This section contains the following topics:
Security File Recovery Strategy
Designating Backup-Responsible System
Managing Data Sets and Tape Backups
Selecting Host System(s) for Recovery
Reestablishing the System After Loss
Reconstructing the Security File
|
Copyright © 2011 CA.
All rights reserved.
|
|