© Copyright IBM Corp. 2006. All rights reserved. 65
Chapter 4. Integrity and security
After completing this chapter, you will be able to:
򐂰 Describe the security and integrity needs of a large-scale operating
򐂰 Describe the methods for serialization in a multi-user environment
򐂰 Describe the built-in features that enable integrity and security
򐂰 Describe the two-phase commit process and why it is needed
򐂰 Describe the features needed from an add-on security package

Get Introduction to the New Mainframe: Large-Scale Commercial Computing now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.