Experts' Guide to OS/400 & I5/OS Security

Experts' Guide to OS/400 & I5/OS Security

4.11 - 1251 ratings - Source

... connectivity uses a version of the Secure Sockets Layer (SSL) protocol but does so without using digital certificates. Instead, device authentication is accomplished via service tools device profiles. These profiles, which are stored on the iSeries, contain a cryptographic key (i.e., password) that the PC trying to act as ... Information about the PC associated with a particular device profile is stored on the PC. ... To activate this menu item, you must unlock it using a native macro in DST.

Title:Experts' Guide to OS/400 & I5/OS Security
Author: Carol Woodbury, Patrick Botz
Publisher:System iNetwork - 2004-01-01

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA