This section contains the following topics:
Security File Recovery Strategy
Designating Backup-Responsible System
Managing Data Sets and Tape Backups
Selecting Host System(s) for Recovery
Reestablishing the System After Loss
Reconstructing the Security File
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |