ACF2

Results: 38



#Item
11ADABAS / Adabas D / ACF2 / Database / Resource Access Control Facility / NATURAL / Software AG / Software / Computing

SECURITRE Reference Manual Note: All references to the SECURITRE version in this manual are indicated by vrs or v.r.s. The current release of SECURITRE is version[removed]Comments pertaining to this document and t he SECU

Add to Reading List

Source URL: support.treehouse.com

Language: English - Date: 2015-01-13 10:02:52
12Adabas D / ACF2 / Computing / Database / Resource Access Control Facility / Software / ADABAS / Software AG

SECURITRE Reference Manual This document is applicable to the SECURITRE Version[removed]software package. Comments pertaining to this document and the SECURITRE package are encouraged. Please direct all comments to:

Add to Reading List

Source URL: support.treehouse.com

Language: English - Date: 2008-06-27 09:53:54
13Z/OS / MVS / ACF2 / CICS / SDSF / ISPF / IBM mainframe / Virtual Storage Access Method / Mainframe computer / Computing / Software / System software

INTERSKILL MAINFRAME TRAINING NEWSLETTER Sept 2014 Inside This Issue: Interskill Learning Planned New Curriculum and Updates for 2014

Add to Reading List

Source URL: www.datatrain.com

Language: English - Date: 2014-10-02 01:46:41
14Software AG / Crime prevention / National security / ACF2 / Identity management / Resource Access Control Facility / Access control / Database / Security / Computer security / ADABAS

SECURITRE Security Interface between ADABAS/NATURAL and RACF / ACF2 / TOP SECRET Last night, a hacker broke through your security and stole confidential data.

Add to Reading List

Source URL: www.treehouse.com

Language: English - Date: 2015-01-13 09:56:47
15Computer security / Internet protocols / Internet standards / IBM DB2 / Cross-platform software / Resource Access Control Facility / Z/OS / Syslog / ACF2 / Computing / Internet / Software

CorreLog-CZ_Agent_4pg-feb13.indd

Add to Reading List

Source URL: ww1.prweb.com

Language: English - Date: 2014-02-13 09:05:45
16Computer network security / Resource Access Control Facility / Secure communication / ACF2 / VM / Z/OS / Database security / Security controls / IBM / Computer security / Computing / Security

IBM Security Data Sheet IBM Security zSecure Command Verifier Enforce RACF policies and protect the security

Add to Reading List

Source URL: public.dhe.ibm.com

Language: English - Date: 2013-09-16 16:40:43
17VM / Virtual machine / ACF2 / System software / Software / Resource Access Control Facility

Enabling the Facility Class in RACFVM v1.5

Add to Reading List

Source URL: www.vm.ibm.com

Language: English - Date: 2014-12-08 10:33:36
18Computer security / National security / Resource Access Control Facility / Access control / ACF2 / Password / Security / Crime prevention / Identity management

Security Administrator’s Workshop State of North Carolina North Carolina Accounting System

Add to Reading List

Source URL: www.osc.nc.gov

Language: English - Date: 2011-02-25 14:12:13
19Computing / Software / ACF2 / Form / Table

DFMS SECURITY CODE REQUEST FORM

Add to Reading List

Source URL: accounting.delaware.gov

Language: English - Date: 2012-01-17 13:01:48
20Computer security / National security / Resource Access Control Facility / Access control / ACF2 / Password / Security / Crime prevention / Identity management

Security Administrator’s Workshop State of North Carolina North Carolina Accounting System

Add to Reading List

Source URL: www.ncosc.net

Language: English - Date: 2011-02-25 14:12:13
UPDATE