As workloads are being offloaded to IBM® z Systems™ based cloud environments, it is important to ensure that these workloads and environments are secure.
This IBM Redbooks® publication describes the necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM® and Linux on z Systems.
The audience for this book is IT architects and those planning to use z Systems for their cloud environments.
This book was produced by a team of specialists from around the world working at the International Technical Support Organization, Poughkeepsie Center.
Lydia Parziale is a Project Leader for the ITSO team in Poughkeepsie, New York. She has domestic and international ...