique in that it will be the only book that teaches readers how to build a DMZ using all of these products: ISA Server, Check Point NG, Cisco Routers, Sun Servers, and Nokia Security Appliances. - Dr. Thomas W. Shinder is the author of the best-selling book on Microsoft's ISA, Configuring ISA Server 2000. Customers of the first book will certainly buy this book.

Hack Proofing ColdFusion

Author : Syngress
Publisher : Elsevier
Page : 512 pages
File Size : 48,6 Mb
Release : 2002-04-25
Category : Computers
ISBN : 0080478093

Get Book

Hack Proofing ColdFusion by Syngress Pdf

The only way to stop a hacker is to think like one! ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance. Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications. Teaches strategy and techniques: Using forensics-based analysis this book gives the reader insight to the mind of a hacker Interest in topic continues to grow: Network architects, engineers and administrators are scrambling for security books to help them protect their new networks and applications powered by ColdFusion Unrivalled Web-based support: Up-to-the minute links, white papers and analysis for two years at [email protected]

z/OS Version 1 Release 12 Implementation

Author : Paul Rogers,Robert Hering,Paulo Heuser,George Kozakos,Lutz Kühner,Jean-Louis Lafitte,Diana Nakajima,Paulo Cesar Nascimento,Gil Peleg,IBM Redbooks
Publisher : IBM Redbooks
Page : 888 pages
File Size : 55,6 Mb
Release : 2011-04-27
Category : Computers
ISBN : 9780738434988

Get Book

z/OS Version 1 Release 12 Implementation by Paul Rogers,Robert Hering,Paulo Heuser,George Kozakos,Lutz Kühner,Jean-Louis Lafitte,Diana Nakajima,Paulo Cesar Nascimento,Gil Peleg,IBM Redbooks Pdf

This IBM® Redbooks® publication describes changes in installation and migration when migrating from a current z/OS® V1R10 and z/OS V1R11 to z/OS V1R12. Also described are tasks to prepare for the installation of z/OS V1R12, including ensuring that driving system and target system requirements are met, and coexistence requirements are satisfied. New migration actions are introduced in z/OS V1R12. This book focuses on identifying some of the new migration actions that must be performed for selected elements when migrating to z/OS V1R12. This book describes the following enhancements: z/OS V1R12 installation, HiperDispatch, System Logger, Auto-reply to WTORs, Real Storage Manager (RSM) DFSMS, DFSORT, Services aids, z/OS Infoprint Server, TSO/E, RMFTM, Language Environment®, BCP allocation XML System Services, z/OS UNIX® System Services, BCP supervisor, Extended Address Volumes HyperSwap®. BCPii, (de)ciphering, Predictive Failure Analysis, C language, Hardware instrumentation services FICON® dynamic channel-path management, Workload Manager, SDSF, JES2, JES3, SMF, GRS, XCF, HCD Unicode, Capacity provisioning, RRS, Parallel subsystems initialization z/OS Management Facility (z/OSMF)