Skip to main content

Save up to 20% on Elsevier print and eBooks with free shipping. No promo code needed.

Save up to 20% on print and eBooks.

Securing HP NonStop Servers in an Open Systems World

TCP/IP, OSS and SQL

1st Edition - August 16, 2006

Author: XYPRO Technology XYPRO Technology Corp

Language: English
Paperback ISBN:
9 7 8 - 1 - 5 5 5 5 8 - 3 4 4 - 6
eBook ISBN:
9 7 8 - 0 - 0 8 - 0 4 7 5 5 7 - 8

Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of… Read more

Securing HP NonStop Servers in an Open Systems World

Purchase options

LIMITED OFFER

Save 50% on book bundles

Immediately download your ebook while waiting for your print delivery. No promo code is needed.

Institutional subscription on ScienceDirect

Request a sales quote
Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the soaring costs of security breaches, it is economically essential for companies to become proactive in implementing effective system and data security measures. This volume is a comprehensive reference for understanding security risks, mitigations and best practices as they apply to the various components of these business-critical computing environments.

HP NonStop Servers are used by Financial, Medical, Manufacturing enterprises where there can be no down time. Securing HP NonStop Servers in an Open Systems World: OSS, TCP/IP, and SQL takes a wide angle view of NonStop Server use. This book addresses protection of the Open Systems Services environment, network interfaces including TCP/IP and standard SQL databases. It lays out a roadmap of changes since our first book HP has made to Safeguard, elaborating on the advantages and disadvantages of implementing each new version. Even the security aspects of managing Operating System upgrades are given attention. Auditors, security policy makers, information security administrators and system managers will find the practical information they need for putting security principles into practice to meet industry standards as well as compliance regulations.