Defining CICS to CA Top Secret
›
Introduction
Introduction
This guide describes:
How to install the CA Top Secret security product in your CICS system
How to secure a CICS inter-system environment, daily operations, customization, and diagnostics
How to select and implement CICS security parameters and/or CA Top Secret suboptions to administer security in your environment
Copyright © 2014 CA Technologies. All rights reserved.
Rate This Page
The content on this page was useful to me.
Disagree strongly
1
2
3
4
5
Agree strongly
Submit rating and optional comments about this page