Close X

Secure Engineering : How to develop authorised code without compromising z/OS system integrity


Presentation

This 60 minute presentation will cover the important issues when designing code that has an interface between non-authorized callers and an authorised service provider including the most common mistakes and how to implement a methodology that maintains system integrity.

(FN)

Stream: Enterprise Security
Room: Melbourne
Time: 10:15 - 11:15

Attachments

FN Attachments

Speakers


  • Rob Scott at Rocket Software
  • Starting out as an MVS systems programmer in the mid 1980s, 
    I quickly became interested in the public domain software arena and I designed and developed the "MXI" freeware tool in the 1990s. I moved into full-time software development in 2003 and am currently employed by Rocket Software as a Principal Architect in Mainframe Systems Tools. Part of my responsibilities at Rocket is the architecture and development of SDSF.


    Email: rscott@rs.com

  • Rob Scott at Rocket Software
  • Starting out as an MVS systems programmer in the mid 1980s, 
    I quickly became interested in the public domain software arena and I designed and developed the "MXI" freeware tool in the 1990s. I moved into full-time software development in 2003 and am currently employed by Rocket Software as a Principal Architect in Mainframe Systems Tools. Part of my responsibilities at Rocket is the architecture and development of SDSF.


    Email: rscott@rs.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!