Security for TCP/IP clients
This part discusses how you can secure your applications when CICS® participates in a client-server configuration, using TCP/IP communication protocols.
This part discusses how you can secure your applications when CICS® participates in a client-server configuration, using TCP/IP communication protocols.