z/OS TSO/E Customization
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Protecting the resources TSO/E users can access

z/OS TSO/E Customization
SA32-0976-00

You can use several facilities to limit the use of TSO/E commands and protect TSO/E data sets. This chapter provides an overview of how to perform these tasks.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014